CN109560936A - The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key - Google Patents

The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key Download PDF

Info

Publication number
CN109560936A
CN109560936A CN201811324061.8A CN201811324061A CN109560936A CN 109560936 A CN109560936 A CN 109560936A CN 201811324061 A CN201811324061 A CN 201811324061A CN 109560936 A CN109560936 A CN 109560936A
Authority
CN
China
Prior art keywords
private key
loss
block chain
user
reported
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811324061.8A
Other languages
Chinese (zh)
Inventor
高明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Chain Anxin Technology Co Ltd
Original Assignee
Sichuan Chain Anxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Chain Anxin Technology Co Ltd filed Critical Sichuan Chain Anxin Technology Co Ltd
Priority to CN201811324061.8A priority Critical patent/CN109560936A/en
Publication of CN109560936A publication Critical patent/CN109560936A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of to protect and handle the method that private key is lost or identity data is stolen problem for digital asset private key, comprising the following steps: after private key generation, the identity data for generating the private key is saved for user;After private key for user is lost or is stolen, new private spoon-address pair is generated;User or the side of stealing initiate to report the loss transaction, while guarantee deposit;Verify whether it is correctly to sign, it is incorrect, judge that this reports the loss invalid not deposit released;This time is reported the loss behavior and locks a delay cycle by block chain node, and original transferable assets of private key, reporting the loss the corresponding private spoon in new address cannot transfer assets;After delay cycle, reporting the loss the corresponding private spoon in new address can transfer assets.The present invention is truly realized " private key does not go out hardware " without private key mnemonic word is backed up, and significantly reduces private key and is stolen risk, and private key is easy to give assets for change after losing, and avoids losing assets because private spoon loses;Assets can also protect a period of time after private spoon is stolen, enhance the anti-theft performance of digital asset.

