CN109257336B - Block chain-based password information processing method and terminal equipment - Google Patents

Block chain-based password information processing method and terminal equipment Download PDF

Info

Publication number
CN109257336B
CN109257336B CN201810974088.5A CN201810974088A CN109257336B CN 109257336 B CN109257336 B CN 109257336B CN 201810974088 A CN201810974088 A CN 201810974088A CN 109257336 B CN109257336 B CN 109257336B
Authority
CN
China
Prior art keywords
information
account information
block chain
access request
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810974088.5A
Other languages
Chinese (zh)
Other versions
CN109257336A (en
Inventor
刘旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810974088.5A priority Critical patent/CN109257336B/en
Publication of CN109257336A publication Critical patent/CN109257336A/en
Application granted granted Critical
Publication of CN109257336B publication Critical patent/CN109257336B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a cipher information processing method based on a block chain and terminal equipment. The method comprises the following steps: acquiring account information determined by a first user; sending an access request to a block chain, wherein the access request carries the account information and the digital signature so that the block chain can carry out consensus verification on the access request; and receiving a consensus result which is a query result returned by the block chain when the consensus result passes, wherein the query result carries password information corresponding to the account information. Therefore, the operations of recording and inquiring the password information can be completed by the block chain, and the aim of saving the user from recording the password information is fulfilled.

Description

Block chain-based password information processing method and terminal equipment
Technical Field
The invention relates to the field of terminals, in particular to a cipher information processing method based on a block chain and terminal equipment.
Background
With the continuous development of the internet, more and more products such as software, websites and the like are contacted by a user, and accordingly, more and more account information and password information of the user are required to be applied and recorded.
When a user needs to use a certain product, whether the user uses the account information and the password information of the user or uses the account information and the password information shared by other users, the user needs to spend a certain time for inquiring in advance.
Therefore, there is a need to provide an efficient cryptographic information processing scheme.
Disclosure of Invention
The embodiment of the invention provides a cipher information processing method based on a block chain, which aims to solve the problem that a user needs to record cipher information.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, a method for processing cipher information based on a block chain is provided, where the method includes:
acquiring account information determined by a first user;
sending an access request to a block chain, wherein the access request carries the account information and the digital signature so that the block chain can carry out consensus verification on the access request;
and receiving a consensus result which is a query result returned by the block chain when the consensus result passes, wherein the query result carries password information corresponding to the account information.
In a second aspect, a method for processing cipher information based on a block chain is also provided, where the method includes:
determining account information and password information corresponding to the account information;
and sending an access request to a block chain, wherein the access request carries the account information, the password information and a digital signature, so that the block chain writes the account information and the password information into a block under the condition that the block chain determines that the access request passes consensus verification.
In a third aspect, a terminal device is provided, which includes:
the acquisition module is used for acquiring account information determined by a first user;
the sending module is used for sending an access request to a block chain, wherein the access request carries the account information and the digital signature so that the block chain can carry out consensus verification on the access request;
and the receiving module is used for receiving a query result returned by the block chain when the consensus result is passed, wherein the query result carries the password information corresponding to the account information.
In a fourth aspect, a terminal device is further provided, where the terminal device includes:
the determining module is used for determining account information and password information corresponding to the account information;
the sending module is configured to send an access request to a blockchain, where the access request carries the account information, the password information, and a digital signature, so that the blockchain writes the account information and the password information into a block when it is determined that the access request passes consensus verification.
In a fifth aspect, a terminal device is provided, the terminal device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method according to the first aspect.
A sixth aspect provides a computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to the first aspect.
In the embodiment of the invention, the account information and the password information thereof are written into the block chain by all users of the account information, so that when all users of the account information or other users need the password information corresponding to the account information, the password information can be directly acquired from the block chain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1a and 1b are schematic structural diagrams of application scenarios provided by the present invention;
fig. 2 is a flowchart illustrating a method for processing cipher information based on a block chain according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a method for processing cipher information based on a block chain according to another embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for processing cipher information based on a block chain according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal device according to another embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal device according to yet another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As stated in the background section, when a user needs password information corresponding to account information, the user generally queries all users of the account information or checks previously recorded password information to obtain the password information corresponding to the account information. Therefore, whether the password is recorded in advance or queried at the moment, the user needs to spend much time to acquire the password information, and the password information is inconvenient.
Based on the above, the invention provides a cipher information processing method based on a block chain, which is characterized in that account information and cipher information thereof are written into the block chain by all users of the account information, so that when all users of the account information or other users need the cipher information corresponding to the account information, the cipher information can be directly acquired from the block chain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
All users of the account information are users with the account information management authority.
The following provides an exemplary description of an application scenario of the present invention with reference to the drawings.
Referring to fig. 1a, a first application scenario includes: blockchain 110 and terminal device 120, wherein:
the terminal device 120 is configured to write account information and password information thereof into the blockchain 110 (write process), and read password information of some account information from the blockchain 110 (read process).
The writing process comprises the following steps: a user initiates a write access request to a block chain node (for example: node 1 as a server) through a program on the terminal device 120, wherein the write access request is used for requesting to write account information and password information of a certain application into a block;
and the node 1 initiates a first transaction request to the blockchain based on the access request, performs consensus verification on the access request by the consensus node on the blockchain, and writes the account information and the password information into the block if the consensus verification result is passed.
The reading process comprises the following steps: a user initiates a read access request to the node 1 through the terminal device 120, where the read access request is used to request to read password information corresponding to certain account information, and the account information may be previously written into a block chain by the user;
based on the read access request, the node 1 initiates a second transaction request to the blockchain, performs consensus verification on the access request by the consensus node on the blockchain, and returns the password information corresponding to the account information to the terminal device 120 if the consensus verification result is passed.
Referring to fig. 1b, the second application scenario includes: blockchain 110, terminal device 120, and terminal device 130, wherein:
the terminal device 120 is configured to initiate a write access request to the block chain 110 to write account information and password information thereof (write process);
the block chain is used for performing consensus verification on the write access request of the terminal device 120 and responding to the write access request according to a consensus verification result;
the terminal device 130 is configured to initiate a read access request to the blockchain 110 to read password information (read process) corresponding to certain account information, where the account information may be written into the blockchain by another user before.
Since the writing process and the reading process are respectively similar to the writing process and the reading process of the first application scenario, the writing process and the reading process of the application scenario are not repeated here.
The terminal equipment can be a mobile terminal, and can also be terminals such as a desktop computer and the like outside the mobile terminal; the mobile terminal or called mobile communication terminal refers to a computer device which can be used in mobile, and broadly includes a mobile phone, a notebook, a tablet computer, a POS machine, and even a vehicle-mounted computer. But most often refer to cell phones or smart phones and tablets with multiple application functions.
The blockchain can be a private chain or a public chain, encrypts transaction information in a transaction block through a hash algorithm, and compresses the information into a hash character string consisting of a string of numbers and letters. The hash value of the block chain can uniquely and accurately identify one block, any node in the block chain can obtain the hash value of the block through simple hash calculation, and the fact that the calculated hash value is not changed means that information in the block is not tampered.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 2 is a flowchart illustrating a method for processing cipher information based on a block chain according to an embodiment of the present invention, where the method may be executed by the terminal device 120 in fig. 1a or fig. 1b, and with reference to fig. 2, the method may specifically include the following steps:
step 220, obtaining account information determined by the first user;
step 240, sending an access request to a blockchain, where the access request carries the account information and the digital signature, so that the blockchain performs consensus verification on the access request;
and step 260, receiving a query result returned by the block chain when the consensus result is passed, wherein the query result carries the password information corresponding to the account information.
The password information may be configured and submitted for uplink by a second user, and the second user may have a management authority of the account information.
As can be seen from the application scenarios corresponding to fig. 1a and fig. 1b, the first user and the second user may be the same user or different users. These two cases are explained in detail below:
case 1, the first user and the second user are different users
With reference to fig. 1b, the account information is identification information of a second user shared object, where the shared object includes: the router comprises a WIFI network, a WLAN network and the like, wherein identification information of the WIFI network and the WLAN network is a physical address of the router.
Therefore, after the user with the shared object management authority shares the shared object, other users can search the password information of the shared object through the blockchain, and use the shared object based on the account information and the password information without inquiring or searching the password information on site, so that the time of the user is saved.
Case 2, the first user and the second user are the same user
With reference to fig. 1a, the account information is identification information of an unshared object of the second user, where the unshared object includes: website access credentials, and the like, and the identification information is a user name.
Therefore, the user writes the password information corresponding to the account information into the block chain, so that the terminal equipment reads the corresponding password information from the block chain during subsequent login and completes login, the user is not required to record the password information, and the time of the user is saved.
Further, when the non-shared object is a website access certificate, the access request also carries a website identifier, so that the blockchain determines the password information of the user name on the website.
Therefore, the user can write the website access certificate of each website into the block chain, and when accessing a certain website, the user can inquire the password information corresponding to the website from the block chain, so that the complicated process of recording the password information of each website by the user is omitted.
Optionally, after the terminal device receives the password information, the embodiment further discloses an account login step, and one implementation manner of the account login step may be:
the terminal equipment automatically initiates a login request to a corresponding server based on account information input by a user and password information returned by the blockchain so as to complete login.
In the process, the operation that the user records the password information and inputs the password information into the input box is not needed, so that the time of the user can be further saved.
It can be seen that, in this embodiment, by writing the account information and the password information thereof into the block chain by all users of the account information, when all users of the account information or other users need the password information corresponding to the account information, the account information and the password information can be directly acquired from the block chain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
Fig. 3 is a schematic flowchart of a method for processing cipher information based on a block chain according to another embodiment of the present invention, which refers to fig. 3, and specifically includes the following steps:
step 32, the first terminal device sends a write access request to the blockchain;
the write access request carries the digital signature, the account information and the password information of the first terminal device, and is used for requesting to write the account information and the password information into the block.
Step 34, the block chain performs consensus verification on the write access request and judges whether the write access request passes the consensus verification;
if not, go to step 36; if yes, go to step 38;
step 36, the blockchain returns prompt information of verification failure to the first terminal device;
step 38, the block chain writes the account information and the password information into the block.
Step 310, the second terminal device sends a read access request to the block chain;
the read access request carries a digital signature and account information of the second terminal device and is used for requesting password information corresponding to the account information.
Step 312, the block chain performs consensus verification on the read access request, and determines whether the consensus verification is passed;
if not, go to step 314; if yes, go to step 316;
step 314, the block chain sends prompt information of verification failure to the second terminal device;
and step 316, the block chain sends the password information to the second terminal equipment.
In conjunction with the application scenario corresponding to fig. 1a, it is understood that the first terminal device and the second terminal device may be the same terminal device.
With reference to the application scenario corresponding to fig. 1b, it is understood that the first terminal device and the second terminal device may be different terminal devices, and the first terminal device is a terminal device of a user having the account information management authority, and the second terminal device is another terminal device.
As can be seen, in this embodiment, a write access request is initiated to the blockchain by the first terminal device, so as to write the account information and the password information thereof into the blockchain, so that when all users of the account information or other users need the password information corresponding to the account information, a read access request is initiated by the second terminal device to obtain the account information from the blockchain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
Fig. 4 is a flowchart illustrating a method for processing cipher information based on a block chain according to another embodiment of the present invention, which may be executed by the terminal device 120 in fig. 1a or the terminal device 130 in fig. 1b, and specifically includes the following steps:
step 420, determining account information and password information corresponding to the account information;
step 440, sending an access request to the blockchain, where the access request carries the account information, the password information, and the digital signature, so that the blockchain writes the account information and the password information into a block when determining that the access request passes the consensus verification.
Step 420 and step 440 are not described herein again because the implementation of step 420 and step 440 has been described in the embodiment corresponding to fig. 2 and fig. 3.
Optionally, in order to avoid that a certain user or some users occupy too many resources corresponding to the account information, this embodiment further includes:
the terminal equipment sends another access request to the blockchain, wherein the access request carries an access rule set by a user with the account information management authority;
the block chain carries out consensus verification on the access request, and if the result of the consensus verification is passed, the access rule is allowed to be written into the block;
the block chain sends the password information to a certain terminal device and also sends the identifier of the terminal device to a resource management device;
the resource management device monitors the access state of each accessed terminal device and limits each terminal device based on the access rule.
Taking account information as identification information of the WIFI network resource, taking the resource management device as a router as an example, the access rule is as follows: when the data traffic used by a certain terminal device is greater than a preset threshold, restricting the access of the terminal device, for example: limiting its wire speed. Alternatively, the first and second electrodes may be,
taking account information as an identifier of a website access certificate resource, taking a resource management device as a website server as an example, the access rule is as follows: when the time length of occupying the account information after a certain terminal device logs in is greater than a predetermined threshold, restricting the access of the terminal device, for example: the login is not allowed within a predetermined time.
In addition, in order to avoid the influence on the user with the account information management authority, a terminal device white list can be set, the white list stores the identification of the terminal device added by the user, and the white list and the access rule are written into the block chain together. Therefore, the resource management device does not limit the terminal equipment corresponding to the terminal equipment identification in the white list.
It can be seen that, in this embodiment, by writing the account information and the password information thereof into the block chain by all users of the account information, when all users of the account information or other users need the password information corresponding to the account information, the account information and the password information can be directly acquired from the block chain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
In addition, for simplicity of explanation, the above-described method embodiments are described as a series of acts or combinations, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts or steps described, as some steps may be performed in other orders or simultaneously according to the present invention. Furthermore, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention, and referring to fig. 5, the apparatus may specifically include: an obtaining module 51, a sending module 52 and a receiving module 53, wherein:
an obtaining module 51, configured to obtain account information determined by a first user;
a sending module 52, configured to send an access request to a blockchain, where the access request carries the account information and the digital signature, so that the blockchain performs consensus verification on the access request;
and the receiving module 53 is configured to receive a query result returned by the block chain when the consensus result passes, where the query result carries password information corresponding to the account information.
Optionally, the password information is configured and submitted to uplink by the second user.
Optionally, the account information is identification information of a second user shared object.
Optionally, the shared object includes: a WIFI network;
wherein, the identification information is the physical address of the router.
Optionally, the account information is identification information of a first user non-shared object.
Optionally, the non-shared object includes: a website access credential;
and the identification information is a user name.
Optionally, the access request further carries a website identifier, so that the blockchain determines password information of the user name on the website.
Fig. 6 is a schematic structural diagram of a terminal device according to another embodiment of the present invention, and referring to fig. 6, the apparatus may specifically include: a determination module 61 and a sending module 62, wherein:
the determining module 61 is configured to determine account information and password information corresponding to the account information;
a sending module 62, configured to send an access request to the blockchain, where the access request carries the account information, the password information, and a digital signature, so that the blockchain writes the account information and the password information into a block when it is determined that the access request passes the consensus verification.
Fig. 5 and 6 describe the manner in which the password information is processed from the perspective of the terminal device that reads the password information and the terminal device that writes the password information, respectively. It can be seen that, in this embodiment, by writing the account information and the password information thereof into the block chain by all users of the account information, when all users of the account information or other users need the password information corresponding to the account information, the account information and the password information can be directly acquired from the block chain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
In addition, as for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to part of the description of the method embodiment. Further, it should be noted that, among the respective components of the apparatus of the present invention, the components thereof are logically divided according to the functions to be realized, but the present invention is not limited thereto, and the respective components may be newly divided or combined as necessary.
Fig. 7 is a schematic structural diagram of a terminal device according to another embodiment of the present invention, where the terminal device 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 110 is configured to obtain account information determined by a first user;
sending an access request to a block chain, wherein the access request carries the account information and the digital signature so that the block chain can carry out consensus verification on the access request;
and receiving a consensus result which is a query result returned by the block chain when the consensus result passes, wherein the query result carries password information corresponding to the account information. Alternatively, the first and second electrodes may be,
the processor 110 is configured to determine account information and password information corresponding to the account information;
and sending an access request to a block chain, wherein the access request carries the account information, the password information and a digital signature, so that the block chain writes the account information and the password information into a block under the condition that the block chain determines that the access request passes consensus verification.
Therefore, the account information and the password information thereof are written into the block chain by all users of the account information, so that when all users of the account information or other users need the password information corresponding to the account information, the password information can be directly acquired from the block chain. Compared with the scheme in the prior art that password information needs to be recorded or password information of all users of an account needs to be inquired, the time for the users to acquire the password information can be effectively saved, and the password information acquisition efficiency is improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 7, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 is an interface through which an external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
In addition, the mobile terminal 100 includes some functional modules that are not shown, and thus, the detailed description thereof is omitted.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above embodiment of the block chain-based cryptographic information processing method, and can achieve the same technical effect, and is not described herein again to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (11)

1. A method for processing cipher information based on block chain is characterized in that the method comprises the following steps:
acquiring account information determined by a first user;
sending an access request to a block chain, wherein the access request carries the account information and the digital signature so that the block chain can carry out consensus verification on the access request;
receiving a consensus result which is a query result returned by the block chain when the consensus result passes, wherein the query result carries password information corresponding to the account information;
the account information comprises identification information of the first user non-shared object.
2. The method of claim 1 wherein the password information is configured and submitted for uplink by a second user.
3. The method according to claim 2, wherein the account information is identification information of a second user sharing object.
4. The method of claim 3, wherein the shared object comprises: a WIFI network;
wherein, the identification information is the physical address of the router.
5. The method of claim 1, wherein the unshared object comprises: a website access credential;
and the identification information is a user name.
6. The method of claim 5, wherein the access request further carries a website identification for the blockchain to determine password information of the username on the website.
7. A method for processing cipher information based on block chain is characterized in that the method comprises the following steps:
determining account information and password information corresponding to the account information;
sending an access request to a block chain, wherein the access request carries the account information, the password information and a digital signature, so that the block chain writes the account information and the password information into a block under the condition that the access request is determined to pass consensus verification;
the account information comprises identification information of the first user non-shared object.
8. A terminal device, comprising:
the acquisition module is used for acquiring account information determined by a first user;
the sending module is used for sending an access request to a block chain, wherein the access request carries the account information and the digital signature so that the block chain can carry out consensus verification on the access request;
the receiving module is used for receiving a consensus result which is a query result returned by the block chain when the consensus result passes, wherein the query result carries password information corresponding to the account information;
the account information comprises identification information of the first user non-shared object.
9. A terminal device, comprising:
the determining module is used for determining account information and password information corresponding to the account information;
a sending module, configured to send an access request to a blockchain, where the access request carries the account information, the password information, and a digital signature, so that the blockchain writes the account information and the password information into a block when it is determined that the access request passes consensus verification;
the account information comprises identification information of the first user non-shared object.
10. A terminal device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 7.
11. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN201810974088.5A 2018-08-24 2018-08-24 Block chain-based password information processing method and terminal equipment Active CN109257336B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810974088.5A CN109257336B (en) 2018-08-24 2018-08-24 Block chain-based password information processing method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810974088.5A CN109257336B (en) 2018-08-24 2018-08-24 Block chain-based password information processing method and terminal equipment

Publications (2)

Publication Number Publication Date
CN109257336A CN109257336A (en) 2019-01-22
CN109257336B true CN109257336B (en) 2021-03-16

Family

ID=65049473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810974088.5A Active CN109257336B (en) 2018-08-24 2018-08-24 Block chain-based password information processing method and terminal equipment

Country Status (1)

Country Link
CN (1) CN109257336B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2019204712B2 (en) * 2019-03-29 2020-08-13 Advanced New Technologies Co., Ltd. Managing sensitive data elements in a blockchain network
CN109905408B (en) * 2019-04-10 2021-07-13 广州大学 Network security protection method, system, readable storage medium and terminal equipment
CN110071813B (en) * 2019-04-30 2021-10-01 杭州复杂美科技有限公司 Account permission changing method and system, account platform and user terminal
CN110247758B (en) * 2019-05-30 2023-03-24 天翼数字生活科技有限公司 Password management method and device and password manager
CN112448928B (en) * 2019-08-31 2022-04-05 华为技术有限公司 Credential obtaining method and device
CN114448639B (en) * 2021-12-15 2022-12-06 电子科技大学 Decentralized identity system with uniqueness and secret key safety and implementation method
CN114679264B (en) * 2022-03-16 2023-12-08 亚信科技(成都)有限公司 Password generation method, device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458019A (en) * 2013-08-26 2013-12-18 深圳Tcl新技术有限公司 Method for sharing operating parameters between terminals, server and terminals
CN106487798A (en) * 2016-10-25 2017-03-08 广东欧珀移动通信有限公司 Method of data synchronization and device
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
WO2017152150A1 (en) * 2016-03-04 2017-09-08 ShoCard, Inc. Method and system for authenticated login using static or dynamic codes
CN107767926A (en) * 2017-11-15 2018-03-06 中国联合网络通信集团有限公司 Medical data management system and access method based on block chain
CN108241979A (en) * 2017-12-20 2018-07-03 深圳壹账通智能科技有限公司 More account book transfer account methods, electronic device and readable storage medium storing program for executing based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458019A (en) * 2013-08-26 2013-12-18 深圳Tcl新技术有限公司 Method for sharing operating parameters between terminals, server and terminals
WO2017152150A1 (en) * 2016-03-04 2017-09-08 ShoCard, Inc. Method and system for authenticated login using static or dynamic codes
CN106487798A (en) * 2016-10-25 2017-03-08 广东欧珀移动通信有限公司 Method of data synchronization and device
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN107767926A (en) * 2017-11-15 2018-03-06 中国联合网络通信集团有限公司 Medical data management system and access method based on block chain
CN108241979A (en) * 2017-12-20 2018-07-03 深圳壹账通智能科技有限公司 More account book transfer account methods, electronic device and readable storage medium storing program for executing based on block chain

Also Published As

Publication number Publication date
CN109257336A (en) 2019-01-22

Similar Documents

Publication Publication Date Title
CN109257336B (en) Block chain-based password information processing method and terminal equipment
CN109525707B (en) Audio playing method, mobile terminal and computer readable storage medium
KR102107132B1 (en) Access point connection method of electronic apparatus and electronic appparatus thereof
CN108279948B (en) Application program starting method and mobile terminal
CN108901020B (en) Network access method, mobile terminal and server
CN111049980A (en) Application sharing method, electronic equipment and computer readable storage medium
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN111163449B (en) Application sharing method, first electronic device and computer-readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN107358083B (en) Information processing method, terminal and computer readable storage medium
CN110287719B (en) File encryption method and mobile terminal
CN109639706B (en) Request processing method, server, client, system, electronic device and computer readable storage medium
CN111131607A (en) Information sharing method, electronic equipment and computer readable storage medium
CN112612552B (en) Application resource loading method and device, electronic equipment and readable storage medium
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN111163227B (en) Sharing method and electronic equipment
CN109451011B (en) Information storage method based on block chain and mobile terminal
CN111556178A (en) Analytic system, method, equipment and storage medium
CN111159738A (en) Permission configuration method, application login method and device
CN110851408A (en) File compression method, file decompression method and electronic equipment
CN110995816B (en) Sharing method and electronic device
CN110717163B (en) Interaction method and terminal equipment
CN109257441B (en) Wireless local area network position acquisition method and device
CN109246290B (en) Authority management method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant