CN109412798A - Private key generation, data interactive method and its system of block chain - Google Patents
Private key generation, data interactive method and its system of block chain Download PDFInfo
- Publication number
- CN109412798A CN109412798A CN201811485600.6A CN201811485600A CN109412798A CN 109412798 A CN109412798 A CN 109412798A CN 201811485600 A CN201811485600 A CN 201811485600A CN 109412798 A CN109412798 A CN 109412798A
- Authority
- CN
- China
- Prior art keywords
- private key
- account number
- register account
- block chain
- number information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides the private keys of block chain to generate, data interactive method and its system, generation method include: the register account number information for obtaining and being input on block chain, and the register account number information includes register account number login password;The generation factor of private key to be generated is determined according to the register account number information for removing the register account number login password;The private key is generated according to the generation factor.The private key generated through the invention can be given for change; assets, data etc. caused by private key is lost in block chain node are avoided permanently to freeze; the problem of causing extreme loss; and third-party monitoring or audit are not needed; it can voluntarily give private key for change in the case where not needing third party's participation, both protect private key safety; guarantee the convenience that private key is given for change again, the data of effective protection user and the effect of assets can be played.
Description
Technical field
The present invention relates to block chain key generation techniques fields, more particularly to a kind of private key of block chain generates, number
According to exchange method and its system.
Background technique
Block chain can be realized assets digitlization and cross-platform circulation.In the transaction of block chain, user needs using private
Key signature, so that other nodes into block chain network prove the Consumer right of assets, private key be equivalent to user identity card or
The bank card password etc. of person user, preservation and management are particularly significant.
Private key is usually to be generated after being encrypted by elliptic curve encryption algorithm, system random number by a system random number
It can guarantee the uniqueness of private key, counter can not push away, can guarantee the uniqueness of private key in this way;It is privately owned that private key for user is stored in user
Block chain node in, if reform system, knot removal, private key delete and login password lose etc. can all cause private key
It loses, the private key of loss can not be retrieved, then assets, the data etc. in the block chain node will permanently be freezed, cause pole
Big loss.
Summary of the invention
Assets, data etc. in corresponding block chain node be will result in order to solve current private key loss permanently to freeze, nothing
The problem of method is retrieved, the present invention provide private key generation, data interactive method and its system of a kind of block chain.
In some embodiments, a kind of generation method of block chain private key, comprising:
The register account number information being input on block chain is obtained, the register account number information includes that register account number login is close
Code;
The generation factor of private key to be generated is determined according to the register account number information for removing the register account number login password;
The private key is generated according to the generation factor.
In some embodiments, the method also includes:
The block chain address of corresponding register account number is generated according to the public key obtained when generating the private key;
The private key is encrypted using the register account number login password, wherein the encrypted private key passes through
The form of file is stored on the node of the register account number information input, file of the block chain address as the file
Name.
In some embodiments, it includes: described for tracing for removing the register account number information of the register account number login password
The information in register account number source;And/or the information for proving register account number identity.
In some embodiments, private to be generated is determined according to the register account number information for removing the register account number login password
The generation factor of key, comprising:
The register account number information for removing the register account number login password is encrypted;
It combines the register account number information of the removal register account number login password of encryption to form encryption seed, wherein
The encryption seed is the generation factor of the private key to be generated.
In some embodiments, the method also includes:
The private key for receiving user's input gives solicited message for change, and the private key gives solicited message for change and includes: corresponding private to be given for change
The register account number information of key, wherein the register account number information of corresponding private key to be given for change is to remove the register account number login password
Information;
The generation factor corresponding with private key to be given for change is determined according to the register account number information of correspondence private key to be given for change;
The private key to be given for change is generated according to the generation factor corresponding with private key to be given for change.
In some embodiments, a kind of generation system of block chain private key, comprising:
Module is obtained, the register account number information being input on block chain is obtained, the register account number information includes registration account
Number login password;
Factor determining module is generated, is determined according to the register account number information for removing the register account number login password to be generated
Private key the generation factor;
Private key generation module generates the private key according to the generation factor.
In some embodiments, the system also includes:
Block chain address generation module generates the block of corresponding register account number according to the public key obtained when generating the private key
Chain address;
Private key encryption module encrypts the private key using the register account number login password, wherein encrypted
The private key is stored on the node of the register account number information input by way of file, and the block chain address is as institute
State the filename of file.
In some embodiments, it includes: described for tracing for removing the register account number information of the register account number login password
The information in register account number source;And/or the information for proving register account number identity.
In some embodiments, the generation factor determining module includes:
Symmetric cryptography unit encrypts the register account number information for removing the register account number login password;
Encryption seed generation unit the register account number information of the removal register account number login password of encryption combines shape
At encryption seed, wherein the encryption seed is the generation factor of the private key to be generated.
In some embodiments, the system also includes:
Receiving module, the private key for receiving user's input give solicited message for change, and the private key gives solicited message for change and includes: corresponding
The register account number information of private key to be given for change, wherein the register account number information of corresponding private key to be given for change is to remove the register account number
The information of login password;
Private key recovery module, it is corresponding with private key to be given for change according to the determination of the register account number information of correspondence private key to be given for change
The generation factor;And the private key to be given for change is generated according to the generation factor corresponding with private key to be given for change.