Description

Private key loss is protected and handled for digital asset private key or identity data is stolen problem Method
Technical field
The present invention relates to a kind of processing methods of various digital assets established based on block chain technology, more particularly to one kind The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key.
Background technique
According to newest data statistics, currently based on the technology application in the world of block chain and universal, The digital cash market based on block chain technology of presently the most mainstream alreadys exceed 100,000,000,000 U.S. dollars, as bit coin (BTC), with Too coin (ETH), Lay spy coin (LTC), auspicious wave coin (Ripple) etc..
Block chain is a string of associated data blocks generated using cryptography method, and this data block contains a number The information aggregate of word currency network trading, this data block based on Hash chain type construction combine strong barrier of trying hard to keep of calculating to realize The technological infrastructure with higher public credibility of " can not be distorted once confirmed ", so that block chain technology also becomes point The new application mode of the computer technologies such as the storage of cloth data, point-to-point transmission, decentralization common recognition mechanism, Encryption Algorithm.
With the fast development of block chain technology, so that digital cash steps into everybody visual field, and it is a large amount of digital The appearance of moneytary operations has also expedited the emergence of digital wallet exploitation industry, the Internet characteristics used according to digital wallet, digital wallet It is divided into hot money packet and two kinds of cold wallet.
The essential function of all digital wallets manages private key and the address of oneself with being all to aid in user security, due to block The technology of the right to use and ownership equity that chain technology is established, private key is the exclusive evidence that user possesses digital asset.Due to The decentralization and security feature of private key are that no any method uses digital asset after loss.
Although block chain technology is built upon on the basis of stringent cryptography, there is high safety, however private key is Give user oneself keeping, and user during using private key it is various it is subjective or objective due to, cause private key to be lost It loses or private key is stolen, the event so as to cause huge loss happens occasionally.If famous Mt.Gox exchange is once because private key is lost Mistake causes 850,000 bit coin of transaction platform to be lost, to cause that a large amount of transaction is chaotic and user is discontented with.
This series of digital cash loses or stolen case, and behind all reflects the most heavy of block chain network safety Want link, the i.e. safety issue of digital cash wallet.
Currently, the technical solution of digital wallet existing in the market, from operation type angle, there are the divisions of three kinds of forms (sequence to grow from weak to strong by safety): private key and trading signature are hosted in the trustship type of third-party platform completely;Private key What the signature of the hot money Packet type carried out with the signature of transaction at the end app, private key and transaction and extraneous network completely cut off complete cold deposits Store up type.
But either which kind of solution cannot all solve the fundamental issue that private key is lost, private key is stolen, and reason is such as Under: the type completely by third-party platform trustship such as private key and transaction can be not good at, technical leak etc. due to third-party platform operation Reason will lead to private key and lose or be stolen;It, in use may be due to if private key and the signature of transaction carry out at the end app The case where improper, mobile phone software and hardware loophole of user's operation etc. causes private key to leak;The completely cold storage scheme of private key is also recognized To be current safest private key keeping scheme, but due to the unreliability of hardware, the either production firm of hardware wallet Or expert can suggest user for the mnemonic word offline backup of private key, when to prevent hardware fault, can restore private by mnemonic word Key, this is also the feature of many hardware wallets publicity " private key does not go out hardware " at present, however in fact, backup mnemonic word and direct There is no differences (because mnemonic word can directly restore private key offline) substantially for backup private key, and are not implemented truly " private key do not go out hardware " feature.
Summary of the invention
The object of the invention is that provide a kind of for the protection of digital asset private key and place to solve the above-mentioned problems Manage the method that private key is lost or identity data is stolen problem.
The present invention through the following technical solutions to achieve the above objectives:
A method of private key loss is protected and handled for digital asset private key or identity data is stolen problem, including following step It is rapid:
Step (1): after private key generation, block chain arbitrarily generate the fixed message m sg of a nontransaction data and length for Family selection, block chain do Hash operation to message msg and obtain H=Hash(msg), then final cryptographic Hash H is executed with private key Digital signature obtains signature result sign, and block chain saves (msg, sign) as the identity data of the private key for user;
Step (2): after private key for user is lost or identity data is stolen, block chain generates new after user or the side's of stealing application Private spoon-address pair;
Step (3): user or the side of stealing using new address, account address to be reported the loss and account to be reported the loss identity data (msg, Sign) pass through intelligent contract or multi-signature type of transaction as parameter and report the loss transaction to the initiation of block chain node, meanwhile, user Or steal and be stored on the address Fang Xin after the guarantee fund of certain number, block chain node just starts to be transferred to next step;Here Guarantee fund's number can change according to actual needs, such as same user for the first time report the loss for x member, reported the loss for the second time as 2x Member, and so on;
Step (4): block chain node verifies whether it is correctly to sign using the identity data (msg, sign) of account to be reported the loss, If verifying signature is mismatched with the address reported the loss, block chain node determines that this time behavior of reporting the loss is that a malice reports the loss row For this is reported the loss in vain, while not deposit released;If address matching verifying signature and reported the loss, block chain node are sentenced It is fixed this time to report the loss behavior effectively and be transferred to next step;
Step (5): this time is reported the loss behavior and locks a delay cycle by block chain node, within the time of this delay cycle, The private key of account itself is allowed to normally transfer accounts or withdraw deposit fund and guarantee fund;Meanwhile the new address registered when reporting the loss is corresponding Private key is not allowed to transfer fund and guarantee fund;Here delay cycle determine according to actual needs, for example ten days is a week Phase;
Step (6): after delay cycle, private key corresponding to the address registered when reporting the loss is allowed to transfer and is reported the loss account In assets and guarantee fund.
Specifically, in the step (4), it is to judge verify that whether block chain node verification, which is the method correctly signed, Whether (msg, sign)=addr is true, sets up and then determines to be correctly to sign, is otherwise determined as incorrect signature.Here " verify(msg, sign)=addr " represents and is meant that: whether determines to the signature value sign of message msg really by address What the private key of addr was signed, be a kind of general-purpose algorithm process.
The beneficial effects of the present invention are:
Present invention combination hardware wallet, user only need to back up the identity data crossed through private key signature, and nothing is backed up private key Mnemonic word is truly realized " private key does not go out hardware ", and significantly reducing reduces the stolen risk of private key, obtains the digital asset of user To more preferable protection;After private key for user loss, the present invention does not go to attempt to restore or gives private key for change by technical solution, leads to It crosses on a chain and reports the loss process, the fund security for losing the account of private key is transferred in other accounts, theoretically also Without excessively worrying that private key is really lost, user's digital loss assets due to private spoon loses are avoided;The present invention passes through starting Report the loss before process must guarantee deposit method, make the malice behavior of reporting the loss of user oneself that can lose certain number assets, lead to Punishment user to be crossed to want to test the behavior that identity data is reported the loss come malice by violence, the malice for reducing user oneself reports the loss rate, Operating load is reduced for block chain;It if the identity data side of being stolen is stolen, is not taken care of well to user A kind of punishment of oneself identity data can also remind user more cannily to protect the identity data of oneself later;The present invention is logical Increase delay cycle process is crossed, in the case where the identity data of user is stolen, the side of stealing can successfully pass and report the loss request Verifying, but digital asset still cannot be shifted in delay cycle after reporting the loss successfully, and in delay cycle, user itself can also borrow It helps block chain to check oneself assets or registers the notice service of the platform of other account operations notice service, it is stolen to grasp account in time The case where side of taking maliciously is reported the loss, during this period in, user can (user ID data be stolen, private key sheet by oneself private key Body is not lost) the one's own digital asset of safe transfer, significantly enhance the anti-theft performance of digital asset.Above-mentioned several respects Technological improvement although have different emphasis, but be all to belong to an Integral Thought and overall flow, it is interrelated, so conduct Same part patent application.
Specific embodiment
Below with reference to embodiment, the invention will be further described:
Embodiment:
A method of private key loss is protected and handled for digital asset private key or identity data is stolen problem, including following step It is rapid:
Step (1): after private key generation, block chain arbitrarily generate the fixed message m sg of a nontransaction data and length for Family selection, block chain do Hash operation to message msg and obtain H=Hash(msg), then final cryptographic Hash H is executed with private key Digital signature obtains signature result sign, and block chain saves (msg, sign) as the identity data of the private key for user;
Step (2): after private key for user is lost or identity data is stolen, block chain generates new private spoon-ground after user applies Location pair;
Step (3): user using new address, account address to be reported the loss and account to be reported the loss identity data (msg, sign) conduct Parameter passes through intelligent contract or multi-signature type of transaction and reports the loss transaction to the initiation of block chain node, meanwhile, user is in new address After the guarantee fund of the upper certain number of deposit, block chain node just starts to be transferred to next step;Here guarantee fund's number according to Actual needs can change, such as same user for the first time report the loss for x member, report the loss for the second time for 2x member, and so on;
Step (4): block chain node verifies whether it is correctly to sign using the identity data (msg, sign) of account to be reported the loss, Judge verify(msg, sign) whether=addr true, invalid, is determined as incorrect signature, i.e., it verifying signature and reports the loss Address mismatch, then block chain node determine this time behavior of reporting the loss be that a malice reports the loss behavior, this is reported the loss in vain, simultaneously Not deposit released;It sets up and then determines to be correctly to sign, that is, the address matching verifying signature and reporting the loss, then block chain node determines This is reported the loss behavior effectively and is transferred to next step;
Step (5): this time is reported the loss behavior and locks a delay cycle by block chain node, within the time of this delay cycle, The private key of account itself is allowed to normally transfer accounts or withdraw deposit fund and guarantee fund;Meanwhile the new address registered when reporting the loss is corresponding Private key is not allowed to transfer fund and guarantee fund;Here delay cycle determine according to actual needs, for example ten days is a week Phase;
Step (6): after delay cycle, private key corresponding to the address registered when reporting the loss is allowed to transfer and is reported the loss account In assets and guarantee fund.
Above-described embodiment improves conventional digital safeguarding of assets method in terms of three: first, user only needs The good identity data crossed through private key signature of backup is truly realized " private key does not go out hardware ", significantly without the mnemonic word for being backed up private key The stolen risk of private key is reduced, protects the digital asset of user more preferably;Second, not being logical after private key for user loss Technical solution is crossed to go to attempt to restore or give for change private key, but by reporting the loss process on a chain, the account of private key will be lost Fund security is transferred in other accounts, just do not have to theoretically yet it is excessive worry that private key is really lost, avoid user because Private spoon is lost and digital loss assets;Third, by increasing delay cycle process, in the stolen situation of the identity data of user Under, the side of stealing can successfully pass the verifying for reporting the loss request, but still cannot shift digital money in delay cycle after reporting the loss successfully It produces, and in delay cycle, user itself can also check oneself assets by block chain or register the notice service of other account operations The notice service of platform, grasps the case where account side of being stolen maliciously is reported the loss in time, interior during this period, and user can be by certainly Oneself private key (identity data is stolen, and private key itself is not lost) one's own digital asset of safe transfer, and steal Fang Ze It cannot succeed, significantly enhances the anti-theft performance of digital asset.Process is reported the loss due to increasing, so there are user oneself malice If the possibility reported the loss will increase the operating load of block chain this too many to the behavior that block chain is nonsensical, or more State method by starting report the loss before process must guarantee deposit, make the malice behavior of reporting the loss of user oneself that can lose certain number Assets reduce the malice of user oneself by punishing that user wants to test the behavior that identity data is reported the loss come malice by violence Rate is reported the loss, reduces operating load for block chain.Certainly, if the private spoon and identity data of user are stolen simultaneously, the side of stealing Digital asset arbitrarily can be shifted as user oneself, such case cannot be protected, because if protecting, just The digital asset that oneself can be dominated to user raises obstacles, and cannot implement.
Above-described embodiment is presently preferred embodiments of the present invention, is not a limitation on the technical scheme of the present invention, as long as Without the technical solution that creative work can be realized on the basis of the above embodiments, it is regarded as falling into the invention patent Rights protection scope in.

