CN109064172A - Cipher key processing method, device and block catenary system - Google Patents

Cipher key processing method, device and block catenary system Download PDF

Info

Publication number
CN109064172A
CN109064172A CN201810851478.3A CN201810851478A CN109064172A CN 109064172 A CN109064172 A CN 109064172A CN 201810851478 A CN201810851478 A CN 201810851478A CN 109064172 A CN109064172 A CN 109064172A
Authority
CN
China
Prior art keywords
key
terminal equipment
stored
program code
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810851478.3A
Other languages
Chinese (zh)
Inventor
程金林
刘雄伟
欧日杭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen New Name Ze Technology Co Ltd
Original Assignee
Shenzhen New Name Ze Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen New Name Ze Technology Co Ltd filed Critical Shenzhen New Name Ze Technology Co Ltd
Priority to CN201810851478.3A priority Critical patent/CN109064172A/en
Publication of CN109064172A publication Critical patent/CN109064172A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The present invention provides a kind of cipher key processing method, device and block catenary systems, if the cipher key processing method includes: to establish to communicate to connect with the first terminal equipment, the first terminal equipment includes at least: mutually isolated hidden partition and program partition holding, is stored with program code in described program partition holding;Obtain the program code in described program partition holding;Run said program code, itself pre-stored key is grouped shared, packet key dispersion is stored in the hidden partition into the first terminal equipment and multiple second terminal equipment, reach in the terminal device for being stored in program code and being used to disperse storage key, the program code for carrying out key dispersion storage is stored by this offline mode, it is distorted so that program code will not be attacked by the insecurity factor in block catenary system, improves the technical effect of the safety of key.

