CN109272317A - Block chain private key obtaining method and device and electronic equipment - Google Patents

Block chain private key obtaining method and device and electronic equipment Download PDF

Info

Publication number
CN109272317A
CN109272317A CN201811133232.9A CN201811133232A CN109272317A CN 109272317 A CN109272317 A CN 109272317A CN 201811133232 A CN201811133232 A CN 201811133232A CN 109272317 A CN109272317 A CN 109272317A
Authority
CN
China
Prior art keywords
target
answer
block chain
private key
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811133232.9A
Other languages
Chinese (zh)
Inventor
张康宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201811133232.9A priority Critical patent/CN109272317A/en
Publication of CN109272317A publication Critical patent/CN109272317A/en
Priority to PCT/CN2019/092971 priority patent/WO2020062974A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Abstract

The embodiment of the invention provides a method and a device for acquiring a block chain private key and electronic equipment, wherein the method comprises the following steps: obtaining an obtaining request for obtaining a block chain private key corresponding to a target user, wherein the obtaining request comprises: a user identification of the target user; determining a target question and a target answer corresponding to the target question based on the user identification; obtaining a to-be-verified answer corresponding to the target question; judging whether a target answer corresponding to the target question is matched with a to-be-verified answer corresponding to the target question; and when the target answer corresponding to the target question is judged to be matched with the to-be-verified answer corresponding to the target question, obtaining a block chain private key, and displaying the block chain private key to the target user. So as to ensure the security of the private key of the block chain.

Description

A kind of acquisition methods, device and the electronic equipment of block chain private key
Technical field
The present invention relates to block chain technical fields, more particularly to acquisition methods, device and the electricity of a kind of block chain private key Sub- equipment.
Background technique
In block chain technical field, block chain private key is that user obtains to the assets in virtual wallet, such as bit coin The right of eminent domain important documents.Who possesses block chain private key, just possesses what the corresponding virtual wallet of block chain private key was managed The right of eminent domain of assets.As it can be seen that guaranteeing the safety of block chain private key, i.e., for guaranteeing in virtual wallet for the safety of assets It is most important to guarantee that block chain private key is not easy to be stolen.
So, the safe acquisition methods for how providing a kind of block chain private key become urgent problem to be solved.
Summary of the invention
Acquisition methods, device and the electronic equipment for being designed to provide a kind of block chain private key of the embodiment of the present invention, with Realize the safety for guaranteeing block chain private key.Specific technical solution is as follows:
On the one hand, the embodiment of the invention provides a kind of acquisition methods of block chain private key, which comprises
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes: The user identifier of the target user;
Based on the user identifier of the target user, determine that target problem and the corresponding target of the target problem are answered Case;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, The block chain private key is obtained, and shows the block chain private key to the target user.
Optionally, the step of acquisition request obtained for obtaining the corresponding block chain private key of target user, comprising:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
Optionally, before the acquisition block chain private key the step of, the method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, Obtain encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: for the encrypted block chain private key to be decrypted Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
Optionally, the target problem is the first quantity;
It is in the judgement corresponding target answer of target problem and the corresponding answer to be verified of the target problem Before the step of no matching, the method also includes:
Detection device environment obtains testing result;
It is described to judge whether are the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem The step of matching, comprising:
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second Quantity is less than first quantity.
Optionally, in the user identifier based on the target user, target problem and the target problem are determined Before the step of corresponding target answer, the method also includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine what the target user chose from problem to be set Problem to be placed, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, the target problem and the corresponding target of the target problem are recorded Answer.
Optionally, before the displaying problem to be placed the step of, the method also includes:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown Problem to be placed.
On the other hand, the embodiment of the invention provides a kind of acquisition device of block chain private key, described device includes:
First obtains module, for obtaining the acquisition request for obtaining the corresponding block chain private key of target user, wherein The acquisition request includes: the user identifier of the target user;
First determining module determines target problem and the target for the user identifier based on the target user The corresponding target answer of problem;
Second obtains module, for obtaining the corresponding answer to be verified of the target problem;
Judgment module, for judging that the corresponding target answer of the target problem is corresponding with the target problem to be verified Whether answer matches;
Display module is obtained, judges that the corresponding target answer of the target problem and the target problem are corresponding for working as When answer matches to be verified, the block chain private key is obtained, and show the block chain private key to the target user.
Optionally, described first module is obtained, be specifically used for
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
Optionally, described device further include:
Third obtains module, for it is described obtain the block chain private key before, when judge the target problem correspondence Target answer and the target problem corresponding answer matches to be verified when, obtain encrypted block chain private key;
4th obtains module, for obtaining target cipher key, wherein the target cipher key are as follows: for encrypted described The key that block chain private key is decrypted;
The acquisition display module, is specifically used for
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key, And the block chain private key is shown to the target user.
Optionally, the target problem is the first quantity;
Described device further include:
Detection module, for corresponding in the judgement corresponding target answer of target problem and the target problem Before whether answer to be verified matches, detection device environment obtains testing result;
The judgment module, is specifically used for
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second Quantity is less than first quantity.
Optionally, described device further include:
Display module, for determining target problem and the mesh in the user identifier based on the target user Before the corresponding target answer of mark problem, problem to be placed is shown;
Second determining module is determined from problem to be set for the selection instruction based on the target user The problem to be placed that the target user chooses, as target problem;
5th obtains module, for obtaining the target answer for being directed to target problem setting;
Logging modle records the target problem and the target for being directed to the user identifier of the target user The corresponding target answer of problem.
Optionally, described device further include:
Receiving module, for receiving the offering question of target user's triggering before the displaying problem to be placed Instruction, wherein the offering question instruction is used for: instruction shows problem to be placed.
On the other hand, the embodiment of the invention provides a kind of electronic equipment, including processor, communication interface, memory and Communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, is realized provided by the embodiment of the present invention The acquisition methods step of any block chain private key.
On the other hand, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storages Dielectric memory contains computer program, realizes when the computer program is executed by processor and appoints provided by the embodiment of the present invention The acquisition methods step of block chain private key described in one.
In technical solution provided in an embodiment of the present invention, obtain for obtaining obtaining for the corresponding block chain private key of target user Take request, wherein acquisition request includes: the user identifier of target user;Based on user identifier, target problem and target are determined The corresponding target answer of problem;Obtain the corresponding answer to be verified of target problem;Judge the corresponding target answer of target problem with Whether the corresponding answer to be verified of target problem matches;When judging that the corresponding target answer of target problem and target problem are corresponding When answer matches to be verified, block chain private key is obtained, and show block chain private key to target user.It, can in the embodiment of the present invention With by offering question, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, just can to Family shows its corresponding block chain private key, guarantees the safety of the corresponding block chain private key of user.The problem is related to user The problem of, privacy is stronger, and the confidentiality of the corresponding block chain private key of user is more preferable, and then the corresponding block chain private key of user Safety is higher.Certainly, it implements any of the products of the present invention or method must be not necessarily required to reach all the above simultaneously Advantage.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the acquisition methods of block chain private key provided in an embodiment of the present invention;
Fig. 2 is a kind of another flow diagram of the acquisition methods of block chain private key provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of the acquisition device of block chain private key provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the invention provides acquisition methods, device and the electronic equipments of a kind of block chain private key, are guaranteed with realizing The safety of block chain private key.
