CN109064172A - Cipher key processing method, device and block catenary system - Google Patents
Cipher key processing method, device and block catenary system Download PDFInfo
- Publication number
- CN109064172A CN109064172A CN201810851478.3A CN201810851478A CN109064172A CN 109064172 A CN109064172 A CN 109064172A CN 201810851478 A CN201810851478 A CN 201810851478A CN 109064172 A CN109064172 A CN 109064172A
- Authority
- CN
- China
- Prior art keywords
- key
- terminal equipment
- stored
- program code
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
The present invention provides a kind of cipher key processing method, device and block catenary systems, if the cipher key processing method includes: to establish to communicate to connect with the first terminal equipment, the first terminal equipment includes at least: mutually isolated hidden partition and program partition holding, is stored with program code in described program partition holding;Obtain the program code in described program partition holding;Run said program code, itself pre-stored key is grouped shared, packet key dispersion is stored in the hidden partition into the first terminal equipment and multiple second terminal equipment, reach in the terminal device for being stored in program code and being used to disperse storage key, the program code for carrying out key dispersion storage is stored by this offline mode, it is distorted so that program code will not be attacked by the insecurity factor in block catenary system, improves the technical effect of the safety of key.
Description
Technical field
The present invention relates to block chain technical fields, more particularly, to a kind of cipher key processing method, device and block catenary system.
Background technique
Block chain technical application is most extensive at present, and most successful is exactly using bit coin as the digital cash of representative.Recent years
Digital cash have developed rapidly, and due to decentralization, data can not distort and the characteristics of frequently trade, and make it have higher transaction
Circulation value, and the financial derivatives for the property that can be liquidated by exploitation, the price to keep relative stability.
Digital cash wallet is for filling money in ordinary user.This view is wrong, digital cash wallet
It is the tool for filling key.The right of eminent domain for the digital cash for having key that can possess on appropriate address, it can be used to
It pays, transfers accounts, supplement equal financial transactions attribute with money.
Exactly because digital cash wallet possesses payment, transfer accounts, buy, the financial asset attribute of phases, the digital goods such as supplements with money
The safety of coin wallet just seems very important and is highly desirable.The digital cash wallet safety for ensureing user, becomes number
One topic that can't steer clear of of currency industry.
The digital cash wallet safety approach of mainstream currently on the market has following several: one is using library mind as representative
The cold wallet of digital cash, hardware stores the private key of digital cash wallet, and APP product transfers the wallet of hardware by two dimensional code
Signature transaction and confirmation Transaction Information.Second is simple hardware product, and digital cash wallet key storage is in hardware chip
In.The third is previously stored the local side of similar MTK mobile phone, the 4th kind be similar exchange centralization wallet, the number of user
Word currency key storage is in the server of centralization.Above four kinds of schemes have the defects such as key safety is low.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of cipher key processing method, device and block catenary system, to alleviate
The low technical problem of the key safety of digital cash wallet existing in the prior art.
In a first aspect, being applied to block catenary system, the method the embodiment of the invention provides a kind of cipher key processing method
Include:
It is communicated to connect if being established with the first terminal equipment, the first terminal equipment includes at least: mutually isolated
Hidden partition and program partition holding are stored with program code in described program partition holding;Obtain described program partition holding
Interior program code;
Run said program code, itself pre-stored key is grouped it is shared, by packet key disperse store
In hidden partition into the first terminal equipment and multiple second terminal equipment.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein institute
State itself pre-stored key is grouped it is shared, by packet key dispersion store to the first terminal equipment with it is multiple
In hidden partition in second terminal equipment, comprising:
Multiple groupings are split into the key, it is shared to be grouped;
Each preset algorithm that is utilized respectively is carried out using the characteristic information comprising user's own biological identification feature
Encryption, obtains packet key;
Multiple packet keys are stored in the hidden partition of the first terminal equipment and multiple second terminal equipment
In.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein institute
It states and multiple groupings is split into the key, comprising:
The key is subjected to (n, m) group shared, wherein m is that the key splits shared grouping number, and n is also
The minimum packets number of the former key, 3≤n≤m.