In some embodiments, a kind of block chain data interactive method, comprising:
The block chain address of user's input is received, the private key of the encryption of the corresponding block chain address is obtained;
The private key is decrypted according to the register account number login password that the user inputs;
Private key and public key corresponding with the private key based on decryption carry out data interaction with interactive object;
Wherein, the private key is determined according to the register account number information for removing the register account number login password.
In some embodiments, the private key and public key corresponding with the private key based on decryption is carried out with interactive object
Data interaction, comprising:
Data interaction is created, interaction data is treated using the private key of decryption and is signed;
According to the block chain address that user inputs, public key corresponding with the private key is determined, and use the public key verifications
The signature;
If being verified, broadcasting has the described to interaction data of private key signature, so that the interactive object obtains the tool
There is the described to interaction data of private key signature.
In some embodiments, a kind of block chain data interaction system, comprising:
Private key obtains module, receives the block chain address of user's input, obtains the encryption of the corresponding block chain address
Private key;
Private key deciphering module is decrypted the private key according to the register account number login password that the user inputs;
Data interaction module, private key and public key corresponding with the private key based on decryption carry out data with interactive object
Interaction;
Wherein, the private key is determined according to the register account number information for removing the register account number login password.
In some embodiments, the data interaction module includes:
Interaction creating unit, creates data interaction, treats interaction data using the private key of decryption and sign;
Signature verification unit determines public key corresponding with the private key according to the block chain address that user inputs, and uses
It signs described in the public key verifications;
Radio unit, if being verified, broadcasting has the described to interaction data of private key signature, for the interactive object
Obtain this with described in private key signature to interaction data.
In some embodiments, a kind of computer equipment, including memory, processor and storage on a memory and can located
The computer program run on reason device, the processor realize the generation method of above-mentioned block chain private key when executing described program
Step.
In some embodiments, a kind of computer equipment, including memory, processor and storage on a memory and can located
The computer program run on reason device, the processor realize the step of above-mentioned block chain data interactive method when executing described program
Suddenly.
In some embodiments, a kind of computer readable storage medium is stored thereon with computer program, the computer program
The step of generation method of above-mentioned block chain private key is realized when being executed by processor.
In some embodiments, a kind of computer readable storage medium is stored thereon with computer program, the computer program
The step of above-mentioned block chain data interactive method is realized when being executed by processor.
Beneficial effects of the present invention
Private key generation, data interactive method and its system of block chain provided by the invention, according to the removal registration account
The register account number information of number login password determines that the generation factor of private key to be generated when a private key is lost can be according to wait give for change
The generation factor of private key regenerate private key, there is uniqueness due to generating the factor, according to identical algorithm and generate
The factor is incoming to produce private key identical with private key to be given for change, can give the private key of loss for change in this way, avoids private key loss
The problem of caused assets, data etc. in block chain node are permanently freezed, cause extreme loss, and do not need third party
Supervision or audit can voluntarily give private key for change, not only protect private key safety in the case where not needing third party's participation, but also
Guarantee the convenience that private key is given for change, the data of effective protection user and the effect of assets can be played.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 shows one of the generation method flow diagram of block chain private key in the embodiment of the present invention.
Fig. 2 shows two of the generation method flow diagram of block chain private key in the embodiment of the present invention.
Fig. 3 shows three of the generation method flow diagram of block chain private key in the embodiment of the present invention.
Fig. 4 shows the idiographic flow schematic diagram of the step S2 in Fig. 1.
Fig. 5 shows one of the structural schematic diagram of the generation system of block chain private key in the embodiment of the present invention.
Fig. 6 shows the second structural representation of the generation system of block chain private key in the embodiment of the present invention.
Fig. 7 shows the third structural representation of the generation system of block chain private key in the embodiment of the present invention.
Fig. 8 shows the flow diagram of block chain data interactive method in the embodiment of the present invention.
Fig. 9 shows the idiographic flow schematic diagram of step S43 in Fig. 8.
Figure 10 shows the structural schematic diagram of block chain data interaction system in the embodiment of the present invention.
Figure 11 shows the concrete structure schematic diagram of data interaction module 130 in Figure 10.
Figure 12 shows the structural schematic diagram for being suitable for the computer equipment for being used to realize the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In block chain, the loss that can all cause private key is deleted, and can not be drawn if reforming system, knot removal, private key
It returns, then assets, the data etc. in the block chain node will permanently be freezed, causes extreme loss.
Based on this, the embodiment of the present invention provides a kind of generation method of block chain private key, and this method is according to the removal note
The register account number information of volume account login password determines the generation factor of private key to be generated, when a private key is lost, can according to
The generation factor for the private key given for change regenerates private key, has uniqueness due to generating the factor, simultaneously according to identical algorithm
The incoming i.e. producible private key identical with private key to be given for change of the factor is generated, the private key of loss can be both given for change in this way, avoid private key
The problem of assets, data etc. in block chain node caused by losing permanently are freezed, cause extreme loss, and do not need the
Tripartite's supervision or audit can voluntarily give private key for change in the case where not needing third party's participation, i.e. protection private key safety
Property, and guarantee the convenience that private key is given for change, the data of effective protection user and the effect of assets can be played.
Specifically, incorporated by reference to method flow schematic diagram shown in figure 1.The specific steps of this method include:
S1: obtaining the register account number information being input on block chain, and the register account number information includes that register account number logs in
Password.
S2: according to the register account number information for removing the register account number login password determine the generation of private key to be generated because
Son.
S3: the private key is generated according to the generation factor.
In some embodiments, register account number login password is that the account for some node for logging in or entering block chain is close
Code.
When needing to give private key for change, the register account number login password in the register account number information of input can be with private to be given for change
Login password when key generates for the first time is identical or different.For example, can not then be stepped on when user forgets register account number login password
It records personal node and causes the loss of private key if can not remember always, and in the present invention, generation and note due to private key
Volume account login password is not related, and therefore, whether the input for giving private key and register account number register account number login password for change is correct
It is unrelated, a new register account number login password, the password of the password and last time input can be determined while giving private key for change
It can be identical or different.
This field is illustrated, and private key is generated by rivest, shamir, adelman, for example, passing through the asymmetric calculation of elliptic curve/SM2
Method generates public private key pair, and private key is included in public private key pair, wherein generate private key by sha256 and base58, by sha256 and
RIPEMED generates public key.While generating private key, corresponding public key is necessarily generated.Only have with the data of public key encryption corresponding
Private key can be decrypted, and only have corresponding public key that can decrypt with the data of private key encryption.
The present invention determines the life of private key to be generated according to the register account number information for removing the register account number login password
At the factor, determine there is uniqueness, therefore generate according to the register account number information of removal register account number password due to generating the factor
Private key also there is uniqueness, as long as having recorded unique generation factor, can be regenerated by identical algorithm identical
Private key.Therefore, private key can be given for change.
In one embodiment, the factor is generated to be recorded on the node of corresponding register account number information input.
In another embodiment, any node can not be recorded in by generating the factor, but be generated in real time, as long as formulating
One determines rule, for example, the register account number information for uniquely removing the register account number login password can root
Determine that a unique generation factor, the rule are stored on the node of corresponding register account number information input according to the determination rule,
When needing to generate private key, the corresponding register account number for uniquely removing the register account number login password is first generated according to the rule
Then the generation factor of information generates private key according to the generation factor.At this point, when needing to give private key for change, before inputting again
The register account number information of the register account number login password is removed, can determine again and generate the factor, and due to determining rule
It being consistent, the generation factor thereby determined that is also unique, and the generation factor corresponding with private key to be given for change is identical, according to
The identical generation factor can then obtain private key identical with private key to be given for change by identical algorithm.
Generally, it on the public key broadcasts of generation to block chain and stores, private key is stored on personal node, in some implementations
In example, as shown in connection with fig. 2, the method also includes:
S4: the block chain address of corresponding register account number is generated according to the public key obtained when generating the private key;
S5: the private key is encrypted using the register account number login password, wherein the encrypted private key is logical
The form for crossing file is stored on the node of the register account number information input, text of the block chain address as the file
Part name.
For example, encrypted private key can be deposited using block chain address as filename by the encryption storage mode of KEY value
Storage is on personal node.In one embodiment, the content after private key encryption is stored in the form of binary hereof, with ground
Location is filename;The account password that Key value is user is encrypted when to private key encryption.
When it is implemented, register account number information further include: address name, identification card number, cell-phone number, user protect password etc.
Information.Those information are the information for proving user identity.
In addition, register account number information further includes the information for tracing the register account number source.
In the specific implementation, the user sent automatically when user inputs inputs the address of the input terminal at place, or is referred to as
For source address.Source address is the father address of the block chain address of the register account number;The block chain of the register account number
Location is the subaddressing of the source address;The application that the father address is sent for the subaddressing of auditing and audit.Above-mentioned letter
Breath can be existed simultaneously or is individually present, for example, having input the identification card number and mobile phone for proving identity when user inputs
Number, input terminal sends the corresponding address of the input terminal automatically.It is equivalent at this time on block chain and has input identification card number, cell-phone number
And the corresponding address of the input terminal.By obtaining above- mentioned information, that is, it can determine that unique generation factor.
In more detail, as shown in connection with fig. 4, step S2 is specifically included:
S21: the register account number information for removing the register account number login password is encrypted;
S22: combining to form encryption seed to the register account number information of the removal register account number login password of encryption,
In, the encryption seed is the generation factor of the private key to be generated.
In one embodiment, which can be user login name, address name, the unique ID of user, and said sequence can
It is arranged with being defined according to system.
The private key generated by the above method, process of exchange are as follows:
Step 1: inputting block chain address and password (being herein register account number login password), base area in personal node
The private key of encryption is found in location in node, is decrypted using password;It is decrypted after can also logging in, in decrypted private key individual's node
Fixed time limit is cached, can not have to decrypt again in fixed time limit;After fixed time limit, need to decrypt again;
Step 2: creation transaction, and use private key signature;
Step 3: submitting transaction;
Step 4: the public key of address is found according to transaction address, then using public key information verifying signature, after being verified
With regard to being packaged, and it is broadcast to the whole network.
It could be aware that by above-mentioned process of exchange, trading signature can be used for by the private key that previous embodiment generates.Under
It is described in detail in face of giving for change for private key, when needing to give private key for change, as shown in connection with fig. 3, the above method further include:
S6: the private key for receiving user's input gives solicited message for change, and the private key gives solicited message for change and includes: corresponding wait give for change
The register account number information of private key, wherein the register account number information of correspondence private key to be given for change is to remove the register account number to log in
The information of password;
S7: according to the register account number information of correspondence private key to be given for change determine corresponding with private key to be given for change generation because
Son.
S8: the private key to be given for change is generated according to the generation factor corresponding with private key to be given for change.Private key gives request for change
It is the removal register account number inputted when giving private key for change and generating that the register account number information wait give private key for change is corresponded in information
The register account number information of login password.
In one embodiment, interface is given for change by the private key shown as follows, the private key for receiving user's input gives request for change
Information.
" referenceAddress ": " preferred address ",
" userName ": " user login name ",
" userPwd ": " user login code ", " uniqueID ": " the unique ID of user ",
" name ": " address name "
}
Private key gives solicited message for change and register account number information is identical in form, asks the difference is that private key is given for change
The register account number login password in information is asked to attach most importance to newly-installed new password, with stepping in register account number information when generating
Record password may be the same or different.In the specific implementation, if giving the register account number information of interface input for change by private key
Think that the information is that private key gives solicited message for change.It is inputted if it is by register account number interface, then it is assumed that be register account number letter
Breath.
In a specific embodiment, private key gives solicited message for change and includes: identification card number, the cell-phone number inputted on block chain
And the corresponding address of the input terminal.By obtaining above- mentioned information, unique generation factor can be redefined out.Based on above-mentioned
The principle of explanation produces identical private key by identical algorithm, that is, has given loss for change according to the identical generation factor
Private key.
The embodiment of the present invention also provides a kind of block chain private key generation system.Detailed description based on the above method, can be with
Know, as shown in figure 5, the generation system specifically includes:
Module 100 is obtained, the register account number information being input on block chain is obtained, the register account number information includes registration
Account login password;
Generate factor determining module 200, according to the register account number information for removing the register account number login password determine to
The generation factor of the private key of generation;
Private key generation module 300 generates the private key according to the generation factor.
When needing to give private key for change, the register account number login password in the register account number information of input can be with private to be given for change
Login password when key generates for the first time is identical or different.For example, can not then be stepped on when user forgets register account number login password
It records personal node and causes the loss of private key if can not remember always, and in the present invention, generation and note due to private key
Volume account login password is not related, and therefore, whether the input for giving private key and register account number register account number login password for change is correct
It is unrelated, a new register account number login password, the password of the password and last time input can be determined while giving private key for change
It can be identical or different.
In some embodiments, register account number login password is that the account for some node for logging in or entering block chain is close
Code.
As hereinbefore, private key is generated by rivest, shamir, adelman, for example, asymmetric by elliptic curve/SM2
Algorithm generates public private key pair, and private key is included in public private key pair, wherein generate private key by sha256 and base58, by sha256 and
RIPEMED generates public key.While generating private key, corresponding public key is necessarily generated.Only have with the data of public key encryption corresponding
Private key can be decrypted, and only have corresponding public key that can decrypt with the data of private key encryption.
The present invention determines the life of private key to be generated according to the register account number information for removing the register account number login password
At the factor, determine there is uniqueness, therefore generate according to the register account number information of removal register account number password due to generating the factor
Private key also there is uniqueness, as long as having recorded unique generation factor, can be regenerated by identical algorithm identical
Private key.Therefore, private key can be given for change.
The factor is generated to be recorded on the node of corresponding register account number information input.Alternatively, generating the factor can not be remembered
Record generates in real time in any node, as long as formulating one determines rule, details are not described herein.
Generally, it on the public key broadcasts of generation to block chain and stores, private key is stored on personal node, in some implementations
In example, as shown in fig. 6, the system of generation further include:
Block chain address generation module 400 generates corresponding register account number according to the public key obtained when generating the private key
Block chain address;
Private key encryption module 500 encrypts the private key using the register account number login password, wherein encryption
The private key afterwards is stored on the node of the register account number information input by way of file, and the block chain address is made
For the filename of the file.
For example, encrypted private key can be deposited using block chain address as filename by the encryption storage mode of KEY value
Storage is on personal node.In one embodiment, the content after private key encryption is stored in the form of binary hereof, with ground
Location is filename;The account password that Key value is user is encrypted when to private key encryption.
When it is implemented, register account number information further include: address name, identification card number, cell-phone number, user protect password etc.
Information.Those information are the information for proving user identity.
In addition, register account number information further includes the information for tracing the register account number source.
In the specific implementation, the user sent automatically when user inputs inputs the address of the input terminal at place, or is referred to as
For source address.Source address is the father address of the block chain address of the register account number;The block chain of the register account number
Location is the subaddressing of the source address;The application that the father address is sent for the subaddressing of auditing and audit.Above-mentioned letter
Breath can be existed simultaneously or is individually present, for example, having input the identification card number and mobile phone for proving identity when user inputs
Number, input terminal sends the corresponding address of the input terminal automatically.It is equivalent at this time on block chain and has input identification card number, cell-phone number
And the corresponding address of the input terminal.By obtaining above- mentioned information, that is, it can determine that unique generation factor.
In a more detailed embodiment, the generation factor determining module 200 includes
Symmetric cryptography unit encrypts the register account number information for removing the register account number login password;
Encryption seed generation unit the register account number information of the removal register account number login password of encryption combines shape
At encryption seed, wherein the encryption seed is the generation factor of the private key to be generated.
In one embodiment, which can be user login name, address name, the unique ID of user, and said sequence can
It is arranged with being defined according to system.Based on the description in the above method, the present invention repeats no more the process of transaction, but can be obvious
Know, register account number login password can be used for trading signature and transaction verification.New register account number is used after private key is given for change
Login password encryption storage, improves the safety of private key.
When needing to give private key for change, as illustrated in FIG. 7, above system further include:
Receiving module 600, the private key for receiving user's input give solicited message for change, and the private key gives solicited message for change and includes:
The register account number information of corresponding private key to be given for change, wherein the register account number information of correspondence private key to be given for change is to remove the note
The information of volume account login password;
Private key recovery module 700, according to the determination of the register account number information of correspondence private key to be given for change and private key to be given for change
The corresponding generation factor;And the private key to be given for change is generated according to the generation factor corresponding with private key to be given for change.
It is defeated when giving private key for change and generating that private key, which gives the register account number information corresponded in solicited message wait give private key for change for change,
The register account number information of the removal register account number login password entered.
In one embodiment, interface is given for change by the private key shown as follows, the private key for receiving user's input gives request for change
Information.
" referenceAddress ": " preferred address ",
" userName ": " user login name ",
" userPwd ": " user login code ", " uniqueID ": " the unique ID of user ",
" name ": " address name "
}
Private key gives solicited message for change and register account number information is identical in form, asks the difference is that private key is given for change
The register account number login password in information is asked to attach most importance to newly-installed new password, with stepping in register account number information when generating
Record password may be the same or different.In the specific implementation, if giving the register account number information of interface input for change by private key
Think that the information is that private key gives solicited message for change.It is inputted if it is by register account number interface, then it is assumed that be register account number letter
Breath.
In a specific embodiment, private key gives solicited message for change and includes: identification card number, the cell-phone number inputted on block chain
And the corresponding address of the input terminal.By obtaining above- mentioned information, unique generation factor can be redefined out.Based on above-mentioned
The principle of explanation produces identical private key by identical algorithm, that is, has given loss for change according to the identical generation factor
Private key.Obviously, by the above-mentioned detailed description for generating system to private key of the invention, system of the invention can give loss for change
Private key, avoid assets, data etc. in block chain node caused by private key is lost and permanently freeze, cause extreme loss
Problem, and third-party monitoring or audit are not needed, private can be voluntarily given for change in the case where not needing third party's participation
Key had not only protected private key safety, but also guarantee the convenience that private key is given for change, can play the data and assets of effective protection user
Effect.
Further, such as the description of above-mentioned method of commerce, those of ordinary skill in the art can be according to the detailed transaction
Description carry out limit of power in summary obtain the present invention further provides block chain data interactive method.
As shown in figure 8, this method comprises:
S41: receiving the block chain address of user's input, obtains the private key of the encryption of the corresponding block chain address;
S42: the private key is decrypted according to the register account number login password that the user inputs;
S43: private key and public key corresponding with the private key based on decryption carry out data interaction with interactive object;
Wherein, the private key is determined according to the register account number information for removing the register account number login password.
According to the present invention the embodiment of above-mentioned private key generation method could be aware that, the present invention further provides block chain
Data interactive method can protect the data safety of the both sides of data interaction since private key can be given for change at any time.
In certain embodiments, as shown in figure 9, step S43 is specifically included:
S431: creation data interaction treats interaction data using the private key of decryption and signs;
S432: the block chain address inputted according to user is determined public key corresponding with the private key, is tested using the public key
Demonstrate,prove the signature;
S433: if being verified, broadcasting has the described to interaction data of private key signature, for interactive object acquisition
This with described in private key signature to interaction data.
It could be aware that, in actual use, majority of case uses above-mentioned data interactive method in transaction scene, is
More clearly indicate data interaction step of the invention, in a specific embodiment, process of exchange are as follows:
Step 1: inputting block chain address and password (being herein register account number login password), base area in personal node
The private key of encryption is found in location in node, is decrypted using password;It is decrypted after can also logging in, in decrypted private key individual's node
Fixed time limit is cached, can not have to decrypt again in fixed time limit;After fixed time limit, need to decrypt again;
Step 2: creation transaction, and use private key signature;
Step 3: submitting transaction;
Step 4: the public key of address is found according to transaction address, then using public key information verifying signature, after being verified
With regard to being packaged, and it is broadcast to the whole network.
Those skilled in the art are illustrated, what transaction was realized in block chain essentially by data interaction, therefore, although
The present invention only enumerates the embodiment of transaction, but main body according to the present invention is conceived, data interaction provided by the invention not office
It is limited to scene of trading, it will not go into details by the present invention.
In addition, the present invention further provides a kind of data interaction systems of block chain based on technical concept same as described above
System, similar with the above method, as shown in Figure 10, which includes:
Private key obtains module 110, receives the block chain address of user's input, obtains the encryption of the corresponding block chain address
Private key;
Private key deciphering module 120 is decrypted the private key according to the register account number login password that the user inputs;
Data interaction module 130, private key and public key corresponding with the private key based on decryption, is counted with interactive object
According to interaction;
Wherein, the private key is determined according to the register account number information for removing the register account number login password.
In certain embodiments, corresponding with above-mentioned block chain data interactive method, as shown in figure 11, data interaction module
130 specifically include:
Interaction creating unit 131, creates data interaction, treats interaction data using the private key of decryption and sign;
Signature verification unit 132 determines public key corresponding with the private key, makes according to the block chain address that user inputs
It signs described in the public key verifications;
Radio unit 133, if being verified, broadcasting has the described to interaction data of private key signature, for the interaction
Object acquisition this there is the described to interaction data of private key signature.
It could be aware that, according to the embodiment of above-mentioned private key generation method, the data interaction system of block chain provided by the invention
System, since private key can be given for change at any time, can protect the data safety of data interaction both sides.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is set
It is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant,
Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
In any equipment combination.Computer equipment specifically includes memory, processor and storage in a typical example
On a memory and the computer program that can run on a processor, the processor are realized as described above when executing described program
The method by client executing, alternatively, the processor execute described program when realize executed as described above by server
Method.
Below with reference to Figure 12, it illustrates the structures for the computer equipment 1200 for being suitable for being used to realize the embodiment of the present application to show
It is intended to.
As shown in figure 12, computer equipment 1200 include central processing unit (CPU) 1201, can according to be stored in only
Read the program in memory (ROM) 1202 or be loaded into random access storage device (RAM) from storage section 1208) in 1203
Program and execute various work appropriate and processing.In RAM1203, also it is stored with system 1200 and operates required various programs
And data.CPU1201, ROM1202 and RAM1203 are connected with each other by bus 1204.Input/output (I/O) interface 1205
It is also connected to bus 1204.
I/O interface 1205 is connected to lower component: the importation 1206 including keyboard, mouse etc.;Including such as cathode
The output par, c 1207 of ray tube (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section including hard disk etc.
1208;And including such as LAN card, the communications portion 1209 of the network interface card of modem etc..Communications portion 1209 passes through
Communication process is executed by the network of such as internet.Driver 1210 is also connected to I/O interface 1206 as needed.It is detachable to be situated between
Matter 1211, such as disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 1210, so as to
In mounted such as storage section 1208 as needed from the computer program read thereon.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description
Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readable
Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this
In the embodiment of sample, which can be downloaded and installed from network by communications portion 1209, and/or from removable
Medium 1211 is unloaded to be mounted.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (11)
1. a kind of private key generation method of block chain characterized by comprising
The register account number information being input on block chain is obtained, the register account number information includes register account number login password;
The generation factor of private key to be generated is determined according to the register account number information for removing the register account number login password;
The private key is generated according to the generation factor.
2. the method according to claim 1, wherein the method also includes:
The block chain address of corresponding register account number is generated according to the public key obtained when generating the private key;
The private key is encrypted using the register account number login password, wherein the encrypted private key passes through file
Form be stored on the node of the register account number information input, filename of the block chain address as the file.
3. the method according to claim 1, wherein removing the register account number letter of the register account number login password
Breath includes: the information for tracing the register account number source;And/or the information for proving register account number identity.
4. the method according to claim 1, wherein according to the registration account for removing the register account number login password
Number information determines the generation factor of private key to be generated, comprising:
The register account number information for removing the register account number login password is encrypted;
It combines the register account number information of the removal register account number login password of encryption to form encryption seed, wherein described
Encryption seed is the generation factor of the private key to be generated.
5. the method according to claim 1, wherein the method also includes:
The private key for receiving user's input gives solicited message for change, and the private key gives solicited message for change and includes: corresponding private key to be given for change
Register account number information, wherein the register account number information of corresponding private key to be given for change is the letter for removing the register account number login password
Breath;
The generation factor corresponding with private key to be given for change is determined according to the register account number information of correspondence private key to be given for change;
The private key to be given for change is generated according to the generation factor corresponding with private key to be given for change.
6. a kind of data interactive method of block chain characterized by comprising
The block chain address of user's input is received, the private key of the encryption of the corresponding block chain address is obtained;
According to the register account number login password that the user inputs, the private key is decrypted;
Private key and public key corresponding with the private key based on decryption carry out data interaction with interactive object;
Wherein, the private key is determined according to the register account number information for removing the register account number login password.
7. according to the method described in claim 6, it is characterized in that, the private key based on decryption and corresponding with the private key
Public key carries out data interaction with interactive object, comprising:
Data interaction is created, interaction data is treated using the private key of decryption and is signed;
According to the block chain address that user inputs, public key corresponding with the private key is determined, and using described in the public key verifications
Signature;
If being verified, broadcasting has the described to interaction data of private key signature, has private so that the interactive object obtains this
Key is signed described to interaction data.
8. a kind of private key of block chain generates system characterized by comprising
Module is obtained, obtains the register account number information being input on block chain, the register account number information includes that register account number is stepped on
Record password;
Factor determining module is generated, private to be generated is determined according to the register account number information for removing the register account number login password
The generation factor of key;
Private key generation module generates the private key according to the generation factor.