Description

Cipher key processing method, device and block catenary system
Technical field
The present invention relates to block chain technical fields, more particularly, to a kind of cipher key processing method, device and block catenary system.
Background technique
Block chain technical application is most extensive at present, and most successful is exactly using bit coin as the digital cash of representative.Recent years Digital cash have developed rapidly, and due to decentralization, data can not distort and the characteristics of frequently trade, and make it have higher transaction Circulation value, and the financial derivatives for the property that can be liquidated by exploitation, the price to keep relative stability.
Digital cash wallet is for filling money in ordinary user.This view is wrong, digital cash wallet It is the tool for filling key.The right of eminent domain for the digital cash for having key that can possess on appropriate address, it can be used to It pays, transfers accounts, supplement equal financial transactions attribute with money.
Exactly because digital cash wallet possesses payment, transfer accounts, buy, the financial asset attribute of phases, the digital goods such as supplements with money The safety of coin wallet just seems very important and is highly desirable.The digital cash wallet safety for ensureing user, becomes number One topic that can't steer clear of of currency industry.
The digital cash wallet safety approach of mainstream currently on the market has following several: one is using library mind as representative The cold wallet of digital cash, hardware stores the private key of digital cash wallet, and APP product transfers the wallet of hardware by two dimensional code Signature transaction and confirmation Transaction Information.Second is simple hardware product, and digital cash wallet key storage is in hardware chip In.The third is previously stored the local side of similar MTK mobile phone, the 4th kind be similar exchange centralization wallet, the number of user Word currency key storage is in the server of centralization.Above four kinds of schemes have the defects such as key safety is low.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of cipher key processing method, device and block catenary system, to alleviate The low technical problem of the key safety of digital cash wallet existing in the prior art.
In a first aspect, being applied to block catenary system, the method the embodiment of the invention provides a kind of cipher key processing method Include:
It is communicated to connect if being established with the first terminal equipment, the first terminal equipment includes at least: mutually isolated Hidden partition and program partition holding are stored with program code in described program partition holding;Obtain described program partition holding Interior program code;
Run said program code, itself pre-stored key is grouped it is shared, by packet key disperse store In hidden partition into the first terminal equipment and multiple second terminal equipment.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein institute State itself pre-stored key is grouped it is shared, by packet key dispersion store to the first terminal equipment with it is multiple In hidden partition in second terminal equipment, comprising:
Multiple groupings are split into the key, it is shared to be grouped;
Each preset algorithm that is utilized respectively is carried out using the characteristic information comprising user's own biological identification feature Encryption, obtains packet key;
Multiple packet keys are stored in the hidden partition of the first terminal equipment and multiple second terminal equipment In.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein institute It states and multiple groupings is split into the key, comprising:
The key is subjected to (n, m) group shared, wherein m is that the key splits shared grouping number, and n is also The minimum packets number of the former key, 3≤n≤m.
With reference to first aspect, the embodiment of the invention provides the third possible embodiments of first aspect, wherein institute State method further include:
When carrying out digital cash transaction, in the first terminal equipment and multiple second terminal equipment, at least n is obtained A packet key;
It is decrypted to each of getting the packet key and being utilized respectively preset algorithm;
Packet key after decryption is recombinated, the key is obtained;
It is signed using the transaction data that digital cash described in the key pair is traded, completes digital cash transaction.
With reference to first aspect, the embodiment of the invention provides the 4th kind of possible embodiments of first aspect, wherein institute State method further include:
The key recovery request of user's input is received, it is special that the identification of user's own biological is carried in the key recovery request Sign;
In the first terminal equipment and multiple second terminal equipment, the multiple groupings for obtaining key to be restored are close Key;
Preset algorithm is utilized respectively to each packet key using user's own biological identification feature to solve It is close;
Packet key after decryption is recombinated, the key is obtained.
With reference to first aspect, the embodiment of the invention provides the 5th kind of possible embodiments of first aspect, wherein institute It states in the first terminal equipment and multiple second terminal equipment, obtains the quantity of the packet key of key to be restored at least It is n.
With reference to first aspect, the embodiment of the invention provides the 6th kind of possible embodiments of first aspect, wherein institute Stating preset algorithm is elliptic curve.
Second aspect, the embodiment of the present invention also provide a kind of key handling device, are applied to block catenary system, described device Include:
Module is obtained, if communicating to connect for establishing with the first terminal equipment, the first terminal equipment is at least wrapped Contain: mutually isolated hidden partition and program partition holding is stored with program code in described program partition holding;Described in acquisition Program code in program partition holding;
Module is run, for running said program code, itself pre-stored key is grouped shared, will be grouped Key dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
The third aspect, the embodiment of the present invention also provide a kind of block catenary system, including memory, processor, the storage The computer program that can be run on the processor is stored in device, the processor is realized when executing the computer program The step of method described in above-mentioned first aspect.
Fourth aspect, the embodiment of the present invention also provide a kind of meter of non-volatile program code that can be performed with processor Calculation machine readable medium, said program code make the processor execute method described in above-mentioned first aspect.
The embodiment of the present invention bring it is following the utility model has the advantages that the embodiment of the present invention block catenary system with it is described first eventually End equipment establishes communication connection, the program code in available described program partition holding, and runs said program code, with Itself pre-stored key is grouped shared, packet key dispersion is stored to the first terminal equipment and multiple the In hidden partition in two terminal devices.
