CN108985759A - A kind of address generating method and system, equipment and storage medium encrypting currency - Google Patents
A kind of address generating method and system, equipment and storage medium encrypting currency Download PDFInfo
- Publication number
- CN108985759A CN108985759A CN201810621438.XA CN201810621438A CN108985759A CN 108985759 A CN108985759 A CN 108985759A CN 201810621438 A CN201810621438 A CN 201810621438A CN 108985759 A CN108985759 A CN 108985759A
- Authority
- CN
- China
- Prior art keywords
- character
- character string
- address
- title
- string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of address generating methods and system, equipment and storage medium for encrypting currency, comprising: according to the first title text string generation code character library of encryption currency;The first address character string of the encryption currency is generated by the code character library;Wherein the first address character string does not include each character included by the first title character string;The first title character string is added in the designated position of the first address character string to generate the second address character string.The present invention allows users to intuitively identify the address which encryption currency the second address character string is by obtaining the second final address character string in the name character that encryption currency is added in designated position on the basis of the first address character string generated without containing encryption monetary name character.
Description
Technical field
This application involves field of computer technology, and in particular to a kind of address generating method for encrypting currency and system, sets
Standby and storage medium.
Background technique
The currency address of currency is encrypted, personal bank card account, identification when being for trading with other people are similar to
Information.Currently, the mode that encryption currency generallys use class bit coin generates currency address, i.e., by carrying out Hash operation to public key
Afterwards, it then carries out BASE58 and encodes to obtain a character string, to represent an address.Currently, although the process for generating address guarantees
The safety of address and machine readability, but for user's individual, there is a serious shortage of readability for such address, use
Family can not intuitively distinguish that this address is the address of what type of encryption currency from a character string, it is also difficult to judge this
Whether a character string is a sufficient address.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, being intended to provide one kind for a user being capable of more intuitive side
Just know this currency address be it is any encryption currency address generating method and system, equipment and storage medium.
In a first aspect, the present invention provides a kind of address generating method for encrypting currency, comprising:
According to the first title text string generation code character library of encryption currency;
The first address character string of encryption currency is generated by code character library;Wherein the first address character string does not include the
Each character included by one name character string;
The first title character string is added in the designated position of the first address character string to generate the second address character string.
Further, include any one of following according to the first title text string generation code character library of encryption currency:
Each character included by the first title character string is removed in default code character repertoire, generates code character library;
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire,
Generate code character library.
Further, include: according to the first title text string generation code character library of encryption currency
According to the first title character string of encryption currency, inquiry whether there is the second title word in encryption monetary name library
Symbol string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character
Library;
Wherein, the second title character string is generated by adding several characters after the first title character string.
Further, designated position is at least at two.
Further, designated position includes at least one of following: the head of the first address character string, the first address character string
Tail portion.
Second aspect, the present invention provide a kind of address generation system for encrypting currency, comprising:
Code character library generation unit is configured to the first title text string generation code character according to encryption currency
Library;
First scalar/vector is configured to the first address character string that code character library generates encryption currency;
Wherein the first address character string does not include each character included by the first title character string;
Second scalar/vector is configured to add the first title character string in the designated position of the first address character string
To generate the second address character string.
Further, code character library generation unit includes:
First deletes subelement, is configured to remove in default code character repertoire each included by the first title character string
Character generates code character library;Or,
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire,
Generate code character library.
Further, code character library generation unit includes:
Second deletes subelement, is configured to the first title character string according to encryption currency in encryption monetary name library
Inquiry whether there is the second title character string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character
Library;Wherein, the second title character string is generated by adding several characters after the first title character string.
The third aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory
Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention
The address generating method for the encryption currency that embodiment provides.
Fourth aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count
Calculation machine executes the address generating method for the encryption currency that each embodiment according to the present invention provides.
The address generating method and system, equipment of a kind of encryption currency that many embodiments of the present invention provide and Jie can be stored
Matter on the basis of first address character string generated without containing encryption monetary name character in designated position addition by adding
The name character of close currency obtains the second final address character string, allows users to intuitively identify the second address character string
It is the address of which encryption currency.
A kind of address generating method for encryption currency that some embodiments of the invention provide and system, equipment and Jie can be stored
Matter optimizes the ground extremely, identify the address can not only intuitively further by the way that setting position is located at head and tail portion,
Can also easily determine whether the duplication address is complete.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart for the method that one embodiment of the invention provides.
Fig. 2 is the flow chart for the method that one embodiment of the invention provides.
Fig. 3 is the flow chart of step S1 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.
Fig. 4 is a kind of preferred embodiment flow chart of method shown in Fig. 1 of the present invention.
Fig. 5 is the flow chart of step S1 in another preferred embodiment of method shown in Fig. 1 of the present invention.
Fig. 6 is the flow chart of step S3 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.
Fig. 7 is the structural schematic diagram for the system that one embodiment of the invention provides
Fig. 8 is a kind of device structure schematic diagram provided by the invention.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the flow chart for the method that a kind of encryption currency that one embodiment of the invention provides generates address.
As shown in Figure 1, in the present embodiment, the present invention provides a kind of method that encryption currency generates address, comprising:
S1, according to encryption currency the first title text string generation code character library;
S2, the first address character string that encryption currency is generated by code character library;Wherein the first address character string does not wrap
Containing each character included by the first title character string;
S3, the first title character string is added to generate the second address character string in the designated position of the first address character string.
Specifically, by taking Fig. 2 as an example: after receiving encryption monetary name character " ABCD ", generating the first address character string, such as
" 123456789EFGHIJK ", it is assumed that algorithm adds monetary name character " ABCD " after being set in third character, then last to compile
Code after generate the second address character string " 123ABCD456789EFGHIJK " in this way, encryption currency address generate terminate, user
It can be by seeing that the address is encryption currency " ABCD " to visual and clear the knowing of the monetary name character after third character
Address, because the address only just has " ABCD " these characters in the position of this setting out, and being in other positions will not
Occur.
Above-described embodiment is by first generating the address without the name character for encrypting currency, then again in the setting of the address
The name character is added at position, and user is enable intuitively to know that the address is the ground of which kind of currency when seeing the address
Location.
The embodiment is not limited by Fig. 2, and " ABCD " is only the expression way for representing the character string of certain encryption currency, and
Do not refer to that encryption currency itself, diagrammatically shown first address character string, the second address character string are also one kind in order to better
The expression way for understanding present embodiment, be not intended to limit present embodiment actually generate address character string as a result, setting
Only one way in which is added also after being scheduled on third character, adds the similarly suitable the present embodiment institute of character string after other characters
The method shown, and designated position is also not necessarily limited at one, the similar inventions of other a few place setting positions conceive equally applicable implementation
Example.
Fig. 3 is the flow chart of step S1 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.
S11, after obtaining name character string, each character included by name character string is deleted from default code character repertoire,
S12, code character library is generated.
Specifically, currently, the address of encryption currency mostly uses the mode of class bit coin to generate currency address, that is, being used such as Fig. 4
BASE58 coding obtains currency address.The code character library of BASE58 is
" 123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwx yz ", this is default
Code database deletes character " A " " B " " C " " D " from above-mentioned code database after receiving encryption monetary name character " ABCD ", generates
Code character library " 123456789EFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz ", is existed by algorithm
The first address character string is generated in the code character library such as " 123456789EFGHIJK ", is not contained in the first address character string
Name character " ABCD ".
Above-described embodiment optimizes coding by deleting encryption monetary name character in original default code character repertoire
The generating process of character repertoire.
The embodiment is not limited by Fig. 4, and default code library is not only the coded character set of BASE58, other characters yet
Collect equally applicable this method, and the first address character string shown in this figure is only diagram effect, does not represent the first ground of generation
Location character string is address character string shown in this figure, is repeated no more.
Fig. 5 is the flow chart of step S1 in another preferred embodiment of method shown in Fig. 1 of the present invention.
According to the first title character string of encryption currency, inquiry whether there is the second title word in encryption monetary name library
Symbol string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character
Library;
Wherein, the second title character string is generated by adding several characters after the first title character string.