With reference to first aspect, the embodiment of the invention provides the third possible embodiments of first aspect, wherein institute
State method further include:
When carrying out digital cash transaction, in the first terminal equipment and multiple second terminal equipment, at least n is obtained
A packet key;
It is decrypted to each of getting the packet key and being utilized respectively preset algorithm;
Packet key after decryption is recombinated, the key is obtained;
It is signed using the transaction data that digital cash described in the key pair is traded, completes digital cash transaction.
With reference to first aspect, the embodiment of the invention provides the 4th kind of possible embodiments of first aspect, wherein institute
State method further include:
The key recovery request of user's input is received, it is special that the identification of user's own biological is carried in the key recovery request
Sign;
In the first terminal equipment and multiple second terminal equipment, the multiple groupings for obtaining key to be restored are close
Key;
Preset algorithm is utilized respectively to each packet key using user's own biological identification feature to solve
It is close;
Packet key after decryption is recombinated, the key is obtained.
With reference to first aspect, the embodiment of the invention provides the 5th kind of possible embodiments of first aspect, wherein institute
It states in the first terminal equipment and multiple second terminal equipment, obtains the quantity of the packet key of key to be restored at least
It is n.
With reference to first aspect, the embodiment of the invention provides the 6th kind of possible embodiments of first aspect, wherein institute
Stating preset algorithm is elliptic curve.
Second aspect, the embodiment of the present invention also provide a kind of key handling device, are applied to block catenary system, described device
Include:
Module is obtained, if communicating to connect for establishing with the first terminal equipment, the first terminal equipment is at least wrapped
Contain: mutually isolated hidden partition and program partition holding is stored with program code in described program partition holding;Described in acquisition
Program code in program partition holding;
Module is run, for running said program code, itself pre-stored key is grouped shared, will be grouped
Key dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
The third aspect, the embodiment of the present invention also provide a kind of block catenary system, including memory, processor, the storage
The computer program that can be run on the processor is stored in device, the processor is realized when executing the computer program
The step of method described in above-mentioned first aspect.
Fourth aspect, the embodiment of the present invention also provide a kind of meter of non-volatile program code that can be performed with processor
Calculation machine readable medium, said program code make the processor execute method described in above-mentioned first aspect.
The embodiment of the present invention bring it is following the utility model has the advantages that the embodiment of the present invention block catenary system with it is described first eventually
End equipment establishes communication connection, the program code in available described program partition holding, and runs said program code, with
Itself pre-stored key is grouped shared, packet key dispersion is stored to the first terminal equipment and multiple the
In hidden partition in two terminal devices.
The embodiment of the present invention can be by making block catenary system read the journey in the program partition holding of first terminal equipment
Sequence code, and by running the program code, realization itself pre-stored key is grouped it is shared, by packet key point
It dissipates in the hidden partition stored into the first terminal equipment and multiple second terminal equipment, since program code is not stored in
In block catenary system, also it is not stored in a network, and be stored in for disperse store key terminal device in, by this
Offline mode stores the program code for carrying out key dispersion storage, so that program code will not be by block catenary system
Insecurity factor attack is distorted, and the safety of key is improved.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims
And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of cipher key processing method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of step S102 in Fig. 1;
Fig. 3 is the flow chart of another cipher key processing method provided in an embodiment of the present invention;
Fig. 4 is the flow chart of another cipher key processing method provided in an embodiment of the present invention;
Fig. 5 is a kind of structure chart of key handling device provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
The digital cash wallet safety approach of mainstream currently on the market has following several: one is using library mind as representative
The cold wallet of digital cash, hardware stores the private key of digital cash wallet, and APP product transfers the wallet of hardware by two dimensional code
Signature transaction and confirmation Transaction Information.Second is simple hardware product, and digital cash wallet key storage is in hardware chip
In.The third is previously stored the local side of similar MTK mobile phone, the 4th kind be similar exchange centralization wallet, the number of user
Word currency key storage is in the server of centralization.Above four kinds of schemes have the defects such as key safety is low, are based on this, this
A kind of cipher key processing method, device and the block catenary system that inventive embodiments provide, can be by making block catenary system read the
Program code in the program partition holding of one terminal device, and by running the program code, itself is stored in advance in realization
Key be grouped shared, packet key dispersion is stored into the first terminal equipment and multiple second terminal equipment
In hidden partition, since program code is not stored in block catenary system, also it is not stored in a network, and be stored in for point
In the terminal device for dissipating storage key, the program code for carrying out key dispersion storage is stored by this offline mode,
It is distorted so that program code will not be attacked by the insecurity factor in block catenary system, improves the safety of key.