The embodiment of the present invention can be by making block catenary system read the journey in the program partition holding of first terminal equipment Sequence code, and by running the program code, realization itself pre-stored key is grouped it is shared, by packet key point It dissipates in the hidden partition stored into the first terminal equipment and multiple second terminal equipment, since program code is not stored in In block catenary system, also it is not stored in a network, and be stored in for disperse store key terminal device in, by this Offline mode stores the program code for carrying out key dispersion storage, so that program code will not be by block catenary system Insecurity factor attack is distorted, and the safety of key is improved.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of cipher key processing method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of step S102 in Fig. 1;
Fig. 3 is the flow chart of another cipher key processing method provided in an embodiment of the present invention;
Fig. 4 is the flow chart of another cipher key processing method provided in an embodiment of the present invention;
Fig. 5 is a kind of structure chart of key handling device provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
The digital cash wallet safety approach of mainstream currently on the market has following several: one is using library mind as representative The cold wallet of digital cash, hardware stores the private key of digital cash wallet, and APP product transfers the wallet of hardware by two dimensional code Signature transaction and confirmation Transaction Information.Second is simple hardware product, and digital cash wallet key storage is in hardware chip In.The third is previously stored the local side of similar MTK mobile phone, the 4th kind be similar exchange centralization wallet, the number of user Word currency key storage is in the server of centralization.Above four kinds of schemes have the defects such as key safety is low, are based on this, this A kind of cipher key processing method, device and the block catenary system that inventive embodiments provide, can be by making block catenary system read the Program code in the program partition holding of one terminal device, and by running the program code, itself is stored in advance in realization Key be grouped shared, packet key dispersion is stored into the first terminal equipment and multiple second terminal equipment In hidden partition, since program code is not stored in block catenary system, also it is not stored in a network, and be stored in for point In the terminal device for dissipating storage key, the program code for carrying out key dispersion storage is stored by this offline mode, It is distorted so that program code will not be attacked by the insecurity factor in block catenary system, improves the safety of key.
For convenient for understanding the present embodiment, first to a kind of cipher key processing method disclosed in the embodiment of the present invention into Row be discussed in detail, the cipher key processing method can be applied to block catenary system, as shown in Figure 1, the method may include with Lower step:
Step S101 is communicated to connect if establishing with the first terminal equipment, and the first terminal equipment includes at least: phase The hidden partition and program partition holding being mutually isolated are stored with program code in described program partition holding;Obtain described program Program code in partition holding;
Step S102, run said program code, itself pre-stored key is grouped it is shared, by packet key Dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
In embodiments of the present invention, as shown in Fig. 2, the step S102 may comprise steps of:
Step S201 splits into multiple groupings to the key, shared to be grouped;
In this step, the key can be subjected to (n, m) group shared, wherein m is that key fractionation is shared Grouping number, n are the minimum packets number for restoring the key, 3≤n≤m.
Step S202, using the characteristic information comprising user's own biological identification feature to it is each be utilized respectively it is default Algorithm is encrypted, and packet key is obtained;
In embodiments of the present invention, the preset algorithm is elliptic curve, and user's own biological identification feature can be with It include: the one or more of fingerprint, palmmprint and iris etc..
Multiple packet keys are stored in the first terminal equipment and multiple second terminal equipment by step S203 In hidden partition.
In embodiments of the present invention, any one in multiple packet keys is stored in first terminal equipment, remaining Packet key can store in different second terminal equipment.
The block catenary system of the embodiment of the present invention is establishing communication connection with the first terminal equipment, available described Program code in program partition holding, and said program code is run, to be grouped altogether to itself pre-stored key It enjoys, packet key dispersion is stored in the hidden partition into the first terminal equipment and multiple second terminal equipment.
The embodiment of the present invention can be by making block catenary system read the journey in the program partition holding of first terminal equipment Sequence code, and by running the program code, realization itself pre-stored key is grouped it is shared, by packet key point It dissipates in the hidden partition stored into the first terminal equipment and multiple second terminal equipment, since program code is not stored in In block catenary system, also it is not stored in a network, and be stored in for disperse store key terminal device in, by this Offline mode stores the program code for carrying out key dispersion storage, so that program code will not be by block catenary system Insecurity factor attack is distorted, and the safety of key is improved.
On the basis of previous embodiment, if user needs to carry out digital cash transaction, in another implementation of the invention In example, as shown in figure 3, the method also includes:
Step S301, when carrying out digital cash transaction, in the first terminal equipment and multiple second terminal equipment, Obtain at least n packet key;
Step S302 is decrypted to each of getting the packet key and being utilized respectively preset algorithm;
In embodiments of the present invention, the preset algorithm is elliptic curve.
Step S303 recombinates the packet key after decryption, obtains the key;
Step S304 is signed using the transaction data that digital cash described in the key pair is traded, and completes digital goods Coin transaction.
Dispersion can be stored in first terminal when user needs to carry out digital cash transaction through the embodiment of the present invention Packet key in equipment and multiple second terminal equipment is recombinated, so that the key pair digital cash obtained using recombination is handed over Easily sign.
On the basis of previous embodiment, if user has found that key is lost, in another embodiment of the present invention, such as Fig. 4 It is shown, the method also includes:
Step S401 receives the key recovery request of user's input, user itself life is carried in the key recovery request Object identification feature;
Step S402 obtains the more of key to be restored in the first terminal equipment and multiple second terminal equipment A packet key;
In the first terminal equipment and multiple second terminal equipment, the number of the packet key of key to be restored is obtained Amount is at least n.
