CN109560936A - The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key - Google Patents
The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key Download PDFInfo
- Publication number
- CN109560936A CN109560936A CN201811324061.8A CN201811324061A CN109560936A CN 109560936 A CN109560936 A CN 109560936A CN 201811324061 A CN201811324061 A CN 201811324061A CN 109560936 A CN109560936 A CN 109560936A
- Authority
- CN
- China
- Prior art keywords
- private key
- loss
- block chain
- user
- reported
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of to protect and handle the method that private key is lost or identity data is stolen problem for digital asset private key, comprising the following steps: after private key generation, the identity data for generating the private key is saved for user;After private key for user is lost or is stolen, new private spoon-address pair is generated;User or the side of stealing initiate to report the loss transaction, while guarantee deposit;Verify whether it is correctly to sign, it is incorrect, judge that this reports the loss invalid not deposit released;This time is reported the loss behavior and locks a delay cycle by block chain node, and original transferable assets of private key, reporting the loss the corresponding private spoon in new address cannot transfer assets;After delay cycle, reporting the loss the corresponding private spoon in new address can transfer assets.The present invention is truly realized " private key does not go out hardware " without private key mnemonic word is backed up, and significantly reduces private key and is stolen risk, and private key is easy to give assets for change after losing, and avoids losing assets because private spoon loses;Assets can also protect a period of time after private spoon is stolen, enhance the anti-theft performance of digital asset.
Description
Technical field
The present invention relates to a kind of processing methods of various digital assets established based on block chain technology, more particularly to one kind
The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key.
Background technique
According to newest data statistics, currently based on the technology application in the world of block chain and universal,
The digital cash market based on block chain technology of presently the most mainstream alreadys exceed 100,000,000,000 U.S. dollars, as bit coin (BTC), with
Too coin (ETH), Lay spy coin (LTC), auspicious wave coin (Ripple) etc..
Block chain is a string of associated data blocks generated using cryptography method, and this data block contains a number
The information aggregate of word currency network trading, this data block based on Hash chain type construction combine strong barrier of trying hard to keep of calculating to realize
The technological infrastructure with higher public credibility of " can not be distorted once confirmed ", so that block chain technology also becomes point
The new application mode of the computer technologies such as the storage of cloth data, point-to-point transmission, decentralization common recognition mechanism, Encryption Algorithm.
With the fast development of block chain technology, so that digital cash steps into everybody visual field, and it is a large amount of digital
The appearance of moneytary operations has also expedited the emergence of digital wallet exploitation industry, the Internet characteristics used according to digital wallet, digital wallet
It is divided into hot money packet and two kinds of cold wallet.
The essential function of all digital wallets manages private key and the address of oneself with being all to aid in user security, due to block
The technology of the right to use and ownership equity that chain technology is established, private key is the exclusive evidence that user possesses digital asset.Due to
The decentralization and security feature of private key are that no any method uses digital asset after loss.
Although block chain technology is built upon on the basis of stringent cryptography, there is high safety, however private key is
Give user oneself keeping, and user during using private key it is various it is subjective or objective due to, cause private key to be lost
It loses or private key is stolen, the event so as to cause huge loss happens occasionally.If famous Mt.Gox exchange is once because private key is lost
Mistake causes 850,000 bit coin of transaction platform to be lost, to cause that a large amount of transaction is chaotic and user is discontented with.
This series of digital cash loses or stolen case, and behind all reflects the most heavy of block chain network safety
Want link, the i.e. safety issue of digital cash wallet.
Currently, the technical solution of digital wallet existing in the market, from operation type angle, there are the divisions of three kinds of forms
(sequence to grow from weak to strong by safety): private key and trading signature are hosted in the trustship type of third-party platform completely;Private key
What the signature of the hot money Packet type carried out with the signature of transaction at the end app, private key and transaction and extraneous network completely cut off complete cold deposits
Store up type.
But either which kind of solution cannot all solve the fundamental issue that private key is lost, private key is stolen, and reason is such as
Under: the type completely by third-party platform trustship such as private key and transaction can be not good at, technical leak etc. due to third-party platform operation
Reason will lead to private key and lose or be stolen;It, in use may be due to if private key and the signature of transaction carry out at the end app
The case where improper, mobile phone software and hardware loophole of user's operation etc. causes private key to leak;The completely cold storage scheme of private key is also recognized
To be current safest private key keeping scheme, but due to the unreliability of hardware, the either production firm of hardware wallet
Or expert can suggest user for the mnemonic word offline backup of private key, when to prevent hardware fault, can restore private by mnemonic word
Key, this is also the feature of many hardware wallets publicity " private key does not go out hardware " at present, however in fact, backup mnemonic word and direct
There is no differences (because mnemonic word can directly restore private key offline) substantially for backup private key, and are not implemented truly
" private key do not go out hardware " feature.
Summary of the invention
The object of the invention is that provide a kind of for the protection of digital asset private key and place to solve the above-mentioned problems
Manage the method that private key is lost or identity data is stolen problem.
The present invention through the following technical solutions to achieve the above objectives:
A method of private key loss is protected and handled for digital asset private key or identity data is stolen problem, including following step
It is rapid:
Step (1): after private key generation, block chain arbitrarily generate the fixed message m sg of a nontransaction data and length for
Family selection, block chain do Hash operation to message msg and obtain H=Hash(msg), then final cryptographic Hash H is executed with private key
Digital signature obtains signature result sign, and block chain saves (msg, sign) as the identity data of the private key for user;
Step (2): after private key for user is lost or identity data is stolen, block chain generates new after user or the side's of stealing application
Private spoon-address pair;
Step (3): user or the side of stealing using new address, account address to be reported the loss and account to be reported the loss identity data (msg,
Sign) pass through intelligent contract or multi-signature type of transaction as parameter and report the loss transaction to the initiation of block chain node, meanwhile, user
Or steal and be stored on the address Fang Xin after the guarantee fund of certain number, block chain node just starts to be transferred to next step;Here
Guarantee fund's number can change according to actual needs, such as same user for the first time report the loss for x member, reported the loss for the second time as 2x
Member, and so on;
Step (4): block chain node verifies whether it is correctly to sign using the identity data (msg, sign) of account to be reported the loss,
If verifying signature is mismatched with the address reported the loss, block chain node determines that this time behavior of reporting the loss is that a malice reports the loss row
For this is reported the loss in vain, while not deposit released;If address matching verifying signature and reported the loss, block chain node are sentenced
It is fixed this time to report the loss behavior effectively and be transferred to next step;
Step (5): this time is reported the loss behavior and locks a delay cycle by block chain node, within the time of this delay cycle,
The private key of account itself is allowed to normally transfer accounts or withdraw deposit fund and guarantee fund;Meanwhile the new address registered when reporting the loss is corresponding
Private key is not allowed to transfer fund and guarantee fund;Here delay cycle determine according to actual needs, for example ten days is a week
Phase;
Step (6): after delay cycle, private key corresponding to the address registered when reporting the loss is allowed to transfer and is reported the loss account
In assets and guarantee fund.
Specifically, in the step (4), it is to judge verify that whether block chain node verification, which is the method correctly signed,
Whether (msg, sign)=addr is true, sets up and then determines to be correctly to sign, is otherwise determined as incorrect signature.Here
" verify(msg, sign)=addr " represents and is meant that: whether determines to the signature value sign of message msg really by address
What the private key of addr was signed, be a kind of general-purpose algorithm process.
The beneficial effects of the present invention are:
Present invention combination hardware wallet, user only need to back up the identity data crossed through private key signature, and nothing is backed up private key
Mnemonic word is truly realized " private key does not go out hardware ", and significantly reducing reduces the stolen risk of private key, obtains the digital asset of user
To more preferable protection;After private key for user loss, the present invention does not go to attempt to restore or gives private key for change by technical solution, leads to
It crosses on a chain and reports the loss process, the fund security for losing the account of private key is transferred in other accounts, theoretically also
Without excessively worrying that private key is really lost, user's digital loss assets due to private spoon loses are avoided;The present invention passes through starting
Report the loss before process must guarantee deposit method, make the malice behavior of reporting the loss of user oneself that can lose certain number assets, lead to
Punishment user to be crossed to want to test the behavior that identity data is reported the loss come malice by violence, the malice for reducing user oneself reports the loss rate,
Operating load is reduced for block chain;It if the identity data side of being stolen is stolen, is not taken care of well to user
A kind of punishment of oneself identity data can also remind user more cannily to protect the identity data of oneself later;The present invention is logical
Increase delay cycle process is crossed, in the case where the identity data of user is stolen, the side of stealing can successfully pass and report the loss request
Verifying, but digital asset still cannot be shifted in delay cycle after reporting the loss successfully, and in delay cycle, user itself can also borrow
It helps block chain to check oneself assets or registers the notice service of the platform of other account operations notice service, it is stolen to grasp account in time
The case where side of taking maliciously is reported the loss, during this period in, user can (user ID data be stolen, private key sheet by oneself private key
Body is not lost) the one's own digital asset of safe transfer, significantly enhance the anti-theft performance of digital asset.Above-mentioned several respects
Technological improvement although have different emphasis, but be all to belong to an Integral Thought and overall flow, it is interrelated, so conduct
Same part patent application.
Specific embodiment
Below with reference to embodiment, the invention will be further described:
Embodiment:
A method of private key loss is protected and handled for digital asset private key or identity data is stolen problem, including following step
It is rapid:
Step (1): after private key generation, block chain arbitrarily generate the fixed message m sg of a nontransaction data and length for
Family selection, block chain do Hash operation to message msg and obtain H=Hash(msg), then final cryptographic Hash H is executed with private key
Digital signature obtains signature result sign, and block chain saves (msg, sign) as the identity data of the private key for user;
Step (2): after private key for user is lost or identity data is stolen, block chain generates new private spoon-ground after user applies
Location pair;
Step (3): user using new address, account address to be reported the loss and account to be reported the loss identity data (msg, sign) conduct
Parameter passes through intelligent contract or multi-signature type of transaction and reports the loss transaction to the initiation of block chain node, meanwhile, user is in new address
After the guarantee fund of the upper certain number of deposit, block chain node just starts to be transferred to next step;Here guarantee fund's number according to
Actual needs can change, such as same user for the first time report the loss for x member, report the loss for the second time for 2x member, and so on;
Step (4): block chain node verifies whether it is correctly to sign using the identity data (msg, sign) of account to be reported the loss,
Judge verify(msg, sign) whether=addr true, invalid, is determined as incorrect signature, i.e., it verifying signature and reports the loss
Address mismatch, then block chain node determine this time behavior of reporting the loss be that a malice reports the loss behavior, this is reported the loss in vain, simultaneously
Not deposit released;It sets up and then determines to be correctly to sign, that is, the address matching verifying signature and reporting the loss, then block chain node determines
This is reported the loss behavior effectively and is transferred to next step;
Step (5): this time is reported the loss behavior and locks a delay cycle by block chain node, within the time of this delay cycle,
The private key of account itself is allowed to normally transfer accounts or withdraw deposit fund and guarantee fund;Meanwhile the new address registered when reporting the loss is corresponding
Private key is not allowed to transfer fund and guarantee fund;Here delay cycle determine according to actual needs, for example ten days is a week
Phase;
Step (6): after delay cycle, private key corresponding to the address registered when reporting the loss is allowed to transfer and is reported the loss account
In assets and guarantee fund.
Above-described embodiment improves conventional digital safeguarding of assets method in terms of three: first, user only needs
The good identity data crossed through private key signature of backup is truly realized " private key does not go out hardware ", significantly without the mnemonic word for being backed up private key
The stolen risk of private key is reduced, protects the digital asset of user more preferably;Second, not being logical after private key for user loss
Technical solution is crossed to go to attempt to restore or give for change private key, but by reporting the loss process on a chain, the account of private key will be lost
Fund security is transferred in other accounts, just do not have to theoretically yet it is excessive worry that private key is really lost, avoid user because
Private spoon is lost and digital loss assets;Third, by increasing delay cycle process, in the stolen situation of the identity data of user
Under, the side of stealing can successfully pass the verifying for reporting the loss request, but still cannot shift digital money in delay cycle after reporting the loss successfully
It produces, and in delay cycle, user itself can also check oneself assets by block chain or register the notice service of other account operations
The notice service of platform, grasps the case where account side of being stolen maliciously is reported the loss in time, interior during this period, and user can be by certainly
Oneself private key (identity data is stolen, and private key itself is not lost) one's own digital asset of safe transfer, and steal Fang Ze
It cannot succeed, significantly enhances the anti-theft performance of digital asset.Process is reported the loss due to increasing, so there are user oneself malice
If the possibility reported the loss will increase the operating load of block chain this too many to the behavior that block chain is nonsensical, or more
State method by starting report the loss before process must guarantee deposit, make the malice behavior of reporting the loss of user oneself that can lose certain number
Assets reduce the malice of user oneself by punishing that user wants to test the behavior that identity data is reported the loss come malice by violence
Rate is reported the loss, reduces operating load for block chain.Certainly, if the private spoon and identity data of user are stolen simultaneously, the side of stealing
Digital asset arbitrarily can be shifted as user oneself, such case cannot be protected, because if protecting, just
The digital asset that oneself can be dominated to user raises obstacles, and cannot implement.