Specifically, after receiving encryption currency character string " ABCD ", inquiry encryption monetary data library, if inquiring in the presence of encryption
Currency " ABCDE " then removes in default code character repertoire character included by the character string " A " " B " " C " " D " " E ", generates
Code character library without above-mentioned character, then coding generates the first address character string on this basis, then in the first address
" ABCD " is added on the designated position of character string, is generated the second address word " * * * ABCD*** ", is generated to avoid the occurrence of coding
" * * * ABCDE*** " is this to be possible to the case where being mistakenly considered the address of encryption currency ABCDE.
Above-mentioned preferred embodiment, it is excellent by removing there may be address character string similar with other currency type character strings
The generating process in code character library is changed.
Wherein, " ABCD " or " ABCDE " is only the expression way for representing the character string of certain encryption currency, does not imply that encryption
Currency itself, the first address character string, the expression of the second address character string are also only a kind of in order to better understand this embodiment party
The expression way of formula is not intended to limit the address character string that present embodiment actually generates.
Fig. 6 is the flow chart of step S3 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.Assuming that encryption currency name
The first address character string that character " ABCD " generates is referred to as " 123456789EFGHIJK ", then to the head of the first address character string
Portion and tail portion add name character " ABCD " respectively and generate the second address character string " ABCD123456789EFGHIJKABCD " afterwards.
Above embodiment by adding name character, a side on the head of the first address character string and tail position respectively
Face can be used family and intuitively find out that the address is the address of which kind of encryption currency, on the other hand, moreover it is possible to make user on duplication ground
It oneself can discriminate whether replicated complete when location, avoid the unfavorable result of the imperfect bring of address reproduction.
Likewise, the embodiment is not limited by Fig. 6, as shown in the figure merely to more intuitive understand this embodiment party
The particular content of formula.
Fig. 7 is that a kind of address for encryption currency that one embodiment of the invention provides generates the structural schematic diagram of system, such as Fig. 7
It is shown, it is a kind of encrypt currency address generate system 001 include: code character library generation unit 002, be configured to according to encryption
First title text string generation code character library of currency,
First scalar/vector 003 concatenates into the first address character string of encryption currency according to the name character, this
One address character string does not include each character included by the name character string;Second scalar/vector 004 is configured to
The name character is added on the designated position of one address character string and generates the second address character string, and will not be gone out in other positions
The now name character.
In a preferred embodiment, code character library generation unit includes the first deletion subelement, and the first deletion is single
Member is configured to remove each character included by the first title character string in default code character repertoire, generates code character library;
Or, removing each character included by the first title character string and corresponding size write characters in default code character repertoire, generate
Code character library.
In another preferred embodiment, code character library generation unit includes the second deletion subelement, the second deletion
Unit is configured to be inquired in encryption monetary name library with the presence or absence of second place according to the first title character string of encryption currency
Claim character string: being then to remove each character included by the second title character string in default code character repertoire, generates coding
Character repertoire;Wherein, the second title character string is generated by adding several characters after the first title character string.
When computer processing data, ignore the first title character string added on the second address character string designated position to obtain
It takes the first address character string and carries out data processing.
Fig. 8 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in figure 8, present invention also provides a kind of equipment 10, including one or more centres as on the other hand
Unit (CPU) 101 is managed, can be added according to the program being stored in read-only memory (ROM) 102 or from storage section 108
The program that is downloaded in random access storage device (RAM) 103 and execute various movements appropriate and processing.In RAM103, also deposit
It contains equipment 10 and operates required various programs and data.CPU101, ROM102 and RAM103 pass through the phase each other of bus 104
Even.Input/output (I/O) interface 105 is also connected to bus 104.
I/O interface 105 is connected to lower component: the importation 106 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 107 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 108 including hard disk etc.;
And the communications portion 109 of the network interface card including LAN card, modem etc..Communications portion 109 via such as because
The network of spy's net executes communication process.Driver 110 is also connected to I/O interface 105 as needed.Detachable media 111, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 110, in order to read from thereon
Computer program be mounted into storage section 108 as needed.