9. a kind of data interaction system of block chain characterized by comprising
Private key obtains module, receives the block chain address of user's input, obtains the private key of the encryption of the corresponding block chain address;
Private key deciphering module is decrypted the private key according to the register account number login password that the user inputs;
Data interaction module, private key and public key corresponding with the private key based on decryption carry out data interaction with interactive object;
Wherein, the private key is determined according to the register account number information for removing the register account number login password.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any one of claim 1 to 7 the method when executing described program
Step.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of any one of claim 1 to 7 the method is realized when processor executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811485600.6A CN109412798A (en) | 2018-12-06 | 2018-12-06 | Private key generation, data interactive method and its system of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811485600.6A CN109412798A (en) | 2018-12-06 | 2018-12-06 | Private key generation, data interactive method and its system of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109412798A true CN109412798A (en) | 2019-03-01 |
Family
ID=65457519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811485600.6A Withdrawn CN109412798A (en) | 2018-12-06 | 2018-12-06 | Private key generation, data interactive method and its system of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109412798A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071937A (en) * | 2019-04-30 | 2019-07-30 | 中国联合网络通信集团有限公司 | Login method, system and storage medium based on block chain |
CN110110532A (en) * | 2019-04-02 | 2019-08-09 | 广州奇大教育科技有限公司 | A kind of method and system based on block chain technical notes achievement |
CN110163604A (en) * | 2019-04-29 | 2019-08-23 | 华中科技大学 | A kind of block chain assets transfer method based on multi-party verification |
CN111311412A (en) * | 2020-02-24 | 2020-06-19 | 腾讯科技(深圳)有限公司 | Decentralized transaction confirmation method and device and server |
CN111339188A (en) * | 2020-02-20 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Block chain-based media content processing method, apparatus, device, and medium |
CN111355591A (en) * | 2020-02-27 | 2020-06-30 | 北京数资科技有限公司 | Block chain account safety management method based on real-name authentication technology |
CN111476572A (en) * | 2020-04-09 | 2020-07-31 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111711521A (en) * | 2020-06-19 | 2020-09-25 | 广州孢子科技有限公司 | Block chain account private key resetting method and system |
CN111988268A (en) * | 2019-05-24 | 2020-11-24 | 魏文科 | Method for establishing and verifying input value by using asymmetric encryption algorithm and application thereof |
CN112581285A (en) * | 2020-12-28 | 2021-03-30 | 上海万向区块链股份公司 | Block chain-based account generation method, system and medium in stock right transaction system |
WO2021081803A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | Blockchain system, supervision method, system, device, and computer storage medium |
CN112769566A (en) * | 2021-01-19 | 2021-05-07 | 上海布沁网络科技有限公司 | Block chain HD private key retrieving method |
CN112910638A (en) * | 2021-01-19 | 2021-06-04 | 上海布沁网络科技有限公司 | Block chain system key retrieving method |
CN113452503A (en) * | 2020-03-24 | 2021-09-28 | 山东浪潮质量链科技有限公司 | Block chain-based private key retrieving method, device and medium |
CN113890743A (en) * | 2021-10-04 | 2022-01-04 | 杭州复杂美科技有限公司 | Block chain retrieval private key generation and asset retrieval method, equipment and storage medium |
CN113922954A (en) * | 2021-10-04 | 2022-01-11 | 杭州复杂美科技有限公司 | Block chain private key generating and retrieving method, equipment and storage medium |
CN115277074A (en) * | 2022-06-21 | 2022-11-01 | 网思科技股份有限公司 | Encryption and decryption method, device, equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506146A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | Based on the Transaction Information method of calibration of block chain technology, apparatus and system |
US20170200225A1 (en) * | 2016-01-13 | 2017-07-13 | Itron, Inc. | Secure Customer Key Injection for Build-to-Stock Systems |
CN107169826A (en) * | 2017-05-09 | 2017-09-15 | 武汉凤链科技有限公司 | A kind of tourist attraction ticketing method and system based on block chain |
CN107276754A (en) * | 2017-07-10 | 2017-10-20 | 北京云知科技有限公司 | A kind of method and device that private key is largely generated based on block chain |
US20180083771A1 (en) * | 2016-09-20 | 2018-03-22 | United States Postal Service | Methods and systems for a digital trust architecture |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108833093A (en) * | 2018-06-14 | 2018-11-16 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, equipment and the storage medium of account key |
-
2018
- 2018-12-06 CN CN201811485600.6A patent/CN109412798A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170200225A1 (en) * | 2016-01-13 | 2017-07-13 | Itron, Inc. | Secure Customer Key Injection for Build-to-Stock Systems |
US20180083771A1 (en) * | 2016-09-20 | 2018-03-22 | United States Postal Service | Methods and systems for a digital trust architecture |
CN106506146A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | Based on the Transaction Information method of calibration of block chain technology, apparatus and system |
CN107169826A (en) * | 2017-05-09 | 2017-09-15 | 武汉凤链科技有限公司 | A kind of tourist attraction ticketing method and system based on block chain |
CN107276754A (en) * | 2017-07-10 | 2017-10-20 | 北京云知科技有限公司 | A kind of method and device that private key is largely generated based on block chain |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108833093A (en) * | 2018-06-14 | 2018-11-16 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, equipment and the storage medium of account key |
Non-Patent Citations (2)
Title |
---|
智联教育编著: "《电脑打字全能修炼》", 31 December 2005, 四川电子音像出版社 * |
编程手札: "比特币钱包注册", 《百度经验》 * |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110532A (en) * | 2019-04-02 | 2019-08-09 | 广州奇大教育科技有限公司 | A kind of method and system based on block chain technical notes achievement |
CN110163604B (en) * | 2019-04-29 | 2021-02-09 | 华中科技大学 | Block chain asset transfer method based on multi-party verification |
CN110163604A (en) * | 2019-04-29 | 2019-08-23 | 华中科技大学 | A kind of block chain assets transfer method based on multi-party verification |
CN110071937B (en) * | 2019-04-30 | 2022-01-25 | 中国联合网络通信集团有限公司 | Login method, system and storage medium based on block chain |
CN110071937A (en) * | 2019-04-30 | 2019-07-30 | 中国联合网络通信集团有限公司 | Login method, system and storage medium based on block chain |
CN111988268A (en) * | 2019-05-24 | 2020-11-24 | 魏文科 | Method for establishing and verifying input value by using asymmetric encryption algorithm and application thereof |
WO2021081803A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | Blockchain system, supervision method, system, device, and computer storage medium |
CN111339188A (en) * | 2020-02-20 | 2020-06-26 | 百度在线网络技术(北京)有限公司 | Block chain-based media content processing method, apparatus, device, and medium |
CN111339188B (en) * | 2020-02-20 | 2023-10-31 | 百度在线网络技术(北京)有限公司 | Media content processing method, device, equipment and medium based on blockchain |
CN111311412A (en) * | 2020-02-24 | 2020-06-19 | 腾讯科技(深圳)有限公司 | Decentralized transaction confirmation method and device and server |
CN111355591A (en) * | 2020-02-27 | 2020-06-30 | 北京数资科技有限公司 | Block chain account safety management method based on real-name authentication technology |
CN113452503B (en) * | 2020-03-24 | 2023-02-17 | 山东浪潮质量链科技有限公司 | Block chain-based private key retrieving method, device and medium |
CN113452503A (en) * | 2020-03-24 | 2021-09-28 | 山东浪潮质量链科技有限公司 | Block chain-based private key retrieving method, device and medium |
CN111476572A (en) * | 2020-04-09 | 2020-07-31 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111476572B (en) * | 2020-04-09 | 2024-03-19 | 财付通支付科技有限公司 | Block chain-based data processing method, device, storage medium and equipment |
CN111711521A (en) * | 2020-06-19 | 2020-09-25 | 广州孢子科技有限公司 | Block chain account private key resetting method and system |
CN111711521B (en) * | 2020-06-19 | 2023-05-05 | 广东小蛐科技有限公司 | Block chain account private key resetting method and system |
CN112581285A (en) * | 2020-12-28 | 2021-03-30 | 上海万向区块链股份公司 | Block chain-based account generation method, system and medium in stock right transaction system |
CN112769566A (en) * | 2021-01-19 | 2021-05-07 | 上海布沁网络科技有限公司 | Block chain HD private key retrieving method |
CN112910638A (en) * | 2021-01-19 | 2021-06-04 | 上海布沁网络科技有限公司 | Block chain system key retrieving method |
CN113922954A (en) * | 2021-10-04 | 2022-01-11 | 杭州复杂美科技有限公司 | Block chain private key generating and retrieving method, equipment and storage medium |
CN113890743A (en) * | 2021-10-04 | 2022-01-04 | 杭州复杂美科技有限公司 | Block chain retrieval private key generation and asset retrieval method, equipment and storage medium |
CN115277074A (en) * | 2022-06-21 | 2022-11-01 | 网思科技股份有限公司 | Encryption and decryption method, device, equipment and storage medium |
CN115277074B (en) * | 2022-06-21 | 2024-03-19 | 网思科技股份有限公司 | Encryption and decryption method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109412798A (en) | Private key generation, data interactive method and its system of block chain | |
CN108681966B (en) | Information supervision method and device based on block chain | |
CN108898475B (en) | Attribute encryption-based alliance block chain credit implementation method and system | |
CN111080295B (en) | Electronic contract processing method and device based on blockchain | |
EP2947812B1 (en) | Segmented secret-key storage system, segment storage apparatus segmented secret-key storage method | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN110033258A (en) | Business datum encryption method and device based on block chain | |
CN105656864B (en) | Key management system and management method based on TCM | |
EP2947814B1 (en) | Tampering detection device, tampering detection method, and program | |
CN105553654B (en) | Key information processing method and device, key information management system | |
CN111950030A (en) | Data sharing storage method based on block chain, terminal equipment and storage medium | |
CN113067823B (en) | Mail user identity authentication and key distribution method, system, device and medium | |
CN112651742B (en) | Monitorable distributed confidential transaction system and method | |
JP2004147218A (en) | Data division management method and program | |
CN112332975A (en) | Internet of things equipment secure communication method and system | |
CN109660534A (en) | Safety certifying method, device, electronic equipment and storage medium based on more trade companies | |
CN111027981A (en) | Method and device for multi-party joint training of risk assessment model for IoT (Internet of things) machine | |
CN112347516A (en) | Asset certification method and device based on block chain | |
CN116308776A (en) | Transaction supervision method and device based on blockchain, electronic equipment and storage medium | |
CN104160651A (en) | Byzantine fault tolerance and threshold coin tossing | |
CN109818965A (en) | Personal verification device and method | |
CN113794706A (en) | Data processing method and device, electronic equipment and readable storage medium | |
CN111010283B (en) | Method and apparatus for generating information | |
CN112687363A (en) | Health code public service method and platform | |
CN106487509B (en) | A kind of method and host equipment generating key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210121 Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Address before: 100034 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing. Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190301 |
|
WW01 | Invention patent application withdrawn after publication |