Above-described embodiment is presently preferred embodiments of the present invention, is not a limitation on the technical scheme of the present invention, as long as
Without the technical solution that creative work can be realized on the basis of the above embodiments, it is regarded as falling into the invention patent
Rights protection scope in.
Claims (2)
1. a kind of protect for digital asset private key and handle the method that private key is lost or identity data is stolen problem, feature exists
In: the following steps are included:
Step (1): after private key generation, block chain arbitrarily generate the fixed message m sg of a nontransaction data and length for
Family selection, block chain do Hash operation to message msg and obtain H=Hash(msg), then final cryptographic Hash H is executed with private key
Digital signature obtains signature result sign, and block chain saves (msg, sign) as the identity data of the private key for user;
Step (2): after private key for user is lost or identity data is stolen, block chain generates new after user or the side's of stealing application
Private spoon-address pair;
Step (3): user or the side of stealing using new address, account address to be reported the loss and account to be reported the loss identity data (msg,
Sign) pass through intelligent contract or multi-signature type of transaction as parameter and report the loss transaction to the initiation of block chain node, meanwhile, user
Or steal and be stored on the address Fang Xin after the guarantee fund of certain number, block chain node just starts to be transferred to next step;
Step (4): block chain node verifies whether it is correctly to sign using the identity data (msg, sign) of account to be reported the loss,
If verifying signature is mismatched with the address reported the loss, block chain node determines that this time behavior of reporting the loss is that a malice reports the loss row
For this is reported the loss in vain, while not deposit released;If address matching verifying signature and reported the loss, block chain node are sentenced
It is fixed this time to report the loss behavior effectively and be transferred to next step;
Step (5): this time is reported the loss behavior and locks a delay cycle by block chain node, within the time of this delay cycle,
The private key of account itself is allowed to normally transfer accounts or withdraw deposit fund and guarantee fund;Meanwhile the new address registered when reporting the loss is corresponding
Private key is not allowed to transfer fund and guarantee fund;
Step (6): after delay cycle, private key corresponding to the address registered when reporting the loss is allowed to transfer and is reported the loss account
In assets and guarantee fund.
2. according to claim 1 protect and handle private key loss or the stolen problem of identity data for digital asset private key
Method, it is characterised in that: in the step (4), block chain node verification whether be the method correctly signed be judgement
Verify(msg, sign) whether=addr true, and it sets up and then determines to be correctly to sign, be otherwise determined as incorrect signature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811324061.8A CN109560936A (en) | 2018-11-08 | 2018-11-08 | The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811324061.8A CN109560936A (en) | 2018-11-08 | 2018-11-08 | The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109560936A true CN109560936A (en) | 2019-04-02 |
Family
ID=65866050
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811324061.8A Pending CN109560936A (en) | 2018-11-08 | 2018-11-08 | The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109560936A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110163604A (en) * | 2019-04-29 | 2019-08-23 | 华中科技大学 | A kind of block chain assets transfer method based on multi-party verification |
CN111210224A (en) * | 2019-12-23 | 2020-05-29 | 中思博安科技(北京)有限公司 | Access control method and device in block chain network |
CN111738717A (en) * | 2020-06-01 | 2020-10-02 | 清华大学 | Digital wallet security protection method and device, electronic equipment and storage medium |
CN113158199A (en) * | 2020-02-23 | 2021-07-23 | 鄢华中 | Infinite embedded decentralized block chain digital asset security system and method |
CN113283887A (en) * | 2021-06-04 | 2021-08-20 | 杭州复杂美科技有限公司 | Asset retrieving method, device and storage medium based on privacy |
US11676141B2 (en) | 2020-04-02 | 2023-06-13 | Baidu International Technology (Shenzen) Co., Ltd. | Block chain-based asset processing method, device, apparatus and storage medium |
-
2018
- 2018-11-08 CN CN201811324061.8A patent/CN109560936A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110163604A (en) * | 2019-04-29 | 2019-08-23 | 华中科技大学 | A kind of block chain assets transfer method based on multi-party verification |
CN110163604B (en) * | 2019-04-29 | 2021-02-09 | 华中科技大学 | Block chain asset transfer method based on multi-party verification |
CN111210224A (en) * | 2019-12-23 | 2020-05-29 | 中思博安科技(北京)有限公司 | Access control method and device in block chain network |
CN113158199A (en) * | 2020-02-23 | 2021-07-23 | 鄢华中 | Infinite embedded decentralized block chain digital asset security system and method |
US11676141B2 (en) | 2020-04-02 | 2023-06-13 | Baidu International Technology (Shenzen) Co., Ltd. | Block chain-based asset processing method, device, apparatus and storage medium |
CN111738717A (en) * | 2020-06-01 | 2020-10-02 | 清华大学 | Digital wallet security protection method and device, electronic equipment and storage medium |
CN111738717B (en) * | 2020-06-01 | 2022-10-28 | 清华大学 | Digital wallet security protection method and device, electronic equipment and storage medium |
CN113283887A (en) * | 2021-06-04 | 2021-08-20 | 杭州复杂美科技有限公司 | Asset retrieving method, device and storage medium based on privacy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109560936A (en) | The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key | |
CN108389047B (en) | Method for trading between parent chain and child chain in block chain and block chain network | |
EP0995177B1 (en) | Symmetrically-secured electronic communication system | |
CN102725737B (en) | The encryption and decryption of anti-leak can be verified | |
JP2002520905A (en) | Method and device for updating a cryptographic index key having leakage resistance | |
US20210142318A1 (en) | Mapping system and corresponding method to realize digital assets on the mapping chain based on distributed technology | |
US20220138740A1 (en) | Computer-implemented method, a computer system and a cryptocurrency depository for enabling secure escrow and safekeeping of a cryptocurrency | |
WO2015161123A1 (en) | Distributed crypto currency unauthorized transfer monitoring system | |
CN111275411B (en) | Off-line transaction method and system for digital currency wallet and user identity identification card | |
CN113298526A (en) | Offline bill generation method and device | |
CN110046906A (en) | A kind of the two-way authentication method of commerce and system of MPOS machine and server | |
CN110634072B (en) | Block chain transaction system based on multi-signature and hardware encryption | |
CN107205080B (en) | Smart phone with independent financial transaction system | |
Chen et al. | Enhancement of the RFID security method with ownership transfer | |
CN110648235A (en) | Cross-chain asset transfer method based on trusted computing environment (TEE) | |
JP2004531163A (en) | Cryptographic communication method for protection of electronic chips against fraudulent activities | |
CN113627902A (en) | Method and system for preventing block chain intrusion | |
CN115082067B (en) | Digital currency double-off-line payment method and device based on SM2 | |
CN116342265A (en) | Block chain-based non-homogeneous digital asset data processing method and system | |
KR102195711B1 (en) | Device for transacting cryptocurrency and method thereof | |
CN113313490B (en) | Block chain intelligent contract transaction method for separating asset from contract | |
Liu et al. | Offline e-HKD rCBDC Transactions: Discussion of Key Problems and Potential Solution | |
Prakash Yadav et al. | A Comprehensive Analysis of Threats and Countermeasures for Online Secure Transactions Using Blockchain | |
EP3830778A1 (en) | A computer-implemented method, a computer system and a cryptocurrency depository for enabling secure escrow and safekeeping of a cryptocurrency | |
CA2295603C (en) | Symmetrically-secured electronic communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190402 |
|
WD01 | Invention patent application deemed withdrawn after publication |