Step S403 is utilized respectively pre- imputation to each packet key using user's own biological identification feature Method is decrypted;
In embodiments of the present invention, the preset algorithm is elliptic curve.
Step S404 recombinates the packet key after decryption, obtains the key.
Dispersion can be stored in first eventually in user's Lost Security Key, according to key recovery request by the embodiment of the present invention Packet key in end equipment and multiple second terminal equipment is recombinated, to recover the key of loss
In another embodiment of the present invention, a kind of key handling device is also provided, is applied to block catenary system, such as Fig. 5 Shown, described device includes:
Module 11 is obtained, if communicating to connect for establishing with the first terminal equipment, the first terminal equipment is at least Include: mutually isolated hidden partition and program partition holding is stored with program code in described program partition holding;Obtain institute State the program code in program partition holding;
Run module 12, for running said program code, itself pre-stored key is grouped it is shared, will point Group key dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
The technical effect and preceding method embodiment phase of device provided by the embodiment of the present invention, realization principle and generation Together, to briefly describe, Installation practice part does not refer to place, can refer to corresponding contents in preceding method embodiment.
In another embodiment of the present invention, a kind of block catenary system, including memory, processor are also provided, it is described to deposit The computer program that can be run on the processor is stored in reservoir, the processor executes real when the computer program The step of method described in existing above method embodiment.
In another embodiment of the present invention, a kind of non-volatile program code that can be performed with processor is also provided Computer-readable medium, said program code make the processor execute method described in above method embodiment.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, section or code of table, a part of the module, section or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually base Originally it is performed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule The dedicated hardware based system of fixed function or movement is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
The computer program product of cipher key processing method, device provided by the embodiment of the present invention and block catenary system, packet The computer readable storage medium for storing program code is included, the instruction that said program code includes can be used for executing previous methods Method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlyMemory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of cipher key processing method, which is characterized in that be applied to block catenary system, which comprises
It is communicated to connect if being established with first terminal equipment, the first terminal equipment includes at least: mutually isolated hidden partition With program partition holding, program code is stored in described program partition holding;Obtain the program in described program partition holding Code;
Run said program code, itself pre-stored key is grouped it is shared, by packet key dispersion store to institute It states in the hidden partition in first terminal equipment and multiple second terminal equipment.
2. cipher key processing method according to claim 1, which is characterized in that described to be carried out to itself pre-stored key Packet key dispersion is stored the hidden partition into the first terminal equipment and multiple second terminal equipment by group shared It is interior, comprising:
Multiple groupings are split into the key, it is shared to be grouped;
Each preset algorithm that is utilized respectively is encrypted using the characteristic information comprising user's own biological identification feature, Obtain packet key;
Multiple packet keys are stored in the hidden partition of the first terminal equipment and multiple second terminal equipment.
3. cipher key processing method according to claim 2, which is characterized in that described to split into multiple points to the key Group, comprising:
The key is subjected to (n, m) group shared, wherein m is that the key splits shared grouping number, and n is reduction institute State the minimum packets number of key, 3≤n≤m.
4. cipher key processing method according to claim 3, which is characterized in that the method also includes:
When carrying out digital cash transaction, in the first terminal equipment and multiple second terminal equipment, at least n points are obtained Group key;
It is decrypted to each of getting the packet key and being utilized respectively preset algorithm;
Packet key after decryption is recombinated, the key is obtained;
It is signed using the transaction data that digital cash described in the key pair is traded, completes digital cash transaction.
5. cipher key processing method according to claim 3, which is characterized in that the method also includes:
The key recovery request of user's input is received, carries user's own biological identification feature in the key recovery request;
In the first terminal equipment and multiple second terminal equipment, multiple packet keys of key to be restored are obtained;
Preset algorithm is utilized respectively to each packet key using user's own biological identification feature to be decrypted;
Packet key after decryption is recombinated, the key is obtained.
6. cipher key processing method according to claim 5, which is characterized in that described in the first terminal equipment and multiple In second terminal equipment, the quantity for obtaining the packet key of key to be restored is at least n.
7. cipher key processing method according to claim 6, which is characterized in that the preset algorithm is elliptic curve.
8. a kind of key handling device, which is characterized in that be applied to block catenary system, described device includes:
Obtain module, if communicating to connect for establishing with first terminal equipment, the first terminal equipment included at least: mutually every From hidden partition and program partition holding, be stored with program code in described program partition holding;Obtain described program storage Program code in subregion;
Run module, for running said program code, itself pre-stored key is grouped it is shared, by packet key Dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
9. a kind of block catenary system, including memory, processor, it is stored with and can runs on the processor in the memory Computer program, which is characterized in that the processor realizes the claims 1 to 7 when executing the computer program The step of method described in one.
10. a kind of computer-readable medium for the non-volatile program code that can be performed with processor, which is characterized in that described Program code makes the processor execute described any the method for claim 1-7.
CN201810851478.3A 2018-07-27 2018-07-27 Cipher key processing method, device and block catenary system Pending CN109064172A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810851478.3A CN109064172A (en) 2018-07-27 2018-07-27 Cipher key processing method, device and block catenary system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810851478.3A CN109064172A (en) 2018-07-27 2018-07-27 Cipher key processing method, device and block catenary system

Publications (1)

Publication Number Publication Date
CN109064172A true CN109064172A (en) 2018-12-21

Family

ID=64831441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810851478.3A Pending CN109064172A (en) 2018-07-27 2018-07-27 Cipher key processing method, device and block catenary system

Country Status (1)

Country Link
CN (1) CN109064172A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754254A (en) * 2019-01-11 2019-05-14 北京阿尔山区块链联盟科技有限公司 Key management method, device and electronic equipment
CN111047300A (en) * 2019-12-19 2020-04-21 江西宜月鑫网络科技有限公司 Block chain-based online examination and approval method, terminal and readable storage medium
CN111369731A (en) * 2020-02-25 2020-07-03 上海桔品网络科技有限公司 Intelligent lottery self-service sale system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009147817A1 (en) * 2008-06-02 2009-12-10 株式会社バッファロー Authentication system, information processing apparatus, storage apparatus, authentication method and program
CN103617404A (en) * 2013-12-17 2014-03-05 天津赢达信科技有限公司 Storing device of safety partitions
CN104090853A (en) * 2014-07-03 2014-10-08 武汉迅存科技有限公司 Solid-state disc encryption method and system
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107851167A (en) * 2015-07-31 2018-03-27 微软技术许可有限责任公司 Protection calculates the technology of data in a computing environment
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009147817A1 (en) * 2008-06-02 2009-12-10 株式会社バッファロー Authentication system, information processing apparatus, storage apparatus, authentication method and program
CN103617404A (en) * 2013-12-17 2014-03-05 天津赢达信科技有限公司 Storing device of safety partitions
CN104090853A (en) * 2014-07-03 2014-10-08 武汉迅存科技有限公司 Solid-state disc encryption method and system
CN107851167A (en) * 2015-07-31 2018-03-27 微软技术许可有限责任公司 Protection calculates the technology of data in a computing environment
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN107171785A (en) * 2017-05-18 2017-09-15 电子科技大学 A kind of digital copyright management method based on block chain technology
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754254A (en) * 2019-01-11 2019-05-14 北京阿尔山区块链联盟科技有限公司 Key management method, device and electronic equipment
CN111047300A (en) * 2019-12-19 2020-04-21 江西宜月鑫网络科技有限公司 Block chain-based online examination and approval method, terminal and readable storage medium
CN111047300B (en) * 2019-12-19 2023-04-18 深圳天玑数据有限公司 Block chain-based online examination and approval method, terminal and readable storage medium
CN111369731A (en) * 2020-02-25 2020-07-03 上海桔品网络科技有限公司 Intelligent lottery self-service sale system

Similar Documents

Publication Publication Date Title
CA3011600C (en) Information transaction infrastructure
CN108564353A (en) Payment system based on block chain and method
TWI733091B (en) Remittance method and device based on blockchain
CN104603809B (en) Promote the system and method for transaction using virtual card on the mobile apparatus
EP3200138A1 (en) Digital asset conversion
CN108009810A (en) A kind of Trusted Digital transaction in assets method
CN109064172A (en) Cipher key processing method, device and block catenary system
CN104463001A (en) Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key
CN104917614A (en) Bidirectional verification method and device of intelligent card and acceptance terminal
CN110163744A (en) A kind of method of payment and device based on block chain
CN109922084A (en) Key management method, device and electronic equipment
CN108833099A (en) Key generation method, device, key recovery method and device
Bhattacharya et al. A blockchain based peer-to-peer framework for exchanging leftover foreign currency
CN109711986A (en) A kind of token application and award method based on cloud storage plateform system
CN110020841A (en) On a kind of line and ideal money transfer method and its system under line
CN105160776B (en) City one-card card, business platform, card operation system and implementation method
CN106096925A (en) A kind of smart card, the recharge method of a kind of smart card and system
CN108694664A (en) Checking method and device, the electronic equipment of operation system
Muljani et al. The importance of information technology implementation in facing industrial revolution 4.0: Case study of banking industry
CN106030637A (en) Payment settlement system, payment settlement device, transaction terminal, payment management method, and program
CN110414956A (en) Assignment method, device and the server of digital asset
CN111461709B (en) Intelligent financial cross-border payment digital currency solution method based on block chain BaaS platform
CN110245954A (en) Method and apparatus for risk control
CN109829710A (en) Transaction processing method, self-aided terminal, client, mobile terminal, server-side and storage medium
CN107566357A (en) A kind of internet business information data storing method based on subregion authentication techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20220429