Claims (2)

1. a kind of protect for digital asset private key and handle the method that private key is lost or identity data is stolen problem, feature exists In: the following steps are included:
Step (1): after private key generation, block chain arbitrarily generate the fixed message m sg of a nontransaction data and length for Family selection, block chain do Hash operation to message msg and obtain H=Hash(msg), then final cryptographic Hash H is executed with private key Digital signature obtains signature result sign, and block chain saves (msg, sign) as the identity data of the private key for user;
Step (2): after private key for user is lost or identity data is stolen, block chain generates new after user or the side's of stealing application Private spoon-address pair;
Step (3): user or the side of stealing using new address, account address to be reported the loss and account to be reported the loss identity data (msg, Sign) pass through intelligent contract or multi-signature type of transaction as parameter and report the loss transaction to the initiation of block chain node, meanwhile, user Or steal and be stored on the address Fang Xin after the guarantee fund of certain number, block chain node just starts to be transferred to next step;
Step (4): block chain node verifies whether it is correctly to sign using the identity data (msg, sign) of account to be reported the loss, If verifying signature is mismatched with the address reported the loss, block chain node determines that this time behavior of reporting the loss is that a malice reports the loss row For this is reported the loss in vain, while not deposit released;If address matching verifying signature and reported the loss, block chain node are sentenced It is fixed this time to report the loss behavior effectively and be transferred to next step;
Step (5): this time is reported the loss behavior and locks a delay cycle by block chain node, within the time of this delay cycle, The private key of account itself is allowed to normally transfer accounts or withdraw deposit fund and guarantee fund;Meanwhile the new address registered when reporting the loss is corresponding Private key is not allowed to transfer fund and guarantee fund;
Step (6): after delay cycle, private key corresponding to the address registered when reporting the loss is allowed to transfer and is reported the loss account In assets and guarantee fund.
2. according to claim 1 protect and handle private key loss or the stolen problem of identity data for digital asset private key Method, it is characterised in that: in the step (4), block chain node verification whether be the method correctly signed be judgement Verify(msg, sign) whether=addr true, and it sets up and then determines to be correctly to sign, be otherwise determined as incorrect signature.
CN201811324061.8A 2018-11-08 2018-11-08 The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key Pending CN109560936A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811324061.8A CN109560936A (en) 2018-11-08 2018-11-08 The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811324061.8A CN109560936A (en) 2018-11-08 2018-11-08 The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key

Publications (1)

Publication Number Publication Date
CN109560936A true CN109560936A (en) 2019-04-02

Family

ID=65866050

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811324061.8A Pending CN109560936A (en) 2018-11-08 2018-11-08 The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key

Country Status (1)

Country Link
CN (1) CN109560936A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163604A (en) * 2019-04-29 2019-08-23 华中科技大学 A kind of block chain assets transfer method based on multi-party verification
CN111210224A (en) * 2019-12-23 2020-05-29 中思博安科技(北京)有限公司 Access control method and device in block chain network
CN111738717A (en) * 2020-06-01 2020-10-02 清华大学 Digital wallet security protection method and device, electronic equipment and storage medium
CN113158199A (en) * 2020-02-23 2021-07-23 鄢华中 Infinite embedded decentralized block chain digital asset security system and method
CN113283887A (en) * 2021-06-04 2021-08-20 杭州复杂美科技有限公司 Asset retrieving method, device and storage medium based on privacy
US11676141B2 (en) 2020-04-02 2023-06-13 Baidu International Technology (Shenzen) Co., Ltd. Block chain-based asset processing method, device, apparatus and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163604A (en) * 2019-04-29 2019-08-23 华中科技大学 A kind of block chain assets transfer method based on multi-party verification
CN110163604B (en) * 2019-04-29 2021-02-09 华中科技大学 Block chain asset transfer method based on multi-party verification
CN111210224A (en) * 2019-12-23 2020-05-29 中思博安科技(北京)有限公司 Access control method and device in block chain network
CN113158199A (en) * 2020-02-23 2021-07-23 鄢华中 Infinite embedded decentralized block chain digital asset security system and method
US11676141B2 (en) 2020-04-02 2023-06-13 Baidu International Technology (Shenzen) Co., Ltd. Block chain-based asset processing method, device, apparatus and storage medium
CN111738717A (en) * 2020-06-01 2020-10-02 清华大学 Digital wallet security protection method and device, electronic equipment and storage medium
CN111738717B (en) * 2020-06-01 2022-10-28 清华大学 Digital wallet security protection method and device, electronic equipment and storage medium
CN113283887A (en) * 2021-06-04 2021-08-20 杭州复杂美科技有限公司 Asset retrieving method, device and storage medium based on privacy

Similar Documents

Publication Publication Date Title
CN109560936A (en) The method that private key is lost or identity data is stolen problem is protected and handled for digital asset private key
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
EP0995177B1 (en) Symmetrically-secured electronic communication system
CN102725737B (en) The encryption and decryption of anti-leak can be verified
JP2002520905A (en) Method and device for updating a cryptographic index key having leakage resistance
US20210142318A1 (en) Mapping system and corresponding method to realize digital assets on the mapping chain based on distributed technology
US20220138740A1 (en) Computer-implemented method, a computer system and a cryptocurrency depository for enabling secure escrow and safekeeping of a cryptocurrency
WO2015161123A1 (en) Distributed crypto currency unauthorized transfer monitoring system
CN111275411B (en) Off-line transaction method and system for digital currency wallet and user identity identification card
CN113298526A (en) Offline bill generation method and device
CN110046906A (en) A kind of the two-way authentication method of commerce and system of MPOS machine and server
CN110634072B (en) Block chain transaction system based on multi-signature and hardware encryption
CN107205080B (en) Smart phone with independent financial transaction system
Chen et al. Enhancement of the RFID security method with ownership transfer
CN110648235A (en) Cross-chain asset transfer method based on trusted computing environment (TEE)
JP2004531163A (en) Cryptographic communication method for protection of electronic chips against fraudulent activities
CN113627902A (en) Method and system for preventing block chain intrusion
CN115082067B (en) Digital currency double-off-line payment method and device based on SM2
CN116342265A (en) Block chain-based non-homogeneous digital asset data processing method and system
KR102195711B1 (en) Device for transacting cryptocurrency and method thereof
CN113313490B (en) Block chain intelligent contract transaction method for separating asset from contract
Liu et al. Offline e-HKD rCBDC Transactions: Discussion of Key Problems and Potential Solution
Prakash Yadav et al. A Comprehensive Analysis of Threats and Countermeasures for Online Secure Transactions Using Blockchain
EP3830778A1 (en) A computer-implemented method, a computer system and a cryptocurrency depository for enabling secure escrow and safekeeping of a cryptocurrency
CA2295603C (en) Symmetrically-secured electronic communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190402

WD01 Invention patent application deemed withdrawn after publication