As shown in Figure 1, may include walking as follows the embodiment of the invention provides a kind of acquisition methods of block chain private key It is rapid:
S101: the acquisition request for obtaining the corresponding block chain private key of target user is obtained;
Wherein, acquisition request includes: the user identifier of target user;
It is understood that a kind of acquisition methods of block chain private key provided in an embodiment of the present invention, can be applied to appoint In the electronic equipment of one type, which can be the terminal devices such as computer or mobile phone, be also possible to by computer or mobile phone Etc. the server built of equipment, this is all possible.
In one implementation, when which is terminal device, which is equipped with block chain wallet and answers With.The function button for obtaining the corresponding block chain private key of target user, mesh can be set in the block chain wallet application This can be triggered and be used to obtain the corresponding area of target user by executing preset specific operation to the function button by marking user The acquisition request of block chain private key, so that electronic equipment obtains this for obtaining the acquisition of the corresponding block chain private key of target user Request.
In another implementation, the electronic equipment be server when, the electronic equipment can with block chain is installed The terminal device of wallet application is communicatively coupled.It can be set and be used in the block chain wallet application that terminal device is installed The function button of the corresponding block chain private key of target user is obtained, target user can be preset by executing to the function button Specific operation, and trigger this and use target for obtaining the acquisition request of the corresponding block chain private key of target user, terminal device The acquisition request for being used to obtain the corresponding block chain private key of target user of family triggering is sent to electronic equipment, so that the electricity Sub- equipment obtains this for obtaining the acquisition request of the corresponding block chain private key of target user.
Wherein, block chain wallet application are as follows: for managing block chain key, wallet address, tracking remaining sum and creation are handed over Easy application software.
In the embodiment of the present invention, the user identifier of target user included by the acquisition request can be the account of user And wallet address etc. can be with the information of the identity of the unique identification target user in block chain.The user user, which can be, to be appointed One uses the user of block chain wallet application.
S102: the user identifier based on target user determines target problem and the corresponding target answer of target problem;
Each user identifier, problem and problem pair can be prestored in electronic equipment local or the storage equipment connected The corresponding relationship for the answer answered.It, can be by the user of the target user after electronic equipment obtains the user identifier of target user Mark, is matched with above-mentioned corresponding relationship, with determine the problem corresponding with the user identifier of the target user and this ask The answer of topic, respectively as target problem and the corresponding target answer of target problem.Wherein, which can be at least One.
S103: the corresponding answer to be verified of target problem is obtained;
In one implementation, when the electronic equipment be terminal device when, electronic equipment determine target problem and After the corresponding target answer of target problem, the display that can will be connected by the electronic equipment is shown to target user The target problem, in turn, target user can input the answer of each target problem, electronic equipment obtains according to the target problem The answer that target user is directed to the input of each target problem is obtained, as the corresponding answer to be verified of target problem.
In another implementation, when the electronic equipment be server when, electronic equipment determine target problem and After the corresponding target answer of target problem, by the target problem determined and the corresponding target answer of target problem, hair The terminal device held to target user is sent, that is, sends the acquisition request for obtaining the corresponding block chain private key of target user Terminal device, terminal device, which receives and passes through connected display, shows the target problem, in turn, target to target user User can input the answer of each target problem according to the target problem, and terminal device is inputted target user each The answer of target problem, is sent to electronic equipment, so that electronic equipment obtains target user for the input of each target problem Answer, as the corresponding answer to be verified of target problem.
S104: judge whether the corresponding target answer of target problem answer to be verified corresponding with target problem matches;
S105: it when judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, obtains Block chain private key is obtained, and shows block chain private key to target user.
After electronic equipment obtains the corresponding answer to be verified of target problem, by the corresponding target answer of target problem and mesh The corresponding answer to be verified of mark problem is compared, and judges that the corresponding target answer of target problem is corresponding with target problem to be tested Whether card answer matches.When target problem is multiple, can be the corresponding target answer of each target problem and the target The corresponding answer to be verified of problem is compared, and judges that the corresponding target answer of each target problem is corresponding with the target problem Whether answer to be verified matches.When judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem When, block chain private key is obtained, and show block chain private key to target user.
In oneainstance, when the electronic equipment is terminal device, it can be electronic equipment and obtaining block chain private key Later, which is shown by the display connected, to show the block chain private key to target user.In another kind In situation, when the electronic equipment is server, electronic equipment can be after obtaining block chain private key, the block chain is private Key is sent to the terminal device that target user is held, which shows that the block chain is private by connected display Key, to show the block chain private key to target user.
In one implementation, when judging the corresponding target answer of target problem and target problem is corresponding to be verified answers When case mismatches, can be output prompt information, which can be used for: prompt target user's answer to be verified is inaccurate Really, and prompt target user that can re-enter answer to be verified.In oneainstance, preset times can be set, this is default Number is the number for the corresponding answer to be verified of target answer that characterization allows target user's input error, wherein the mistake The corresponding answer to be verified of target answer is the unmatched answer of target answer corresponding with target problem;When target user inputs Mistake the corresponding answer to be verified of target answer number be more than above-mentioned preset times when, the target user can be locked. Wherein, locking the target user may is that the prompt target user, not allow to input to be verified answer again in preset duration Case, alternatively, can be does not allow the target user to input answer to be verified again.
In another scenario, in order to avoid target user forgets the corresponding target answer of target problem, and there is target User can not obtain the case where its corresponding block chain private key, and in the embodiment of the present invention, electronic equipment can also receive target use The instruction for obtaining the corresponding target answer of target problem of family triggering can use the target when receiving the instruction Family carries out authentication can permit target user and resets problem after being verified, and offering question is corresponding answers Case;Or can be allows target user to obtain the corresponding target answer of target problem.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, the acquisition request obtained for obtaining target user corresponding block chain private key Step may include:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user It asks, wherein target two dimensional code are as follows: the two dimensional code generated after being encoded to block chain private key.
Encrypted two dimensional code is can store in electronic equipment local or the storage equipment connected, when for the two dimension After code successful decryption, it can be just decoded for the two dimensional code, to obtain the block chain private key of target user.The present invention is real It applies in example, can be obtained by way of scanning target two dimensional code for obtaining obtaining for the corresponding block chain private key of target user Take request.
In oneainstance, it when the electronic equipment is terminal device, can be shown by what is connected with electronic equipment Show that device shows above-mentioned target two dimensional code, at this point, target user can with the long-pressing target two dimensional code, with driver sweep function so that Electronic equipment can scan the target two dimensional code, be asked with obtaining for obtaining the acquisition of the corresponding block chain private key of target user It asks, and then executes the acquisition process of subsequent block chain private key.
In another scenario, when the electronic equipment is server, the terminal device that target user is held can lead to It crosses connected display and shows above-mentioned target two dimensional code, at this point, target user can be swept with the long-pressing target two dimensional code with triggering Function is retouched, terminal device is allowed to scan above-mentioned target two dimensional code, and then triggers this and is used to obtain the corresponding area of target user The acquisition request of block chain private key, terminal device send out the above-mentioned acquisition request for being used to obtain the corresponding block chain private key of target user It send to electronic equipment, so that electronic equipment obtains the acquisition request for obtaining the corresponding block chain private key of target user, into And execute the acquisition process of subsequent block chain private key.
It is understood that above-mentioned target two dimensional code can be the two dimension generated using preset two dimensional code generating algorithm Code, the target two dimensional code can be any type of two dimensional code, which can be current any sort The two dimensional code generating algorithm of type.
In one implementation, before the acquisition block chain private key the step of, the method can also be wrapped It includes:
When judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, encrypted Block chain private key afterwards;
Obtain target cipher key, wherein target cipher key are as follows: the key for encrypted block chain private key to be decrypted;
The step of acquisition block chain private key, may include:
Encrypted block chain private key is decrypted using target cipher key, obtains block chain private key.
When judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, can characterize The target user has a permission for obtaining block chain private key, electronic equipment can continue to obtain encrypted block chain private key and Target cipher key for encrypted block chain private key to be decrypted, so it is private to encrypted block chain using target cipher key Key is decrypted, to obtain block chain private key.Subsequent, the block chain private key that decryption obtains can be showed mesh by electronic equipment Mark user.When electronic equipment is server, the block chain private key that decryption obtains is sent to target user and is held by electronic equipment Some terminal devices, terminal device show block chain private key to target user by connected display.When electronic equipment is When terminal device, which shows block chain private key to target user by connected display.
It is understood that the safety that block connects wallet application place equipment affects block chain to a certain extent The safety of private key, when the safety of equipment is lower where block connects wallet application, the safety of block chain private key is lower, i.e., Block chain private key be stolen (loss) a possibility that it is bigger.In order to guarantee the safety of block chain private key, it can increase and consider area The safety of equipment where block connects wallet application.In one implementation, which is the first quantity;
Judge whether the corresponding target answer of target problem and the corresponding answer to be verified of target problem are matched described Before step, the method can also include:
Detection device environment obtains testing result;
It is described to judge the corresponding target answer of target problem and the whether matched step of the corresponding answer to be verified of target problem Suddenly, may include:
Based on testing result, judge whether are the corresponding target answer of target problem and the corresponding answer to be verified of target problem Matching, wherein when testing result be the first testing result, and determine at least exist the corresponding target of the second quantity target problem When the corresponding answer to be verified of answer and target problem is identical, determine that the corresponding target answer of target problem and target problem are corresponding Answer matches to be verified;When testing result is the second testing result, and determine the corresponding target answer of each target problem with When the corresponding answer to be verified of target problem is all the same, determine the corresponding target answer of target problem and target problem it is corresponding to Validation Answer Key matching, the second quantity is less than the first quantity.
In one implementation, when electronic equipment is terminal device, above-mentioned detection device environment obtains detection knot Fruit can be the facility environment of detection electronic equipment itself, obtain testing result.When electronic equipment is server, above-mentioned inspection Measurement equipment environment obtains testing result, can be the facility environment for the terminal device that detection target user is held, obtains target The testing result for the terminal device that user is held.Wherein, above-mentioned detection device environment may include: the network rings of detection device Whether border is safe, and whether equipment is equipped with the system of malicious application and/or equipment with the presence or absence of loophole etc., and then obtains Testing result.The embodiment of the present invention is not defined the detection angles of detection device environment, all to influence equipment peace Full detection angles can be used as a kind of detection angles of detection device environment in the embodiment of the present invention.
In oneainstance, above-mentioned testing result may include being directed to detected by each detection angles as a result, can also With include: for detected by each detection angles obtained as a result, identified one summarizes as a result, this is all can be with 's.Such as: when whether the network environment that above-mentioned detection device environment includes: detection device is safe, whether equipment is equipped with malice When the system of application program and equipment whether there is loophole, above-mentioned testing result may include: that the network environment of detection device is No safe testing result, such as: the network environment safety of equipment;Whether equipment is equipped with the testing result of malicious application, Such as: being not installed with malicious application;The system of equipment whether there is the testing result of loophole, such as: there is leakage in the system of equipment Hole.Also the facility environment that may include: equipment is safety.
It is subsequent, electronic equipment can be based on testing result obtained, judge the corresponding target answer of target problem and Whether the corresponding answer to be verified of target problem matches.It may is that when testing result obtained characterization facility environment is safety When, can be, which allows to there are problems that in the corresponding problem to be verified of target problem obtained that partial target is corresponding, to be verified asks Topic, target answer corresponding with target problem is identical, i.e., the corresponding target answer of judgement target problem and target problem are corresponding Answer matches to be verified.When testing result obtained characterization facility environment is dangerous, can be allows mesh obtained The corresponding problem to be verified of all target problems, target corresponding with target problem are answered in the corresponding problem to be verified of mark problem Case is identical, i.e. the corresponding target answer of judgement target problem and the corresponding answer matches to be verified of target problem.
Specifically, may is that target problem is the first quantity, when testing result is the first testing result, that is, work as detection As a result when characterization facility environment is safe, determine that at least there is the corresponding target answer of the second quantity target problem asks with target Inscribe corresponding answer to be verified it is identical when, that is, can determine that the corresponding target answer of target problem and target problem are corresponding to be verified Answer matches.When testing result is that the second testing result determines each that is, when it is dangerous that testing result, which characterizes facility environment, When the corresponding target answer of target problem answer to be verified corresponding with target problem is all the same, that is, it can determine that target problem is corresponding Target answer and the corresponding answer matches to be verified of target problem, with facility environment be it is dangerous when, preferably guarantee mesh Mark the safety of the block chain private key of user.
In one implementation, as shown in Fig. 2, the method may include following steps:
S201: problem to be placed is shown;
S202: the selection instruction based on target user determines that target user chooses to be placed from problem to be placed Problem, as target problem;
S203: for the user identifier of target user, target problem and the corresponding target answer of target problem are recorded;
S204: the acquisition request for obtaining the corresponding block chain private key of target user is obtained;
Wherein, acquisition request includes: the user identifier of target user;
S205: the user identifier based on target user determines target problem and the corresponding target answer of target problem;
S206: the corresponding answer to be verified of target problem is obtained;
S207: judge whether the corresponding target answer of target problem answer to be verified corresponding with target problem matches;
S208: it when judging the corresponding target answer of target problem and the corresponding answer matches to be verified of target problem, obtains Block chain private key is obtained, and shows block chain private key to target user.
Wherein, S204 is identical as S101 shown in FIG. 1, and S205 is identical as S102 shown in FIG. 1, S206 with it is shown in FIG. 1 S103 is identical, and S207 is identical as S104 shown in FIG. 1, and S208 is identical as S105 shown in FIG. 1.
In the embodiment of the present invention, in order to preferably guarantee the safety of the corresponding block chain private key of each user, Mei Yiyong Problem corresponding to family can be selected by user oneself, and the corresponding answer of problem is arranged by oneself.This realization In mode, electronic equipment can show problem to be placed, and then the selection instruction based on target user to target user first, from The problem to be placed that target user chooses is determined in problem to be placed, as target problem, is obtained target user and is directed to target The target answer of problem setting for the user identifier of target user, records target problem and the corresponding mesh of target problem in turn Mark answer.
In oneainstance, when electronic equipment is terminal device, above-mentioned displaying problem to be placed may is that and pass through electricity The display exhibits that sub- equipment is connected problem to be placed, so that target user can select from the problem to be placed shown At least one problem, as target problem.Target user can be instructed with triggering selection, which can carry target use The mark of the selected each problem to be placed in family, so that electronic equipment when obtaining the selection instruction, can be based on the selection The mark of the entrained selected each problem to be placed of target user of instruction, determines target user from problem to be placed The problem to be placed chosen, as target problem.And then target user can be directed to each target problem, input corresponding target Answer;Electronic equipment obtains the target answer for target problem setting, and is directed to the user identifier of target user, records target Problem and the corresponding target answer of target problem.
In another scenario, when electronic equipment is server, above-mentioned displaying problem to be placed, may is that will be wait set The problem of setting is sent to the terminal device that target user is held, and terminal device is asked by the way that connected display exhibits are to be placed Topic, so that target user can select at least one problem from the problem to be placed shown, as target problem.Target is used Family can be instructed with triggering selection, which can carry the mark of the selected each problem to be placed of target user, So that terminal device is sent to electronic equipment after obtaining the selection instruction, by the selection instruction, electronic equipment obtains the choosing When selecting instruction, can based on the mark of the selected each problem to be placed of target user entrained by the selection instruction, to The problem to be placed that target user chooses is determined in offering question, as target problem.And then target user is held by it Some terminal devices input the target answer of each target problem, and each target which obtains target user's input is asked The target answer of topic, and it is sent to electronic equipment, the target that electronic equipment obtains each target problem that terminal device is sent is answered Case, and it is directed to the user identifier of target user, record target problem and the corresponding target answer of target problem.
It is subsequent, electronic equipment after obtaining acquisition request for obtaining the corresponding block chain private key of target user, The acquisition process of subsequent block chain private key can be continued to execute.
In one implementation, when target user completes the wallet account of itself based on the creation of block chain wallet application for the first time Behind family, which can generate the corresponding block chain private key of the target user for target user, be referred to as the mesh The corresponding block chain private key of wallet account of user is marked, at this point, when the electronic equipment can generate the target for target user After the corresponding block chain private key of user, electronic equipment can show problem to be placed to target user immediately, so that target is used Family encrypts the block chain private key.It is used alternatively, may is that when the electronic equipment can generate the target for target user After the corresponding block chain private key in family, which encodes the block chain private key, to generate two dimensional code, in turn, immediately Problem to be placed is shown to target user, so that target user encrypts the block chain private key.
In one implementation, which can generate the corresponding block chain of the target user for target user It, can not be immediately to target user's exhibition after generating two dimensional code after private key, or when electronic equipment encodes block chain private key Show problem to be placed, can be after receiving the offering question instruction of target user's triggering, show to target user wait set Set problem.Specifically, the method can also include: before the displaying problem to be placed the step of
Receive the offering question instruction of target user's triggering, wherein offering question instruction is used for: instruction shows to be placed ask Topic.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of acquisition device of block chain private key, such as Fig. 3 It is shown, the apparatus may include:
First obtains module 310, for obtaining the acquisition request for obtaining the corresponding block chain private key of target user, In, the acquisition request includes: the user identifier of the target user;
First determining module 320 determines target problem and the mesh for the user identifier based on the target user The corresponding target answer of mark problem;
Second obtains module 330, for obtaining the corresponding answer to be verified of the target problem;
Judgment module 340, for judge the corresponding target answer of the target problem it is corresponding with the target problem to Whether Validation Answer Key matches;
Display module 350 is obtained, judges the corresponding target answer of the target problem and the target problem pair for working as When the answer matches to be verified answered, the block chain private key is obtained, and show the block chain private key to the target user.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, described first module 310 is obtained, be specifically used for
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
In one implementation, described device further include:
Third obtains module, for it is described obtain the block chain private key before, when judge the target problem correspondence Target answer and the target problem corresponding answer matches to be verified when, obtain encrypted block chain private key;
4th obtains module, for obtaining target cipher key, wherein the target cipher key are as follows: for encrypted described The key that block chain private key is decrypted;
The acquisition display module 350, is specifically used for
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key, And the block chain private key is shown to the target user.
In one implementation, the target problem is the first quantity;
Described device can also include:
Detection module, for corresponding in the judgement corresponding target answer of target problem and the target problem Before whether answer to be verified matches, detection device environment obtains testing result;
The judgment module 340, is specifically used for
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second Quantity is less than first quantity.
In one implementation, described device can also include:
Display module, for determining target problem and the mesh in the user identifier based on the target user Before the corresponding target answer of mark problem, problem to be placed is shown;
Second determining module is determined from problem to be set for the selection instruction based on the target user The problem to be placed that the target user chooses, as target problem;
5th obtains module, for obtaining the target answer for being directed to target problem setting;
Logging modle records the target problem and the target for being directed to the user identifier of the target user The corresponding target answer of problem.
In one implementation, described device can also include:
Receiving module, for receiving the offering question of target user's triggering before the displaying problem to be placed Instruction, wherein the offering question instruction is used for: instruction shows problem to be placed.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of electronic equipment, as shown in figure 4, including Processor 410, communication interface 420, memory 430 and communication bus 440, wherein processor 410, communication interface 420, storage Device 430 completes mutual communication by communication bus 440,
Memory 430, for storing computer program;
Processor 410 when for executing the computer program stored on memory 430, realizes institute of the embodiment of the present invention The acquisition methods step of any of the above-described block chain private key provided:
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes: The user identifier of the target user;
Based on the user identifier of the target user, determine that target problem and the corresponding target of the target problem are answered Case;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, The block chain private key is obtained, and shows the block chain private key to the target user.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, the acquisition request obtained for obtaining target user corresponding block chain private key Step, comprising:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
In one implementation, before the acquisition block chain private key the step of, the method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, Obtain encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: for the encrypted block chain private key to be decrypted Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
In one implementation, the target problem is the first quantity;
It is in the judgement corresponding target answer of target problem and the corresponding answer to be verified of the target problem Before the step of no matching, further includes:
Detection device environment obtains testing result;
It is described to judge whether are the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem The step of matching, comprising:
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second Quantity is less than first quantity.
In one implementation, in the user identifier based on the target user, target problem and institute are determined Before the step of stating target problem corresponding target answer, further includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine what the target user chose from problem to be set Problem to be placed, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, the target problem and the corresponding target of the target problem are recorded Answer.
In one implementation, before the displaying problem to be placed the step of, further includes:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown Problem to be placed.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, control bus etc..For just It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), also may include non-easy The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also To be storage device that at least one is located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete Door or transistor logic, discrete hardware components.
Corresponding to above method embodiment, the embodiment of the invention provides a kind of computer readable storage medium, the meter It is stored with computer program in calculation machine readable storage medium storing program for executing, realizes that the present invention is implemented when the computer program is executed by processor The acquisition methods step of any of the above-described block chain private key provided by example:
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes: The user identifier of the target user;
Based on the user identifier of the target user, determine that target problem and the corresponding target of the target problem are answered Case;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, The block chain private key is obtained, and shows the block chain private key to the target user.
Using the embodiment of the present invention, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, wherein Acquisition request includes: the user identifier of target user;Based on user identifier, target problem and the corresponding mesh of target problem are determined Mark answer;Obtain the corresponding answer to be verified of target problem;Judge that the corresponding target answer of target problem is corresponding with target problem Answer to be verified whether match;When judging the corresponding target answer of target problem and the corresponding answer to be verified of target problem Timing obtains block chain private key, and shows block chain private key to target user.In the embodiment of the present invention, it can be asked by setting Topic, when so that user obtaining its corresponding block chain private key, after the answer for needing the problem of answering questions, can just show its correspondence to user Block chain private key, guarantee the safety of the corresponding block chain private key of user.The problem is problem related to user, privacy Stronger, the confidentiality of the corresponding block chain private key of user is more preferable, and then the safety of the corresponding block chain private key of user is higher.
In one implementation, the acquisition request obtained for obtaining target user corresponding block chain private key Step, comprising:
By way of scanning target two dimensional code, acquisition is asked for obtaining the acquisition of the corresponding block chain private key of target user It asks, wherein the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
In one implementation, before the acquisition block chain private key the step of, the method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, Obtain encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: for the encrypted block chain private key to be decrypted Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
In one implementation, the target problem is the first quantity;
It is in the judgement corresponding target answer of target problem and the corresponding answer to be verified of the target problem Before the step of no matching, further includes:
Detection device environment obtains testing result;
It is described to judge whether are the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem The step of matching, comprising:
Based on the testing result, judge the corresponding target answer of the target problem and the target problem it is corresponding to Whether Validation Answer Key matches, wherein when the testing result be the first testing result, and determine at least exist the second quantity institute State the corresponding answer to be verified of the corresponding target answer of target problem and the target problem it is identical when, determine the target problem Corresponding target answer and the corresponding answer matches to be verified of the target problem;When the testing result is the second detection knot Fruit, and determine that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same When, determine the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, described second Quantity is less than first quantity.
In one implementation, in the user identifier based on the target user, target problem and institute are determined Before the step of stating target problem corresponding target answer, further includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine what the target user chose from problem to be set Problem to be placed, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, the target problem and the corresponding target of the target problem are recorded Answer.
In one implementation, before the displaying problem to be placed the step of, further includes:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown Problem to be placed.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (10)

1. a kind of acquisition methods of block chain private key, which is characterized in that the described method includes:
Obtain the acquisition request for obtaining the corresponding block chain private key of target user, wherein the acquisition request includes: described The user identifier of target user;
Based on the user identifier of the target user, target problem and the corresponding target answer of the target problem are determined;
Obtain the corresponding answer to be verified of the target problem;
Judge whether the corresponding target answer of target problem answer to be verified corresponding with the target problem matches;
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, obtain The block chain private key, and the block chain private key is shown to the target user.
2. the method according to claim 1, wherein the acquisition is for obtaining the corresponding block chain of target user The step of acquisition request of private key, comprising:
By way of scanning target two dimensional code, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, Wherein, the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
3. according to the method described in claim 2, it is characterized in that, before the acquisition block chain private key the step of, The method also includes:
When judging the corresponding target answer of the target problem and the corresponding answer matches to be verified of the target problem, obtain Encrypted block chain private key;
Obtain target cipher key, wherein the target cipher key are as follows: close for the encrypted block chain private key to be decrypted Key;
The step of acquisition block chain private key, comprising:
The encrypted block chain private key is decrypted using the target cipher key, obtains the block chain private key.
4. the method according to claim 1, wherein the target problem is the first quantity;
It is described judge the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem whether With the step of before, the method also includes:
Detection device environment obtains testing result;
It is described to judge whether the corresponding target answer of the target problem and the corresponding answer to be verified of the target problem match The step of, comprising:
Based on the testing result, judge that the corresponding target answer of the target problem and the target problem are corresponding to be verified Whether answer matches, wherein when the testing result is the first testing result, and determines and at least there is the second quantity mesh When the corresponding answer to be verified of the corresponding target answer of mark problem and the target problem is identical, determine that the target problem is corresponding Target answer and the corresponding answer matches to be verified of the target problem;When the testing result be the second testing result, and When determining that the corresponding target answer of each target problem answer to be verified corresponding with the target problem is all the same, determine The corresponding target answer of target problem and the corresponding answer matches to be verified of the target problem, second quantity are less than First quantity.
5. method according to claim 1-4, which is characterized in that in the user based on the target user Mark, before the step of determining target problem and the target problem corresponding target answer, the method also includes:
Show problem to be placed;
Based on the selection instruction of the target user, determine that the target user chooses from problem to be set wait set Problem is set, as target problem;
Obtain the target answer for target problem setting;
For the user identifier of the target user, records the target problem and the corresponding target of the target problem is answered Case.
6. described according to the method described in claim 5, it is characterized in that, before the displaying problem to be placed the step of Method further include:
Receive the offering question instruction of target user's triggering, wherein the offering question instruction is used for: instruction is shown wait set Set problem.
7. a kind of acquisition device of block chain private key, which is characterized in that described device includes:
First obtains module, for obtaining the acquisition request for obtaining the corresponding block chain private key of target user, wherein described Acquisition request includes: the user identifier of the target user;
First determining module determines target problem and the target problem for the user identifier based on the target user Corresponding target answer;
Second obtains module, for obtaining the corresponding answer to be verified of the target problem;
Judgment module, for judging the corresponding target answer of target problem answer to be verified corresponding with the target problem Whether match;
Display module is obtained, judges that the corresponding target answer of the target problem and the target problem are corresponding to be tested for working as When demonstrate,proving answer matches, the block chain private key is obtained, and show the block chain private key to the target user.
8. device according to claim 7, which is characterized in that described first obtains module, is specifically used for
By way of scanning target two dimensional code, the acquisition request for obtaining the corresponding block chain private key of target user is obtained, Wherein, the target two dimensional code are as follows: the two dimensional code generated after being encoded to the block chain private key.
9. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program stored on memory, realizes any block of claim 1-6 The acquisition methods step of chain private key.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes the acquisition side of any block chain private key of claim 1-6 when the computer program is executed by processor Method step.
CN201811133232.9A 2018-09-27 2018-09-27 Block chain private key obtaining method and device and electronic equipment Pending CN109272317A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811133232.9A CN109272317A (en) 2018-09-27 2018-09-27 Block chain private key obtaining method and device and electronic equipment
PCT/CN2019/092971 WO2020062974A1 (en) 2018-09-27 2019-06-26 Method and apparatus for acquiring blockchain private key, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811133232.9A CN109272317A (en) 2018-09-27 2018-09-27 Block chain private key obtaining method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN109272317A true CN109272317A (en) 2019-01-25

Family

ID=65198644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811133232.9A Pending CN109272317A (en) 2018-09-27 2018-09-27 Block chain private key obtaining method and device and electronic equipment

Country Status (2)

Country Link
CN (1) CN109272317A (en)
WO (1) WO2020062974A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020062974A1 (en) * 2018-09-27 2020-04-02 北京金山安全软件有限公司 Method and apparatus for acquiring blockchain private key, and electronic device
WO2021057070A1 (en) * 2019-09-23 2021-04-01 创新先进技术有限公司 Blockchain-based submission processing method, device, and electronic apparatus
WO2023036143A1 (en) * 2021-09-07 2023-03-16 洪沛桦 Decentralized zero-trust identity verification and authentication system and method
CN116112167A (en) * 2023-04-13 2023-05-12 恒生电子股份有限公司 Key management system, method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580264A (en) * 2015-02-13 2015-04-29 人民网股份有限公司 Login method, registration method and login device as well as login and refrigeration system
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106686008A (en) * 2017-03-03 2017-05-17 腾讯科技(深圳)有限公司 Information storage method and information storage device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3348019A1 (en) * 2015-09-11 2018-07-18 Aware, Inc. Biometric verification of a blockchain database transaction contributor
CN106548345B (en) * 2016-12-07 2020-08-21 北京信任度科技有限公司 Method and system for realizing block chain private key protection based on key partitioning
CN108418680B (en) * 2017-09-05 2021-12-07 矩阵元技术(深圳)有限公司 Block chain key recovery method and medium based on secure multi-party computing technology
CN108235805B (en) * 2017-12-29 2021-07-30 达闼机器人有限公司 Account unifying method and device and storage medium
CN109272317A (en) * 2018-09-27 2019-01-25 北京金山安全软件有限公司 Block chain private key obtaining method and device and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580264A (en) * 2015-02-13 2015-04-29 人民网股份有限公司 Login method, registration method and login device as well as login and refrigeration system
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106686008A (en) * 2017-03-03 2017-05-17 腾讯科技(深圳)有限公司 Information storage method and information storage device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020062974A1 (en) * 2018-09-27 2020-04-02 北京金山安全软件有限公司 Method and apparatus for acquiring blockchain private key, and electronic device
WO2021057070A1 (en) * 2019-09-23 2021-04-01 创新先进技术有限公司 Blockchain-based submission processing method, device, and electronic apparatus
WO2023036143A1 (en) * 2021-09-07 2023-03-16 洪沛桦 Decentralized zero-trust identity verification and authentication system and method
CN116112167A (en) * 2023-04-13 2023-05-12 恒生电子股份有限公司 Key management system, method and device

Also Published As

Publication number Publication date
WO2020062974A1 (en) 2020-04-02

Similar Documents

Publication Publication Date Title
CN109272317A (en) Block chain private key obtaining method and device and electronic equipment
CN104780043B (en) Access control method and system based on two dimensional code
CN104601324B (en) A kind of verification method, terminal and system for application
CN103929307B (en) Cipher-code input method, intelligent cipher key equipment and client terminal device
CN105471581B (en) A kind of auth method and device
CN107864115A (en) A kind of method that user account login authentication is carried out using portable terminal
CN106506146A (en) Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN105095737A (en) Method and device for detecting weak password
KR20140042905A (en) Identity authentication and management device and method thereof
CN105184567B (en) Processing method, processing unit and the mobile terminal of information
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN109583181A (en) A kind of authentication method, device and machine readable storage medium
CN104104657B (en) Information Authentication method, server, terminal and system
CN104967594B (en) Stolen account identification method and apparatus
US20190312861A1 (en) System and method for grid-based one-time password
CN104573493B (en) A kind of method for protecting software and system
CN108121904B (en) Unlocking method, device, electronic equipment and server
CN109067545A (en) Key management method, device and storage medium
CN109547426A (en) Service response method and server
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN113312627B (en) Joint utilization method, device and system based on knowledge graph
CN108063748A (en) A kind of user authen method, apparatus and system
CN107423609A (en) A kind of authoring system, method and card
CN108989331A (en) Data storage device uses method for authenticating and its equipment and storage medium
CN106797386A (en) Safe verification method, device, terminal device and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190125