For convenient for understanding the present embodiment, first to a kind of cipher key processing method disclosed in the embodiment of the present invention into
Row be discussed in detail, the cipher key processing method can be applied to block catenary system, as shown in Figure 1, the method may include with
Lower step:
Step S101 is communicated to connect if establishing with the first terminal equipment, and the first terminal equipment includes at least: phase
The hidden partition and program partition holding being mutually isolated are stored with program code in described program partition holding;Obtain described program
Program code in partition holding;
Step S102, run said program code, itself pre-stored key is grouped it is shared, by packet key
Dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
In embodiments of the present invention, as shown in Fig. 2, the step S102 may comprise steps of:
Step S201 splits into multiple groupings to the key, shared to be grouped;
In this step, the key can be subjected to (n, m) group shared, wherein m is that key fractionation is shared
Grouping number, n are the minimum packets number for restoring the key, 3≤n≤m.
Step S202, using the characteristic information comprising user's own biological identification feature to it is each be utilized respectively it is default
Algorithm is encrypted, and packet key is obtained;
In embodiments of the present invention, the preset algorithm is elliptic curve, and user's own biological identification feature can be with
It include: the one or more of fingerprint, palmmprint and iris etc..
Multiple packet keys are stored in the first terminal equipment and multiple second terminal equipment by step S203
In hidden partition.
In embodiments of the present invention, any one in multiple packet keys is stored in first terminal equipment, remaining
Packet key can store in different second terminal equipment.
The block catenary system of the embodiment of the present invention is establishing communication connection with the first terminal equipment, available described
Program code in program partition holding, and said program code is run, to be grouped altogether to itself pre-stored key
It enjoys, packet key dispersion is stored in the hidden partition into the first terminal equipment and multiple second terminal equipment.
The embodiment of the present invention can be by making block catenary system read the journey in the program partition holding of first terminal equipment
Sequence code, and by running the program code, realization itself pre-stored key is grouped it is shared, by packet key point
It dissipates in the hidden partition stored into the first terminal equipment and multiple second terminal equipment, since program code is not stored in
In block catenary system, also it is not stored in a network, and be stored in for disperse store key terminal device in, by this
Offline mode stores the program code for carrying out key dispersion storage, so that program code will not be by block catenary system
Insecurity factor attack is distorted, and the safety of key is improved.
On the basis of previous embodiment, if user needs to carry out digital cash transaction, in another implementation of the invention
In example, as shown in figure 3, the method also includes:
Step S301, when carrying out digital cash transaction, in the first terminal equipment and multiple second terminal equipment,
Obtain at least n packet key;
Step S302 is decrypted to each of getting the packet key and being utilized respectively preset algorithm;
In embodiments of the present invention, the preset algorithm is elliptic curve.
Step S303 recombinates the packet key after decryption, obtains the key;
Step S304 is signed using the transaction data that digital cash described in the key pair is traded, and completes digital goods
Coin transaction.