Particularly, in accordance with an embodiment of the present disclosure, a kind of encryption currency of any of the above-described embodiment description generates address
Method may be implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product, packet
The computer program being tangibly embodied on machine readable media is included, computer program includes raw for executing a kind of encryption currency
At the program code of the method for address.In such embodiments, which can be by communications portion 109 from network
On be downloaded and installed, and/or from detachable media 111 be mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums
Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled
Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should
Program is used to execute the side for being described in a kind of encryption currency generation address of the application by one or more than one processor
Method.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants
It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong
The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated
The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with
It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can be
Software program in computer or intelligent movable equipment is set, the hardware device being separately configured is also possible to.Wherein, these lists
The title of member or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature
Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions
Technical characteristic replaced mutually and the technical solution that is formed.
Claims (10)
1. a kind of address generating method for encrypting currency characterized by comprising
According to the first title text string generation code character library of encryption currency;
The first address character string of the encryption currency is generated by the code character library;Wherein the first address character string
Not comprising each character included by the first title character string;
The first title character string is added in the designated position of the first address character string to generate the second address character string.
2. the method according to claim 1, wherein the first title text string generation according to encryption currency
Code character library includes any one of following:
Each character included by the first title character string is removed in default code character repertoire, generates code character library;
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire,
Generate code character library.
3. the method according to claim 1, wherein being encoded according to the first title text string generation of encryption currency
Character repertoire includes:
According to the first title character string of encryption currency, inquiry whether there is the second title character string in encryption monetary name library:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character
Library;
Wherein, the second title character string is generated by adding several characters after the first title character string.
4. -3 any method according to claim 1, which is characterized in that the designated position is at least at two.
5. -3 any method according to claim 1, which is characterized in that the designated position includes at least one of following:
The head of the first address character string, the tail portion of the first address character string.
6. a kind of address for encrypting currency generates system characterized by comprising
Code character library generation unit is configured to the first title text string generation code character library according to encryption currency;
First scalar/vector is configured to the first address character that the code character library generates the encryption currency
String;Wherein the first address character string does not include each character included by the first title character string;
Second scalar/vector is configured to add the first title word in the designated position of the first address character string
Symbol string is to generate the second address character string.
7. system according to claim 6, which is characterized in that code character library generation unit includes:
First deletes subelement, is configured to remove in default code character repertoire each included by the first title character string
Character generates code character library;Or,
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire,
Generate code character library.
8. system according to claim 6, which is characterized in that code character library generation unit includes:
Second deletes subelement, is configured to be inquired in encryption monetary name library according to the first title character string of encryption currency
With the presence or absence of the second title character string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character
Library;Wherein, the second title character string is generated by adding several characters after the first title character string.
9. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors
Execute method according to any one of claims 1 to 5.
10. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed
Benefit requires method described in any one of 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810621438.XA CN108985759B (en) | 2018-06-15 | 2018-06-15 | Address generating method, system, equipment and storage medium for cryptocurrency |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810621438.XA CN108985759B (en) | 2018-06-15 | 2018-06-15 | Address generating method, system, equipment and storage medium for cryptocurrency |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108985759A true CN108985759A (en) | 2018-12-11 |
