CN109272317A - Block chain private key obtaining method and device and electronic equipment - Google Patents
Block chain private key obtaining method and device and electronic equipment Download PDFInfo
- Publication number
- CN109272317A CN109272317A CN201811133232.9A CN201811133232A CN109272317A CN 109272317 A CN109272317 A CN 109272317A CN 201811133232 A CN201811133232 A CN 201811133232A CN 109272317 A CN109272317 A CN 109272317A
- Authority
- CN
- China
- Prior art keywords
- target
- answer
- block chain
- private key
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
Abstract
The embodiment of the invention provides a method and a device for acquiring a block chain private key and electronic equipment, wherein the method comprises the following steps: obtaining an obtaining request for obtaining a block chain private key corresponding to a target user, wherein the obtaining request comprises: a user identification of the target user; determining a target question and a target answer corresponding to the target question based on the user identification; obtaining a to-be-verified answer corresponding to the target question; judging whether a target answer corresponding to the target question is matched with a to-be-verified answer corresponding to the target question; and when the target answer corresponding to the target question is judged to be matched with the to-be-verified answer corresponding to the target question, obtaining a block chain private key, and displaying the block chain private key to the target user. So as to ensure the security of the private key of the block chain.
Description
Technical field
The present invention relates to block chain technical fields, more particularly to acquisition methods, device and the electricity of a kind of block chain private key
Sub- equipment.
Background technique
In block chain technical field, block chain private key is that user obtains to the assets in virtual wallet, such as bit coin
The right of eminent domain important documents.Who possesses block chain private key, just possesses what the corresponding virtual wallet of block chain private key was managed
The right of eminent domain of assets.As it can be seen that guaranteeing the safety of block chain private key, i.e., for guaranteeing in virtual wallet for the safety of assets
It is most important to guarantee that block chain private key is not easy to be stolen.
So, the safe acquisition methods for how providing a kind of block chain private key become urgent problem to be solved.
Summary of the invention
Acquisition methods, device and the electronic equipment for being designed to provide a kind of block chain private key of the embodiment of the present invention, with
Realize the safety for guaranteeing block chain private key.Specific technical solution is as follows:
On the one hand, the embodiment of the invention provides a kind of acquisition methods of block chain private key, which comprises
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes:
The user identifier of the target user;
Based on the user identifier of the target user, determine that target problem and the corresponding target of the target problem are answered
Case;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem,
The block chain private key is obtained, and shows the block chain private key to the target user.
Optionally, the step of acquisition request obtained for obtaining the corresponding block chain private key of target user, comprising:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user
It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
Optionally, before the acquisition block chain private key the step of, the method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem,
Obtain encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: for the encrypted block chain private key to be decrypted
Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
Optionally, the target problem is the first quantity;
It is in the judgement corresponding target answer of target problem and the corresponding answer to be verified of the target problem
Before the step of no matching, the method also includes:
Detection device environment obtains testing result;
It is described to judge whether are the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem
The step of matching, comprising:
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to
Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute
State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem
Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot
Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same
When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second
Quantity is less than first quantity.
Optionally, in the user identifier based on the target user, target problem and the target problem are determined
Before the step of corresponding target answer, the method also includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine what the target user chose from problem to be set
Problem to be placed, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, the target problem and the corresponding target of the target problem are recorded
Answer.
Optionally, before the displaying problem to be placed the step of, the method also includes:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown
Problem to be placed.
On the other hand, the embodiment of the invention provides a kind of acquisition device of block chain private key, described device includes:
First obtains module, for obtaining the acquisition request for obtaining the corresponding block chain private key of target user, wherein
The acquisition request includes: the user identifier of the target user;
First determining module determines target problem and the target for the user identifier based on the target user
The corresponding target answer of problem;
Second obtains module, for obtaining the corresponding answer to be verified of the target problem;
Judgment module, for judging that the corresponding target answer of the target problem is corresponding with the target problem to be verified
Whether answer matches;
Display module is obtained, judges that the corresponding target answer of the target problem and the target problem are corresponding for working as
When answer matches to be verified, the block chain private key is obtained, and show the block chain private key to the target user.
Optionally, described first module is obtained, be specifically used for
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user
It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
Optionally, described device further include:
Third obtains module, for it is described obtain the block chain private key before, when judge the target problem correspondence
Target answer and the target problem corresponding answer matches to be verified when, obtain encrypted block chain private key;
4th obtains module, for obtaining target cipher key, wherein the target cipher key are as follows: for encrypted described
The key that block chain private key is decrypted;
The acquisition display module, is specifically used for
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key,
And the block chain private key is shown to the target user.
Optionally, the target problem is the first quantity;
Described device further include:
Detection module, for corresponding in the judgement corresponding target answer of target problem and the target problem
Before whether answer to be verified matches, detection device environment obtains testing result;
The judgment module, is specifically used for
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to
Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute
State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem
Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot
Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same
When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second
Quantity is less than first quantity.
Optionally, described device further include:
Display module, for determining target problem and the mesh in the user identifier based on the target user
Before the corresponding target answer of mark problem, problem to be placed is shown;
Second determining module is determined from problem to be set for the selection instruction based on the target user
The problem to be placed that the target user chooses, as target problem;
5th obtains module, for obtaining the target answer for being directed to target problem setting;
Logging modle records the target problem and the target for being directed to the user identifier of the target user
The corresponding target answer of problem.
Optionally, described device further include:
Receiving module, for receiving the offering question of target user's triggering before the displaying problem to be placed
Instruction, wherein the offering question instruction is used for: instruction shows problem to be placed.
On the other hand, the embodiment of the invention provides a kind of electronic equipment, including processor, communication interface, memory and
Communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, is realized provided by the embodiment of the present invention
The acquisition methods step of any block chain private key.
On the other hand, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storages
Dielectric memory contains computer program, realizes when the computer program is executed by processor and appoints provided by the embodiment of the present invention
The acquisition methods step of block chain private key described in one.
In technical solution provided in an embodiment of the present invention, obtain for obtaining obtaining for the corresponding block chain private key of target user
Take request, wherein acquisition request includes: the user identifier of target user;Based on user identifier, target problem and target are determined
The corresponding target answer of problem;Obtain the corresponding answer to be verified of target problem;Judge the corresponding target answer of target problem with
Whether the corresponding answer to be verified of target problem matches;When judging that the corresponding target answer of target problem and target problem are corresponding
When answer matches to be verified, block chain private key is obtained, and show block chain private key to target user.It, can in the embodiment of the present invention
With by offering question, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, just can to
Family shows its corresponding block chain private key, guarantees the safety of the corresponding block chain private key of user.The problem is related to user
The problem of, privacy is stronger, and the confidentiality of the corresponding block chain private key of user is more preferable, and then the corresponding block chain private key of user
Safety is higher.Certainly, it implements any of the products of the present invention or method must be not necessarily required to reach all the above simultaneously
Advantage.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the acquisition methods of block chain private key provided in an embodiment of the present invention;
Fig. 2 is a kind of another flow diagram of the acquisition methods of block chain private key provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of the acquisition device of block chain private key provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention provides acquisition methods, device and the electronic equipments of a kind of block chain private key, are guaranteed with realizing
The safety of block chain private key.
As shown in Figure 1, may include walking as follows the embodiment of the invention provides a kind of acquisition methods of block chain private key
It is rapid:
S101: the acquisition request for obtaining the corresponding block chain private key of target user is obtained;
Wherein, acquisition request includes: the user identifier of target user;
It is understood that a kind of acquisition methods of block chain private key provided in an embodiment of the present invention, can be applied to appoint
In the electronic equipment of one type, which can be the terminal devices such as computer or mobile phone, be also possible to by computer or mobile phone
Etc. the server built of equipment, this is all possible.
In one implementation, when which is terminal device, which is equipped with block chain wallet and answers
With.The function button for obtaining the corresponding block chain private key of target user, mesh can be set in the block chain wallet application
This can be triggered and be used to obtain the corresponding area of target user by executing preset specific operation to the function button by marking user
The acquisition request of block chain private key, so that electronic equipment obtains this for obtaining the acquisition of the corresponding block chain private key of target user
Request.
In another implementation, the electronic equipment be server when, the electronic equipment can with block chain is installed
The terminal device of wallet application is communicatively coupled.It can be set and be used in the block chain wallet application that terminal device is installed
The function button of the corresponding block chain private key of target user is obtained, target user can be preset by executing to the function button
Specific operation, and trigger this and use target for obtaining the acquisition request of the corresponding block chain private key of target user, terminal device
The acquisition request for being used to obtain the corresponding block chain private key of target user of family triggering is sent to electronic equipment, so that the electricity
Sub- equipment obtains this for obtaining the acquisition request of the corresponding block chain private key of target user.
Wherein, block chain wallet application are as follows: for managing block chain key, wallet address, tracking remaining sum and creation are handed over
Easy application software.
In the embodiment of the present invention, the user identifier of target user included by the acquisition request can be the account of user
And wallet address etc. can be with the information of the identity of the unique identification target user in block chain.The user user, which can be, to be appointed
One uses the user of block chain wallet application.
S102: the user identifier based on target user determines target problem and the corresponding target answer of target problem;
Each user identifier, problem and problem pair can be prestored in electronic equipment local or the storage equipment connected
The corresponding relationship for the answer answered.It, can be by the user of the target user after electronic equipment obtains the user identifier of target user
Mark, is matched with above-mentioned corresponding relationship, with determine the problem corresponding with the user identifier of the target user and this ask
The answer of topic, respectively as target problem and the corresponding target answer of target problem.Wherein, which can be at least
One.
S103: the corresponding answer to be verified of target problem is obtained;
In one implementation, when the electronic equipment be terminal device when, electronic equipment determine target problem and
After the corresponding target answer of target problem, the display that can will be connected by the electronic equipment is shown to target user
The target problem, in turn, target user can input the answer of each target problem, electronic equipment obtains according to the target problem
The answer that target user is directed to the input of each target problem is obtained, as the corresponding answer to be verified of target problem.
In another implementation, when the electronic equipment be server when, electronic equipment determine target problem and
After the corresponding target answer of target problem, by the target problem determined and the corresponding target answer of target problem, hair
The terminal device held to target user is sent, that is, sends the acquisition request for obtaining the corresponding block chain private key of target user
Terminal device, terminal device, which receives and passes through connected display, shows the target problem, in turn, target to target user
User can input the answer of each target problem according to the target problem, and terminal device is inputted target user each
The answer of target problem, is sent to electronic equipment, so that electronic equipment obtains target user for the input of each target problem
Answer, as the corresponding answer to be verified of target problem.
S104: judge whether the corresponding target answer of target problem answer to be verified corresponding with target problem matches;
S105: it when judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, obtains
Block chain private key is obtained, and shows block chain private key to target user.
After electronic equipment obtains the corresponding answer to be verified of target problem, by the corresponding target answer of target problem and mesh
The corresponding answer to be verified of mark problem is compared, and judges that the corresponding target answer of target problem is corresponding with target problem to be tested
Whether card answer matches.When target problem is multiple, can be the corresponding target answer of each target problem and the target
The corresponding answer to be verified of problem is compared, and judges that the corresponding target answer of each target problem is corresponding with the target problem
Whether answer to be verified matches.When judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem
When, block chain private key is obtained, and show block chain private key to target user.
In oneainstance, when the electronic equipment is terminal device, it can be electronic equipment and obtaining block chain private key
Later, which is shown by the display connected, to show the block chain private key to target user.In another kind
In situation, when the electronic equipment is server, electronic equipment can be after obtaining block chain private key, the block chain is private
Key is sent to the terminal device that target user is held, which shows that the block chain is private by connected display
Key, to show the block chain private key to target user.
In one implementation, when judging the corresponding target answer of target problem and target problem is corresponding to be verified answers
When case mismatches, can be output prompt information, which can be used for: prompt target user's answer to be verified is inaccurate
Really, and prompt target user that can re-enter answer to be verified.In oneainstance, preset times can be set, this is default
Number is the number for the corresponding answer to be verified of target answer that characterization allows target user's input error, wherein the mistake
The corresponding answer to be verified of target answer is the unmatched answer of target answer corresponding with target problem;When target user inputs
Mistake the corresponding answer to be verified of target answer number be more than above-mentioned preset times when, the target user can be locked.
Wherein, locking the target user may is that the prompt target user, not allow to input to be verified answer again in preset duration
Case, alternatively, can be does not allow the target user to input answer to be verified again.
In another scenario, in order to avoid target user forgets the corresponding target answer of target problem, and there is target
User can not obtain the case where its corresponding block chain private key, and in the embodiment of the present invention, electronic equipment can also receive target use
The instruction for obtaining the corresponding target answer of target problem of family triggering can use the target when receiving the instruction
Family carries out authentication can permit target user and resets problem after being verified, and offering question is corresponding answers
Case;Or can be allows target user to obtain the corresponding target answer of target problem.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein
Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined
Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem
Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem
Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting
Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user
Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy
Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, the acquisition request obtained for obtaining target user corresponding block chain private key
Step may include:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user
It asks, wherein target two dimensional code are as follows: the two dimensional code generated after being encoded to block chain private key.
Encrypted two dimensional code is can store in electronic equipment local or the storage equipment connected, when for the two dimension
After code successful decryption, it can be just decoded for the two dimensional code, to obtain the block chain private key of target user.The present invention is real
It applies in example, can be obtained by way of scanning target two dimensional code for obtaining obtaining for the corresponding block chain private key of target user
Take request.
In oneainstance, it when the electronic equipment is terminal device, can be shown by what is connected with electronic equipment
Show that device shows above-mentioned target two dimensional code, at this point, target user can with the long-pressing target two dimensional code, with driver sweep function so that
Electronic equipment can scan the target two dimensional code, be asked with obtaining for obtaining the acquisition of the corresponding block chain private key of target user
It asks, and then executes the acquisition process of subsequent block chain private key.
In another scenario, when the electronic equipment is server, the terminal device that target user is held can lead to
It crosses connected display and shows above-mentioned target two dimensional code, at this point, target user can be swept with the long-pressing target two dimensional code with triggering
Function is retouched, terminal device is allowed to scan above-mentioned target two dimensional code, and then triggers this and is used to obtain the corresponding area of target user
The acquisition request of block chain private key, terminal device send out the above-mentioned acquisition request for being used to obtain the corresponding block chain private key of target user
It send to electronic equipment, so that electronic equipment obtains the acquisition request for obtaining the corresponding block chain private key of target user, into
And execute the acquisition process of subsequent block chain private key.
It is understood that above-mentioned target two dimensional code can be the two dimension generated using preset two dimensional code generating algorithm
Code, the target two dimensional code can be any type of two dimensional code, which can be current any sort
The two dimensional code generating algorithm of type.
In one implementation, before the acquisition block chain private key the step of, the method can also be wrapped
It includes:
When judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, encrypted
Block chain private key afterwards;
Obtain target cipher key, wherein target cipher key are as follows: the key for encrypted block chain private key to be decrypted;
The step of acquisition block chain private key, may include:
Encrypted block chain private key is decrypted using target cipher key, obtains block chain private key.
When judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, can characterize
The target user has a permission for obtaining block chain private key, electronic equipment can continue to obtain encrypted block chain private key and
Target cipher key for encrypted block chain private key to be decrypted, so it is private to encrypted block chain using target cipher key
Key is decrypted, to obtain block chain private key.Subsequent, the block chain private key that decryption obtains can be showed mesh by electronic equipment
Mark user.When electronic equipment is server, the block chain private key that decryption obtains is sent to target user and is held by electronic equipment
Some terminal devices, terminal device show block chain private key to target user by connected display.When electronic equipment is
When terminal device, which shows block chain private key to target user by connected display.
It is understood that the safety that block connects wallet application place equipment affects block chain to a certain extent
The safety of private key, when the safety of equipment is lower where block connects wallet application, the safety of block chain private key is lower, i.e.,
Block chain private key be stolen (loss) a possibility that it is bigger.In order to guarantee the safety of block chain private key, it can increase and consider area
The safety of equipment where block connects wallet application.In one implementation, which is the first quantity;
Judge whether the corresponding target answer of target problem and the corresponding answer to be verified of target problem are matched described
Before step, the method can also include:
Detection device environment obtains testing result;
It is described to judge the corresponding target answer of target problem and the whether matched step of the corresponding answer to be verified of target problem
Suddenly, may include:
Based on testing result, judge whether are the corresponding target answer of target problem and the corresponding answer to be verified of target problem
Matching, wherein when testing result be the first testing result, and determine at least exist the corresponding target of the second quantity target problem
When the corresponding answer to be verified of answer and target problem is identical, determine that the corresponding target answer of target problem and target problem are corresponding
Answer matches to be verified;When testing result is the second testing result, and determine the corresponding target answer of each target problem with
When the corresponding answer to be verified of target problem is all the same, determine the corresponding target answer of target problem and target problem it is corresponding to
Validation Answer Key matching, the second quantity is less than the first quantity.
In one implementation, when electronic equipment is terminal device, above-mentioned detection device environment obtains detection knot
Fruit can be the facility environment of detection electronic equipment itself, obtain testing result.When electronic equipment is server, above-mentioned inspection
Measurement equipment environment obtains testing result, can be the facility environment for the terminal device that detection target user is held, obtains target
The testing result for the terminal device that user is held.Wherein, above-mentioned detection device environment may include: the network rings of detection device
Whether border is safe, and whether equipment is equipped with the system of malicious application and/or equipment with the presence or absence of loophole etc., and then obtains
Testing result.The embodiment of the present invention is not defined the detection angles of detection device environment, all to influence equipment peace
Full detection angles can be used as a kind of detection angles of detection device environment in the embodiment of the present invention.
In oneainstance, above-mentioned testing result may include being directed to detected by each detection angles as a result, can also
With include: for detected by each detection angles obtained as a result, identified one summarizes as a result, this is all can be with
's.Such as: when whether the network environment that above-mentioned detection device environment includes: detection device is safe, whether equipment is equipped with malice
When the system of application program and equipment whether there is loophole, above-mentioned testing result may include: that the network environment of detection device is
No safe testing result, such as: the network environment safety of equipment;Whether equipment is equipped with the testing result of malicious application,
Such as: being not installed with malicious application;The system of equipment whether there is the testing result of loophole, such as: there is leakage in the system of equipment
Hole.Also the facility environment that may include: equipment is safety.
It is subsequent, electronic equipment can be based on testing result obtained, judge the corresponding target answer of target problem and
Whether the corresponding answer to be verified of target problem matches.It may is that when testing result obtained characterization facility environment is safety
When, can be, which allows to there are problems that in the corresponding problem to be verified of target problem obtained that partial target is corresponding, to be verified asks
Topic, target answer corresponding with target problem is identical, i.e., the corresponding target answer of judgement target problem and target problem are corresponding
Answer matches to be verified.When testing result obtained characterization facility environment is dangerous, can be allows mesh obtained
The corresponding problem to be verified of all target problems, target corresponding with target problem are answered in the corresponding problem to be verified of mark problem
Case is identical, i.e. the corresponding target answer of judgement target problem and the corresponding answer matches to be verified of target problem.
Specifically, may is that target problem is the first quantity, when testing result is the first testing result, that is, work as detection
As a result when characterization facility environment is safe, determine that at least there is the corresponding target answer of the second quantity target problem asks with target
Inscribe corresponding answer to be verified it is identical when, that is, can determine that the corresponding target answer of target problem and target problem are corresponding to be verified
Answer matches.When testing result is that the second testing result determines each that is, when it is dangerous that testing result, which characterizes facility environment,
When the corresponding target answer of target problem answer to be verified corresponding with target problem is all the same, that is, it can determine that target problem is corresponding
Target answer and the corresponding answer matches to be verified of target problem, with facility environment be it is dangerous when, preferably guarantee mesh
Mark the safety of the block chain private key of user.
In one implementation, as shown in Fig. 2, the method may include following steps:
S201: problem to be placed is shown;
S202: the selection instruction based on target user determines that target user chooses to be placed from problem to be placed
Problem, as target problem;
S203: for the user identifier of target user, target problem and the corresponding target answer of target problem are recorded;
S204: the acquisition request for obtaining the corresponding block chain private key of target user is obtained;
Wherein, acquisition request includes: the user identifier of target user;
S205: the user identifier based on target user determines target problem and the corresponding target answer of target problem;
S206: the corresponding answer to be verified of target problem is obtained;
S207: judge whether the corresponding target answer of target problem answer to be verified corresponding with target problem matches;
S208: it when judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, obtains
Block chain private key is obtained, and shows block chain private key to target user.
Wherein, S204 is identical as S101 shown in FIG. 1, and S205 is identical as S102 shown in FIG. 1, S206 with it is shown in FIG. 1
S103 is identical, and S207 is identical as S104 shown in FIG. 1, and S208 is identical as S105 shown in FIG. 1.
In the embodiment of the present invention, in order to preferably guarantee the safety of the corresponding block chain private key of each user, Mei Yiyong
Problem corresponding to family can be selected by user oneself, and the corresponding answer of problem is arranged by oneself.This realization
In mode, electronic equipment can show problem to be placed, and then the selection instruction based on target user to target user first, from
The problem to be placed that target user chooses is determined in problem to be placed, as target problem, is obtained target user and is directed to target
The target answer of problem setting for the user identifier of target user, records target problem and the corresponding mesh of target problem in turn
Mark answer.
In oneainstance, when electronic equipment is terminal device, above-mentioned displaying problem to be placed may is that and pass through electricity
The display exhibits that sub- equipment is connected problem to be placed, so that target user can select from the problem to be placed shown
At least one problem, as target problem.Target user can be instructed with triggering selection, which can carry target use
The mark of the selected each problem to be placed in family, so that electronic equipment when obtaining the selection instruction, can be based on the selection
The mark of the entrained selected each problem to be placed of target user of instruction, determines target user from problem to be placed
The problem to be placed chosen, as target problem.And then target user can be directed to each target problem, input corresponding target
Answer;Electronic equipment obtains the target answer for target problem setting, and is directed to the user identifier of target user, records target
Problem and the corresponding target answer of target problem.
In another scenario, when electronic equipment is server, above-mentioned displaying problem to be placed, may is that will be wait set
The problem of setting is sent to the terminal device that target user is held, and terminal device is asked by the way that connected display exhibits are to be placed
Topic, so that target user can select at least one problem from the problem to be placed shown, as target problem.Target is used
Family can be instructed with triggering selection, which can carry the mark of the selected each problem to be placed of target user,
So that terminal device is sent to electronic equipment after obtaining the selection instruction, by the selection instruction, electronic equipment obtains the choosing
When selecting instruction, can based on the mark of the selected each problem to be placed of target user entrained by the selection instruction, to
The problem to be placed that target user chooses is determined in offering question, as target problem.And then target user is held by it
Some terminal devices input the target answer of each target problem, and each target which obtains target user's input is asked
The target answer of topic, and it is sent to electronic equipment, the target that electronic equipment obtains each target problem that terminal device is sent is answered
Case, and it is directed to the user identifier of target user, record target problem and the corresponding target answer of target problem.
It is subsequent, electronic equipment after obtaining acquisition request for obtaining the corresponding block chain private key of target user,
The acquisition process of subsequent block chain private key can be continued to execute.
In one implementation, when target user completes the wallet account of itself based on the creation of block chain wallet application for the first time
Behind family, which can generate the corresponding block chain private key of the target user for target user, be referred to as the mesh
The corresponding block chain private key of wallet account of user is marked, at this point, when the electronic equipment can generate the target for target user
After the corresponding block chain private key of user, electronic equipment can show problem to be placed to target user immediately, so that target is used
Family encrypts the block chain private key.It is used alternatively, may is that when the electronic equipment can generate the target for target user
After the corresponding block chain private key in family, which encodes the block chain private key, to generate two dimensional code, in turn, immediately
Problem to be placed is shown to target user, so that target user encrypts the block chain private key.
In one implementation, which can generate the corresponding block chain of the target user for target user
It, can not be immediately to target user's exhibition after generating two dimensional code after private key, or when electronic equipment encodes block chain private key
Show problem to be placed, can be after receiving the offering question instruction of target user's triggering, show to target user wait set
Set problem.Specifically, the method can also include: before the displaying problem to be placed the step of
Receive the offering question instruction of target user's triggering, wherein offering question instruction is used for: instruction shows to be placed ask
Topic.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of acquisition device of block chain private key, such as Fig. 3
It is shown, the apparatus may include:
First obtains module 310, for obtaining the acquisition request for obtaining the corresponding block chain private key of target user,
In, the acquisition request includes: the user identifier of the target user;
First determining module 320 determines target problem and the mesh for the user identifier based on the target user
The corresponding target answer of mark problem;
Second obtains module 330, for obtaining the corresponding answer to be verified of the target problem;
Judgment module 340, for judge the corresponding target answer of the target problem it is corresponding with the target problem to
Whether Validation Answer Key matches;
Display module 350 is obtained, judges the corresponding target answer of the target problem and the target problem pair for working as
When the answer matches to be verified answered, the block chain private key is obtained, and show the block chain private key to the target user.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein
Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined
Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem
Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem
Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting
Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user
Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy
Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, described first module 310 is obtained, be specifically used for
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user
It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
In one implementation, described device further include:
Third obtains module, for it is described obtain the block chain private key before, when judge the target problem correspondence
Target answer and the target problem corresponding answer matches to be verified when, obtain encrypted block chain private key;
4th obtains module, for obtaining target cipher key, wherein the target cipher key are as follows: for encrypted described
The key that block chain private key is decrypted;
The acquisition display module 350, is specifically used for
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key,
And the block chain private key is shown to the target user.
In one implementation, the target problem is the first quantity;
Described device can also include:
Detection module, for corresponding in the judgement corresponding target answer of target problem and the target problem
Before whether answer to be verified matches, detection device environment obtains testing result;
The judgment module 340, is specifically used for
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to
Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute
State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem
Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot
Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same
When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second
Quantity is less than first quantity.
In one implementation, described device can also include:
Display module, for determining target problem and the mesh in the user identifier based on the target user
Before the corresponding target answer of mark problem, problem to be placed is shown;
Second determining module is determined from problem to be set for the selection instruction based on the target user
The problem to be placed that the target user chooses, as target problem;
5th obtains module, for obtaining the target answer for being directed to target problem setting;
Logging modle records the target problem and the target for being directed to the user identifier of the target user
The corresponding target answer of problem.
In one implementation, described device can also include:
Receiving module, for receiving the offering question of target user's triggering before the displaying problem to be placed
Instruction, wherein the offering question instruction is used for: instruction shows problem to be placed.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of electronic equipment, as shown in figure 4, including
Processor 410, communication interface 420, memory 430 and communication bus 440, wherein processor 410, communication interface 420, storage
Device 430 completes mutual communication by communication bus 440,
Memory 430, for storing computer program;
Processor 410 when for executing the computer program stored on memory 430, realizes institute of the embodiment of the present invention
The acquisition methods step of any of the above-described block chain private key provided:
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes:
The user identifier of the target user;
Based on the user identifier of the target user, determine that target problem and the corresponding target of the target problem are answered
Case;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem,
The block chain private key is obtained, and shows the block chain private key to the target user.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein
Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined
Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem
Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem
Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting
Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user
Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy
Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, the acquisition request obtained for obtaining target user corresponding block chain private key
Step, comprising:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user
It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
In one implementation, before the acquisition block chain private key the step of, the method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem,
Obtain encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: for the encrypted block chain private key to be decrypted
Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
In one implementation, the target problem is the first quantity;
It is in the judgement corresponding target answer of target problem and the corresponding answer to be verified of the target problem
Before the step of no matching, further includes:
Detection device environment obtains testing result;
It is described to judge whether are the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem
The step of matching, comprising:
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to
Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute
State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem
Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot
Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same
When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second
Quantity is less than first quantity.
In one implementation, in the user identifier based on the target user, target problem and institute are determined
Before the step of stating target problem corresponding target answer, further includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine what the target user chose from problem to be set
Problem to be placed, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, the target problem and the corresponding target of the target problem are recorded
Answer.
In one implementation, before the displaying problem to be placed the step of, further includes:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown
Problem to be placed.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component
Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control bus etc..For just
It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), also may include non-easy
The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also
To be storage device that at least one is located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of computer readable storage medium, the meter
It is stored with computer program in calculation machine readable storage medium storing program for executing, realizes that the present invention is implemented when the computer program is executed by processor
The acquisition methods step of any of the above-described block chain private key provided by example:
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes:
The user identifier of the target user;
Based on the user identifier of the target user, determine that target problem and the corresponding target of the target problem are answered
Case;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem,
The block chain private key is obtained, and shows the block chain private key to the target user.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein
Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined
Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem
Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem
Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting
Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user
Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy
Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, the acquisition request obtained for obtaining target user corresponding block chain private key
Step, comprising:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user
It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
In one implementation, before the acquisition block chain private key the step of, the method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem,
Obtain encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: for the encrypted block chain private key to be decrypted
Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
In one implementation, the target problem is the first quantity;
It is in the judgement corresponding target answer of target problem and the corresponding answer to be verified of the target problem
Before the step of no matching, further includes:
Detection device environment obtains testing result;
It is described to judge whether are the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem
The step of matching, comprising:
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to
Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute
State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem
Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot
Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same
When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second
Quantity is less than first quantity.
In one implementation, in the user identifier based on the target user, target problem and institute are determined
Before the step of stating target problem corresponding target answer, further includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine what the target user chose from problem to be set
Problem to be placed, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, the target problem and the corresponding target of the target problem are recorded
Answer.
In one implementation, before the displaying problem to be placed the step of, further includes:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown
Problem to be placed.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (10)
1. a kind of acquisition methods of block chain private key, which is characterized in that the described method includes:
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes: described
The user identifier of target user;
Based on the user identifier of the target user, target problem and the corresponding target answer of the target problem are determined;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, obtain
The block chain private key, and the block chain private key is shown to the target user.
2. the method according to claim 1, wherein the acquisition is for obtaining the corresponding block chain of target user
The step of acquisition request of private key, comprising:
By way of scanning target two dimensional code, the acquisition request for obtaining the corresponding block chain private key of target user is obtained,
Wherein, the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
3. according to the method described in claim 2, it is characterized in that, before the acquisition block chain private key the step of,
The method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, obtain
Encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: close for the encrypted block chain private key to be decrypted
Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
4. the method according to claim 1, wherein the target problem is the first quantity;
It is described judge the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem whether
With the step of before, the method also includes:
Detection device environment obtains testing result;
It is described to judge whether the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem match
The step of, comprising:
Based on the testing result, judge that the corresponding target answer of the target problem and the target problem are corresponding to be verified
Whether answer matches, wherein when the testing result is the first testing result, and determines and at least there is the second quantity mesh
When the corresponding answer to be verified of the corresponding target answer of mark problem and the target problem is identical, determine that the target problem is corresponding
Target answer and the corresponding answer matches to be verified of the target problem;When the testing result be the second testing result, and
When determining that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same, determine
The corresponding target answer of target problem and the corresponding answer matches to be verified of the target problem, second quantity are less than
First quantity.
5. method according to claim 1-4, which is characterized in that in the user based on the target user
Mark, before the step of determining target problem and the target problem corresponding target answer, the method also includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine that the target user chooses from problem to be set wait set
Problem is set, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, records the target problem and the corresponding target of the target problem is answered
Case.
6. described according to the method described in claim 5, it is characterized in that, before the displaying problem to be placed the step of
Method further include:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown wait set
Set problem.
7. a kind of acquisition device of block chain private key, which is characterized in that described device includes:
First obtains module, for obtaining the acquisition request for obtaining the corresponding block chain private key of target user, wherein described
Acquisition request includes: the user identifier of the target user;
First determining module determines target problem and the target problem for the user identifier based on the target user
Corresponding target answer;
Second obtains module, for obtaining the corresponding answer to be verified of the target problem;
Judgment module, for judging the corresponding target answer of target problem answer to be verified corresponding with the target problem
Whether match;
Display module is obtained, judges that the corresponding target answer of the target problem and the target problem are corresponding to be tested for working as
When demonstrate,proving answer matches, the block chain private key is obtained, and show the block chain private key to the target user.
8. device according to claim 7, which is characterized in that described first obtains module, is specifically used for
By way of scanning target two dimensional code, the acquisition request for obtaining the corresponding block chain private key of target user is obtained,
Wherein, the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
9. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing
Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, realizes any block of claim 1-6
The acquisition methods step of chain private key.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program realizes the acquisition side of any block chain private key of claim 1-6 when the computer program is executed by processor
Method step.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811133232.9A CN109272317A (en) | 2018-09-27 | 2018-09-27 | Block chain private key obtaining method and device and electronic equipment |
PCT/CN2019/092971 WO2020062974A1 (en) | 2018-09-27 | 2019-06-26 | Method and apparatus for acquiring blockchain private key, and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811133232.9A CN109272317A (en) | 2018-09-27 | 2018-09-27 | Block chain private key obtaining method and device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109272317A true CN109272317A (en) | 2019-01-25 |
Family
ID=65198644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811133232.9A Pending CN109272317A (en) | 2018-09-27 | 2018-09-27 | Block chain private key obtaining method and device and electronic equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109272317A (en) |
WO (1) | WO2020062974A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020062974A1 (en) * | 2018-09-27 | 2020-04-02 | 北京金山安全软件有限公司 | Method and apparatus for acquiring blockchain private key, and electronic device |
WO2021057070A1 (en) * | 2019-09-23 | 2021-04-01 | 创新先进技术有限公司 | Blockchain-based submission processing method, device, and electronic apparatus |
WO2023036143A1 (en) * | 2021-09-07 | 2023-03-16 | 洪沛桦 | Decentralized zero-trust identity verification and authentication system and method |
CN116112167A (en) * | 2023-04-13 | 2023-05-12 | 恒生电子股份有限公司 | Key management system, method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580264A (en) * | 2015-02-13 | 2015-04-29 | 人民网股份有限公司 | Login method, registration method and login device as well as login and refrigeration system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106686008A (en) * | 2017-03-03 | 2017-05-17 | 腾讯科技(深圳)有限公司 | Information storage method and information storage device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3348019A1 (en) * | 2015-09-11 | 2018-07-18 | Aware, Inc. | Biometric verification of a blockchain database transaction contributor |
CN106548345B (en) * | 2016-12-07 | 2020-08-21 | 北京信任度科技有限公司 | Method and system for realizing block chain private key protection based on key partitioning |
CN108418680B (en) * | 2017-09-05 | 2021-12-07 | 矩阵元技术(深圳)有限公司 | Block chain key recovery method and medium based on secure multi-party computing technology |
CN108235805B (en) * | 2017-12-29 | 2021-07-30 | 达闼机器人有限公司 | Account unifying method and device and storage medium |
CN109272317A (en) * | 2018-09-27 | 2019-01-25 | 北京金山安全软件有限公司 | Block chain private key obtaining method and device and electronic equipment |
-
2018
- 2018-09-27 CN CN201811133232.9A patent/CN109272317A/en active Pending
-
2019
- 2019-06-26 WO PCT/CN2019/092971 patent/WO2020062974A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580264A (en) * | 2015-02-13 | 2015-04-29 | 人民网股份有限公司 | Login method, registration method and login device as well as login and refrigeration system |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106686008A (en) * | 2017-03-03 | 2017-05-17 | 腾讯科技(深圳)有限公司 | Information storage method and information storage device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020062974A1 (en) * | 2018-09-27 | 2020-04-02 | 北京金山安全软件有限公司 | Method and apparatus for acquiring blockchain private key, and electronic device |
WO2021057070A1 (en) * | 2019-09-23 | 2021-04-01 | 创新先进技术有限公司 | Blockchain-based submission processing method, device, and electronic apparatus |
WO2023036143A1 (en) * | 2021-09-07 | 2023-03-16 | 洪沛桦 | Decentralized zero-trust identity verification and authentication system and method |
CN116112167A (en) * | 2023-04-13 | 2023-05-12 | 恒生电子股份有限公司 | Key management system, method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2020062974A1 (en) | 2020-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109272317A (en) | Block chain private key obtaining method and device and electronic equipment | |
CN104780043B (en) | Access control method and system based on two dimensional code | |
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN103929307B (en) | Cipher-code input method, intelligent cipher key equipment and client terminal device | |
CN105471581B (en) | A kind of auth method and device | |
CN107864115A (en) | A kind of method that user account login authentication is carried out using portable terminal | |
CN106506146A (en) | Based on the Transaction Information method of calibration of block chain technology, apparatus and system | |
CN105095737A (en) | Method and device for detecting weak password | |
KR20140042905A (en) | Identity authentication and management device and method thereof | |
CN105184567B (en) | Processing method, processing unit and the mobile terminal of information | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN109583181A (en) | A kind of authentication method, device and machine readable storage medium | |
CN104104657B (en) | Information Authentication method, server, terminal and system | |
CN104967594B (en) | Stolen account identification method and apparatus | |
US20190312861A1 (en) | System and method for grid-based one-time password | |
CN104573493B (en) | A kind of method for protecting software and system | |
CN108121904B (en) | Unlocking method, device, electronic equipment and server | |
CN109067545A (en) | Key management method, device and storage medium | |
CN109547426A (en) | Service response method and server | |
CN104853030B (en) | The method and mobile terminal of a kind of information processing | |
CN113312627B (en) | Joint utilization method, device and system based on knowledge graph | |
CN108063748A (en) | A kind of user authen method, apparatus and system | |
CN107423609A (en) | A kind of authoring system, method and card | |
CN108989331A (en) | Data storage device uses method for authenticating and its equipment and storage medium | |
CN106797386A (en) | Safe verification method, device, terminal device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190125 |