Dispersion can be stored in first terminal when user needs to carry out digital cash transaction through the embodiment of the present invention
Packet key in equipment and multiple second terminal equipment is recombinated, so that the key pair digital cash obtained using recombination is handed over
Easily sign.
On the basis of previous embodiment, if user has found that key is lost, in another embodiment of the present invention, such as Fig. 4
It is shown, the method also includes:
Step S401 receives the key recovery request of user's input, user itself life is carried in the key recovery request
Object identification feature;
Step S402 obtains the more of key to be restored in the first terminal equipment and multiple second terminal equipment
A packet key;
In the first terminal equipment and multiple second terminal equipment, the number of the packet key of key to be restored is obtained
Amount is at least n.
Step S403 is utilized respectively pre- imputation to each packet key using user's own biological identification feature
Method is decrypted;
In embodiments of the present invention, the preset algorithm is elliptic curve.
Step S404 recombinates the packet key after decryption, obtains the key.
Dispersion can be stored in first eventually in user's Lost Security Key, according to key recovery request by the embodiment of the present invention
Packet key in end equipment and multiple second terminal equipment is recombinated, to recover the key of loss
In another embodiment of the present invention, a kind of key handling device is also provided, is applied to block catenary system, such as Fig. 5
Shown, described device includes:
Module 11 is obtained, if communicating to connect for establishing with the first terminal equipment, the first terminal equipment is at least
Include: mutually isolated hidden partition and program partition holding is stored with program code in described program partition holding;Obtain institute
State the program code in program partition holding;
Run module 12, for running said program code, itself pre-stored key is grouped it is shared, will point
Group key dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
The technical effect and preceding method embodiment phase of device provided by the embodiment of the present invention, realization principle and generation
Together, to briefly describe, Installation practice part does not refer to place, can refer to corresponding contents in preceding method embodiment.
In another embodiment of the present invention, a kind of block catenary system, including memory, processor are also provided, it is described to deposit
The computer program that can be run on the processor is stored in reservoir, the processor executes real when the computer program
The step of method described in existing above method embodiment.
In another embodiment of the present invention, a kind of non-volatile program code that can be performed with processor is also provided
Computer-readable medium, said program code make the processor execute method described in above method embodiment.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, section or code of table, a part of the module, section or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually base
Originally it is performed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that
It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule
The dedicated hardware based system of fixed function or movement is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
The computer program product of cipher key processing method, device provided by the embodiment of the present invention and block catenary system, packet
The computer readable storage medium for storing program code is included, the instruction that said program code includes can be used for executing previous methods
Method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also can be indirectly connected through an intermediary
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlyMemory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
Finally, it should be noted that embodiment described above, only a specific embodiment of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, those skilled in the art should understand that: anyone skilled in the art
In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention
Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of cipher key processing method, which is characterized in that be applied to block catenary system, which comprises
It is communicated to connect if being established with first terminal equipment, the first terminal equipment includes at least: mutually isolated hidden partition
With program partition holding, program code is stored in described program partition holding;Obtain the program in described program partition holding
Code;
Run said program code, itself pre-stored key is grouped it is shared, by packet key dispersion store to institute
It states in the hidden partition in first terminal equipment and multiple second terminal equipment.
2. cipher key processing method according to claim 1, which is characterized in that described to be carried out to itself pre-stored key
Packet key dispersion is stored the hidden partition into the first terminal equipment and multiple second terminal equipment by group shared
It is interior, comprising:
Multiple groupings are split into the key, it is shared to be grouped;
Each preset algorithm that is utilized respectively is encrypted using the characteristic information comprising user's own biological identification feature,
Obtain packet key;
Multiple packet keys are stored in the hidden partition of the first terminal equipment and multiple second terminal equipment.
3. cipher key processing method according to claim 2, which is characterized in that described to split into multiple points to the key
Group, comprising:
The key is subjected to (n, m) group shared, wherein m is that the key splits shared grouping number, and n is reduction institute
State the minimum packets number of key, 3≤n≤m.
4. cipher key processing method according to claim 3, which is characterized in that the method also includes:
When carrying out digital cash transaction, in the first terminal equipment and multiple second terminal equipment, at least n points are obtained
Group key;
It is decrypted to each of getting the packet key and being utilized respectively preset algorithm;
Packet key after decryption is recombinated, the key is obtained;
It is signed using the transaction data that digital cash described in the key pair is traded, completes digital cash transaction.
5. cipher key processing method according to claim 3, which is characterized in that the method also includes:
The key recovery request of user's input is received, carries user's own biological identification feature in the key recovery request;
In the first terminal equipment and multiple second terminal equipment, multiple packet keys of key to be restored are obtained;
Preset algorithm is utilized respectively to each packet key using user's own biological identification feature to be decrypted;
Packet key after decryption is recombinated, the key is obtained.
6. cipher key processing method according to claim 5, which is characterized in that described in the first terminal equipment and multiple
In second terminal equipment, the quantity for obtaining the packet key of key to be restored is at least n.
7. cipher key processing method according to claim 6, which is characterized in that the preset algorithm is elliptic curve.
8. a kind of key handling device, which is characterized in that be applied to block catenary system, described device includes:
Obtain module, if communicating to connect for establishing with first terminal equipment, the first terminal equipment included at least: mutually every
From hidden partition and program partition holding, be stored with program code in described program partition holding;Obtain described program storage
Program code in subregion;
Run module, for running said program code, itself pre-stored key is grouped it is shared, by packet key
Dispersion stores in the hidden partition into the first terminal equipment and multiple second terminal equipment.
9. a kind of block catenary system, including memory, processor, it is stored with and can runs on the processor in the memory
Computer program, which is characterized in that the processor realizes the claims 1 to 7 when executing the computer program
The step of method described in one.
10. a kind of computer-readable medium for the non-volatile program code that can be performed with processor, which is characterized in that described
Program code makes the processor execute described any the method for claim 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810851478.3A CN109064172A (en) | 2018-07-27 | 2018-07-27 | Cipher key processing method, device and block catenary system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810851478.3A CN109064172A (en) | 2018-07-27 | 2018-07-27 | Cipher key processing method, device and block catenary system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109064172A true CN109064172A (en) | 2018-12-21 |
Family
ID=64831441
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810851478.3A Pending CN109064172A (en) | 2018-07-27 | 2018-07-27 | Cipher key processing method, device and block catenary system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109064172A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754254A (en) * | 2019-01-11 | 2019-05-14 | 北京阿尔山区块链联盟科技有限公司 | Key management method, device and electronic equipment |
CN111047300A (en) * | 2019-12-19 | 2020-04-21 | 江西宜月鑫网络科技有限公司 | Block chain-based online examination and approval method, terminal and readable storage medium |
CN111369731A (en) * | 2020-02-25 | 2020-07-03 | 上海桔品网络科技有限公司 | Intelligent lottery self-service sale system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009147817A1 (en) * | 2008-06-02 | 2009-12-10 | 株式会社バッファロー | Authentication system, information processing apparatus, storage apparatus, authentication method and program |
CN103617404A (en) * | 2013-12-17 | 2014-03-05 | 天津赢达信科技有限公司 | Storing device of safety partitions |
CN104090853A (en) * | 2014-07-03 | 2014-10-08 | 武汉迅存科技有限公司 | Solid-state disc encryption method and system |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN107171785A (en) * | 2017-05-18 | 2017-09-15 | 电子科技大学 | A kind of digital copyright management method based on block chain technology |
CN107623569A (en) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | Block chain key escrow and restoration methods, device based on Secret sharing techniques |
CN107851167A (en) * | 2015-07-31 | 2018-03-27 | 微软技术许可有限责任公司 | Protection calculates the technology of data in a computing environment |
CN108235772A (en) * | 2017-12-29 | 2018-06-29 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, storage medium and electronic equipment based on block chain |
-
2018
- 2018-07-27 CN CN201810851478.3A patent/CN109064172A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009147817A1 (en) * | 2008-06-02 | 2009-12-10 | 株式会社バッファロー | Authentication system, information processing apparatus, storage apparatus, authentication method and program |
CN103617404A (en) * | 2013-12-17 | 2014-03-05 | 天津赢达信科技有限公司 | Storing device of safety partitions |
CN104090853A (en) * | 2014-07-03 | 2014-10-08 | 武汉迅存科技有限公司 | Solid-state disc encryption method and system |
CN107851167A (en) * | 2015-07-31 | 2018-03-27 | 微软技术许可有限责任公司 | Protection calculates the technology of data in a computing environment |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN107171785A (en) * | 2017-05-18 | 2017-09-15 | 电子科技大学 | A kind of digital copyright management method based on block chain technology |
CN107623569A (en) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | Block chain key escrow and restoration methods, device based on Secret sharing techniques |
CN108235772A (en) * | 2017-12-29 | 2018-06-29 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, storage medium and electronic equipment based on block chain |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754254A (en) * | 2019-01-11 | 2019-05-14 | 北京阿尔山区块链联盟科技有限公司 | Key management method, device and electronic equipment |
CN111047300A (en) * | 2019-12-19 | 2020-04-21 | 江西宜月鑫网络科技有限公司 | Block chain-based online examination and approval method, terminal and readable storage medium |
CN111047300B (en) * | 2019-12-19 | 2023-04-18 | 深圳天玑数据有限公司 | Block chain-based online examination and approval method, terminal and readable storage medium |
CN111369731A (en) * | 2020-02-25 | 2020-07-03 | 上海桔品网络科技有限公司 | Intelligent lottery self-service sale system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3011600C (en) | Information transaction infrastructure | |
CN108564353A (en) | Payment system based on block chain and method | |
TWI733091B (en) | Remittance method and device based on blockchain | |
CN104603809B (en) | Promote the system and method for transaction using virtual card on the mobile apparatus | |
EP3200138A1 (en) | Digital asset conversion | |
CN108009810A (en) | A kind of Trusted Digital transaction in assets method | |
CN109064172A (en) | Cipher key processing method, device and block catenary system | |
CN104463001A (en) | Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key | |
CN104917614A (en) | Bidirectional verification method and device of intelligent card and acceptance terminal | |
CN110163744A (en) | A kind of method of payment and device based on block chain | |
CN109922084A (en) | Key management method, device and electronic equipment | |
CN108833099A (en) | Key generation method, device, key recovery method and device | |
Bhattacharya et al. | A blockchain based peer-to-peer framework for exchanging leftover foreign currency | |
CN109711986A (en) | A kind of token application and award method based on cloud storage plateform system | |
CN110020841A (en) | On a kind of line and ideal money transfer method and its system under line | |
CN105160776B (en) | City one-card card, business platform, card operation system and implementation method | |
CN106096925A (en) | A kind of smart card, the recharge method of a kind of smart card and system | |
CN108694664A (en) | Checking method and device, the electronic equipment of operation system | |
Muljani et al. | The importance of information technology implementation in facing industrial revolution 4.0: Case study of banking industry | |
CN106030637A (en) | Payment settlement system, payment settlement device, transaction terminal, payment management method, and program | |
CN110414956A (en) | Assignment method, device and the server of digital asset | |
CN111461709B (en) | Intelligent financial cross-border payment digital currency solution method based on block chain BaaS platform | |
CN110245954A (en) | Method and apparatus for risk control | |
CN109829710A (en) | Transaction processing method, self-aided terminal, client, mobile terminal, server-side and storage medium | |
CN107566357A (en) | A kind of internet business information data storing method based on subregion authentication techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20220429 |