CN108985759B CN108985759B (en) | 2020-10-23 |
Family
ID=64541334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810621438.XA Active CN108985759B (en) | 2018-06-15 | 2018-06-15 | Address generating method, system, equipment and storage medium for cryptocurrency |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108985759B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177259A (en) * | 2019-12-13 | 2020-05-19 | 杭州复杂美科技有限公司 | Parallel chain transaction encryption method, device and storage medium |
CN112039661A (en) * | 2020-08-20 | 2020-12-04 | 上海简苏网络科技有限公司 | Address coding method and device carrying designated information |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095526A (en) * | 2015-09-29 | 2015-11-25 | 中企动力科技股份有限公司 | URL (uniform resource locator) structural processing method, device and system |
WO2017148527A1 (en) * | 2016-03-03 | 2017-09-08 | Nec Europe Ltd. | Method for managing data in a network of nodes |
CN107613039A (en) * | 2017-09-19 | 2018-01-19 | 北京小米移动软件有限公司 | IP address attribution inquiry method, device, system and storage medium |
WO2018043865A2 (en) * | 2016-08-31 | 2018-03-08 | 서강대학교 산학협력단 | Blockchain-based file management/search system and file management/search method |
CN107832275A (en) * | 2017-11-29 | 2018-03-23 | 北京欧链科技有限公司 | The generation method of intelligent Contract ID, apparatus and system in block chain |
CN107844527A (en) * | 2017-10-13 | 2018-03-27 | 平安科技(深圳)有限公司 | Web page address De-weight method, electronic equipment and computer-readable recording medium |
CN107992923A (en) * | 2017-12-22 | 2018-05-04 | 北京中星仝创科技有限公司 | A kind of QR Quick Response Codes generation and the method read |
-
2018
- 2018-06-15 CN CN201810621438.XA patent/CN108985759B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095526A (en) * | 2015-09-29 | 2015-11-25 | 中企动力科技股份有限公司 | URL (uniform resource locator) structural processing method, device and system |
WO2017148527A1 (en) * | 2016-03-03 | 2017-09-08 | Nec Europe Ltd. | Method for managing data in a network of nodes |
WO2018043865A2 (en) * | 2016-08-31 | 2018-03-08 | 서강대학교 산학협력단 | Blockchain-based file management/search system and file management/search method |
CN107613039A (en) * | 2017-09-19 | 2018-01-19 | 北京小米移动软件有限公司 | IP address attribution inquiry method, device, system and storage medium |
CN107844527A (en) * | 2017-10-13 | 2018-03-27 | 平安科技(深圳)有限公司 | Web page address De-weight method, electronic equipment and computer-readable recording medium |
CN107832275A (en) * | 2017-11-29 | 2018-03-23 | 北京欧链科技有限公司 | The generation method of intelligent Contract ID, apparatus and system in block chain |
CN107992923A (en) * | 2017-12-22 | 2018-05-04 | 北京中星仝创科技有限公司 | A kind of QR Quick Response Codes generation and the method read |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177259A (en) * | 2019-12-13 | 2020-05-19 | 杭州复杂美科技有限公司 | Parallel chain transaction encryption method, device and storage medium |
CN112039661A (en) * | 2020-08-20 | 2020-12-04 | 上海简苏网络科技有限公司 | Address coding method and device carrying designated information |
Also Published As
Publication number | Publication date |
---|---|
CN108985759B (en) | 2020-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110447035B (en) | User content obfuscation in structured user data files | |
CN107145799A (en) | A kind of data desensitization method and device | |
CN109740317A (en) | A kind of digital finger-print based on block chain deposits card method and device | |
CN102292719B (en) | For the visual extensibility of chart based on WEB | |
CN109992998A (en) | A kind of information storage means and system, equipment and storage medium | |
US10706160B1 (en) | Methods, systems, and articles of manufacture for protecting data in an electronic document using steganography techniques | |
CN113032001B (en) | Intelligent contract classification method and device | |
CN112925954A (en) | Method and apparatus for querying data in a graph database | |
CN108632369A (en) | A kind of safe display management method of ship electronic drawing | |
CN110221956A (en) | Method and apparatus for generating the test case of block chain intelligence contract | |
CN108777685A (en) | Method and apparatus for handling information | |
CN108985759A (en) | A kind of address generating method and system, equipment and storage medium encrypting currency | |
CN112084342A (en) | Test question generation method and device, computer equipment and storage medium | |
KR101220254B1 (en) | Searchable color encoded file composing method and searchable color encoded file system | |
Shekhawat et al. | A secured steganography algorithm for hiding an image and data in an image using LSB technique | |
CN113609846B (en) | Method and device for extracting entity relationship in statement | |
Gaur et al. | A new PDAC (parallel encryption with digit arithmetic of cover text) based text steganography approach for cloud data security | |
AU2022215149B2 (en) | Synthesizing user transactional data for de- identifying sensitive information | |
CN109544126A (en) | A kind of wallet creation method, equipment and storage medium | |
CN109964445A (en) | For protection (anti-clone) method and system of unwarranted duplication | |
Lin et al. | A copyright protection scheme based on PDF | |
Boulesnane et al. | A new steganography technique based on dotted Arabic letters features | |
CN110008663A (en) | A method of the information protected for PDF document and distribute tracking is quickly embedded in and extracts | |
CN115099200B (en) | Tamper-proof text processing method and device and computer equipment | |
Tiwari et al. | A novel steganographic methodology for high capacity data hiding in executable files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |