CN109801071A - Password remapping method and device - Google Patents
Password remapping method and device Download PDFInfo
- Publication number
- CN109801071A CN109801071A CN201910045085.8A CN201910045085A CN109801071A CN 109801071 A CN109801071 A CN 109801071A CN 201910045085 A CN201910045085 A CN 201910045085A CN 109801071 A CN109801071 A CN 109801071A
- Authority
- CN
- China
- Prior art keywords
- password
- block chain
- keystore
- public key
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Password remapping method and device provided by the present application, by the private key or mnemonic word that receive user's input, and calculated according to the private key or mnemonic word and generate the first public key, original second public key of target block chain wallet of newly-generated the first public key and password to be reset is compared.If first public key is identical with second public key, using the resetting password as the new password of the block chain wallet of password to be reset.And the original KeyStore file for treating the block chain wallet of resetting password is replaced.Technical solution disclosed in the present application, simplifies the troublesome operation of original resetting block chain wallet method, while avoiding the damage to other purse datas in block chain wallet client end.
Description
Technical field
This application involves block chain fields, in particular to a kind of password remapping method and device.
Background technique
In block chain technology, user possesses the private key or mnemonic word of block chain wallet, can prove that it possesses the wallet.
But the block chain wallet password of user is forgotten, and is not just available wallet client end and is managed to wallet, such as delete operation,
Also money transfer transactions can not be carried out to the digital cash inside wallet, needs to reset the password of the wallet at this time.It is unloaded currently, user crosses
It carries software or removes the data that the modes such as software data will remove this wallet in wallet client end by force, then pass through block chain
The private key of client imports or mnemonic word import feature imports the wallet again, when importing, that is, settable new wallet password.
This method is cumbersome, remove entire client data will lead to the information of other wallets that user possesses in client also by
It removes and user needs reduction manually, if user is not backed up the wallet, user permanently loses the assets that the long wallet is possessed.
Summary of the invention
In order to overcome above-mentioned deficiency in the prior art, the application's is designed to provide a kind of password remapping method, answers
For block chain wallet client end, the step of the method, includes:
Determine the target block chain wallet of password to be reset;
Password resetting request is obtained, the password resetting request includes resetting password and authentication information, the authentication information
The first public key is generated including private key or mnemonic word, and according to the authentication information;
Second public key of first public key and the target block chain wallet is compared;
If first public key is identical with second public key, using the resetting password as the target block chain wallet
New password.
Optionally, the method also includes:
New KeyStore file is obtained to the private key encryption according to the new password, passes through new KeyStore file
Replace the original KeyStore file of the target block chain wallet.
Optionally, described that new KeyStore file is obtained to the private key encryption according to the new password, by new
KeyStore file further comprises the steps of: before replacing the original KeyStore file of the target block chain wallet
Original KeyStore file of the target block chain wallet is backuped to handle and obtains KeyStore backup text
Part.
Optionally, the method also includes:
After user enters the target block chain wallet by the new password for the first time, the KeyStore is backed up into text
Part is deleted;
The user enters the target block chain wallet by the new password for the first time, if the user inputs password
Number be more than preset threshold, the new KeyStore file is replaced by the KeyStore backup file.
Optionally, the method also includes:
If the public key or mnemonic word number of user's input are more than preset threshold, forbid the user within a preset time again
Secondary input public key or mnemonic word.
The another object of the application is to provide a kind of password reset apparatus, described applied to block chain wallet client end
Password reset apparatus includes determining module, request module, contrast module and resetting module;
The determining module is for determining the target block chain wallet of password to be reset;
The request module includes resetting password and authentication letter for obtaining password resetting request, the password resetting request
Breath, the authentication information includes private key or mnemonic word, and generates the first public key according to the authentication information;
The contrast module is for comparing the second public key of first public key and the target block chain wallet;
If the resetting module is identical with second public key for first public key, using the resetting password as institute
State the new password of target block chain wallet.
Optionally, the password reset apparatus further includes KeyStroe replacement module;
The KeyStroe replacement module is used to obtain the private key encryption new KeyStore according to the new password
File replaces the original KeyStore file of the target block chain wallet by new KeyStore file.
Optionally, the password reset apparatus further includes backup module;
The backup module is used to obtain the processing that backups of original KeyStore file of the target block chain wallet
Obtain KeyStore backup file.
Optionally, the password reset apparatus further includes removing module and recovery module;
After the removing module enters the target block chain wallet by the new password for the first time for user, by institute
State the deletion of KeyStore backup file;
The recovery module enters the target block chain wallet by the new password for the first time for the user, if
The number that the user inputs password is more than preset threshold, by the KeyStore backup file replace it is described newly
KeyStore file.
Optionally, the password reset apparatus further includes time delay module;
If public key or mnemonic word number of the time delay module for user's input are more than preset threshold, forbid the use
Family inputs public key or mnemonic word again within a preset time.
In terms of existing technologies, the application has the advantages that
Password remapping method and device provided by the present application, by receiving the private key or mnemonic word of user's input, and root
It is calculated according to the private key or mnemonic word and generates the first public key, by the target block chain of newly-generated the first public key and password to be reset
Original second public key of wallet is compared.If first public key is identical with second public key, using the resetting password as to
Reset the new password of the block chain wallet of password.And the original KeyStore file for treating the block chain wallet of resetting password carries out
Replacement.Technical solution disclosed in the present application, simplifies the troublesome operation of original resetting block chain wallet method, while avoiding to area
The damage of other purse datas in block chain wallet client end.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the hardware structure diagram of electronic equipment provided by the embodiments of the present application;
Fig. 2 is the step flow chart of password remapping method provided by the embodiments of the present application;
Fig. 3 is the step flow chart of verifying KeyStore file provided by the embodiments of the present application;
Fig. 4 is one of the structure chart of password reset apparatus provided by the embodiments of the present application;
Fig. 5 is the two of the structure chart of password reset apparatus provided by the embodiments of the present application.
Icon: 100- electronic equipment;130- processor;110- password reset apparatus;120- memory;1101- determines mould
Block;1102- request module;1103- contrast module;1104- resets module;1105-KeyStore replacement module;1106- backup
Module;1107- removing module;1108- time delay module;1109- recovery module.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented
The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed
Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common
Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection
It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present application, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ",
" installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one
Connect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediary
It is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition
State the concrete meaning of term in this application.
The method of existing resetting block chain wallet password, by uninstall or remove the modes such as software data by force will be
The data of this wallet are removed in wallet client end, then pass through the private key importing of block chain client or mnemonic word import feature
Again the wallet is imported, when importing, that is, settable new wallet password.This method is cumbersome, and since block chain client is past
Toward comprising multiple block chain wallets, existing method is when resetting one of block chain wallet password, it is possible to will lead to it
The corrupted data or loss of his block chain wallet.
In view of this, reset the present embodiment provides a kind of block chain wallet for targetedly treating resetting password
Scheme is below described in detail scheme provided in this embodiment.
Firstly, please referring to Fig. 1, the present embodiment provides the hardware structure diagram of a kind of electronic equipment 100, the electronic equipments 100
Configured with block chain client, which includes password reset apparatus 110, memory 120 and processor 130.It is described
Memory 120, processor 130 and each element are directly or indirectly electrically connected between each other, with realize data transmission or
Interaction.It is electrically connected for example, these elements can be realized between each other by one or more communication bus or signal wire.
The electronic equipment 100 may be, but not limited to, smart phone, PC (personal computer,
PC), tablet computer, personal digital assistant (personal digital assistant, PDA), mobile internet surfing equipment (mobile
Internet device, MID) etc..The operating system of the electronic equipment 100 may be, but not limited to, Android (Android)
System, IOS (iPhone operating system) system, Windows phone system, Windows system etc..
Wherein, the memory 120 may be, but not limited to, random access memory (Random Access
Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable
Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only
Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only
Memory, EEPROM) etc..Wherein, memory 120 is for storing program, the processor 130 after receiving and executing instruction,
Execute described program.
The processor 130 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor
130 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processes
Device (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), specific integrated circuit
(ASIC), field programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..
Referring to FIG. 2, the present embodiment provides a kind of steps of resetting cryptographic methods applied to electronic equipment 100 shown in Fig. 1
Rapid flow chart, below will be to the method includes each steps to be described in detail.
Step S100 determines the target block chain wallet of password to be reset.
Optionally, which is used to manage the software of block chain wallet, can be imported by the software
With deletion wallet, the assets in block chain wallet can be transferred accounts by the software, or gathering, check transaction record
Deng.Multiple block chain wallets can be managed by our wallet client end, for example, BTC wallet, ETH wallet, EOS wallet or
Other block chain wallets.User selects the target block chain wallet of password to be reset from block chain client.
Step S200 obtains password and resets request, and the password resetting request includes resetting password and authentication information, described
Authentication information includes private key or mnemonic word, and generates the first public key according to the authentication information.
Optionally, an interface is provided, user inputs mnemonic word or private key by the interface, and inputs resetting password.Institute
It states electronic equipment 100 and first public key is generated according to the mnemonic word or private key.
Step S300 compares first public key and original second public key of the target block chain wallet.
Step S400, if first public key is identical with second public key, using the resetting password as the target
The new password of block chain wallet.
Optionally, the electronic equipment 100 compares first public key and second public key.If described first
Public key is identical with second public key, then using the resetting password as the new password of the target block chain wallet.Further, should
Electronic equipment 100 is encrypted the private key according to the resetting password, new KeyStore file is obtained, by new
KeyStore file replaces original KeyStore file of the target block chain wallet.It is worth noting that by the target
Before the original KeyStore file of block chain wallet is replaced, the electronic equipment 100 to original KeyStore file into
Row back-up processing, and then obtain KeyStore backup file.
In order to prevent when generating new KeyStore file, fortuitous event occur leads to newly-generated KeyStore file
Appearance damages or other error in data.Referring to figure 3., the step flow chart of KeyStore file is verified shown in.
Step S5001 will be described after user enters the target block chain wallet by the new password for the first time
KeyStore backup file is deleted.
Optionally, after user resets careful code, which is entered by new password.If user can
New password is passed through into the target block chain wallet, which deletes KeyStore backup file.
Step S5002, the user enters the target block chain wallet by the new password for the first time, if the use
The number that family inputs password is more than preset threshold, replaces the new KeyStore text by the KeyStore backup file
Part.
Optionally, if the number that user inputs new password is more than preset threshold, it cannot be introduced into the target block chain wallet.
For example, all cannot be introduced into the target block chain wallet if it is more than 5 times that user, which inputs new password, then show generating newly
When KeyStore file, newly-generated KeyStore file occurs damaging or other error in data.The electronic equipment 100 will
KeyStore backup file replaces newly-generated KeyStore file, and user is reminded to reset password again.By with top
Formula avoids and occurs file corruption or other error in data in the KeyStore file of generation, so that encrypted private
Key is being not the block chain wallet original private key itself.It finally can only be strong by the modes such as uninstall or removing software data
It is about to remove the data of this wallet in wallet client end, then is led by the private key importing of block chain client or mnemonic word
Enter function and imports the wallet again, when importing, that is, settable new wallet password.
Optionally, illegal user carries out Brute Force in order to prevent, if the public key or mnemonic word number of user's input are super
Preset threshold is crossed, the user is forbidden to input public key or mnemonic word again within a preset time.For example, if user inputs mnemonic(al)
Word or private key are more than that 10 all can not then be delayed after 1 hour, just with the target block chain wallet original public key match success
User is allowed to carry out the operation of resetting password again.
The present embodiment also provides a kind of password reset apparatus 110, and the password reset apparatus 110 includes that at least one can be with
The form of software or firmware (firmware) is stored in the memory 120 or is solidificated in the operation of the electronic equipment 100
Software function module in system (operating system, OS).The processor 130 is for executing the memory 120
The executable module of middle storage, such as software function module and computer program etc. included by the password reset apparatus 110.
Referring to figure 4., the present embodiment also provides a kind of one of the structure chart of password reset apparatus 110, password resetting dress
Setting 110 includes that at least one can be stored in the functional module in machine readable storage medium in a software form.Functionally divide,
The password reset apparatus 110 can include determining that module 1101, request module 1102, contrast module 1103 and resetting module
1104。
The determining module 1101 is for determining the target block chain wallet of password to be reset.
In the present embodiment, which is used to execute the step S100 in Fig. 1, about the determining module 1101
Detailed description can refer to step S100 detailed description.
For the request module 1102 for obtaining password resetting request, the password resetting request includes resetting password and mirror
Information is weighed, the authentication information includes private key or mnemonic word, and generates the first public key according to the authentication information.
In the present embodiment, the request module 1102 is for executing step S200 in Fig. 2, about the request module 1102
Detailed description can refer to the detailed description of step S200.
The contrast module 1103 is used for first public key and original second public key of the target block chain wallet
It compares.
In the present embodiment, the contrast module 1103 is for executing step S300 in Fig. 2, about the contrast module 1103
Detailed description can refer to the detailed description of step S300.
If the resetting module 1104 is identical with second public key for first public key, the resetting password is made
For the new password of the target block chain wallet.
In the present embodiment, the resetting module 1104 is for executing step S400 in Fig. 2, about the resetting module 1104
Detailed description can refer to step S400 detailed description.
Optionally, referring to figure 5., the two of the structure chart of password reset apparatus 110 shown in, the password reset apparatus
110 further include KeyStore replacement module 1105;
The KeyStore replacement module 1105 is used to obtain newly the private key encryption according to the new password
KeyStore file replaces the original KeyStore file of the target block chain wallet by new KeyStore file.
Optionally, referring once again to Fig. 5, the password reset apparatus 110 further includes backup module 1106;
The backup module 1106 is used for place that original KeyStore file of the target block chain wallet backups
Reason obtains KeyStore backup file.
Optionally, referring once again to Fig. 5, the password reset apparatus 110 further includes removing module 1107 and recovery module
1109;
After the removing module 1107 enters the target block chain wallet by the new password for the first time for user,
The KeyStore backup file is deleted.
The recovery module 1109 enters the target block chain money by the new password for the first time for the user
Packet is replaced described new if the number that the user inputs password is more than preset threshold by the KeyStore backup file
KeyStore file.
Optionally, referring once again to Fig. 5, the password reset apparatus 110 further includes time delay module 1108;
If public key or mnemonic word number of the time delay module 1108 for user's input are more than preset threshold, forbid institute
It states user and inputs public key or mnemonic word again within a preset time.
In conclusion password remapping method provided by the present application and device, by receiving the private key of user's input or helping
Remember word, and calculated according to the private key or mnemonic word and generate the first public key, by newly-generated the first public key and password to be reset
Original second public key of target block chain wallet is compared.If first public key is identical with second public key, by the resetting
New password of the password as the block chain wallet of password to be reset.And treat the original of the block chain wallet for resetting password
KeyStore file is replaced.Technical solution disclosed in the present application simplifies the cumbersome of original resetting block chain wallet method
Operation, while avoiding the damage to other purse datas in block chain wallet client end.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other
Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown
According to device, the architectural framework in the cards of method and computer program product, function of multiple embodiments of the application
And operation.In this regard, each box in flowchart or block diagram can represent one of a module, section or code
Point, a part of the module, section or code includes one or more for implementing the specified logical function executable
Instruction.It should also be noted that function marked in the box can also be attached to be different from some implementations as replacement
The sequence marked in figure occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes may be used
To execute in the opposite order, this depends on the function involved.It is also noted that each of block diagram and or flow chart
The combination of box in box and block diagram and or flow chart can be based on the defined function of execution or the dedicated of movement
The system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The above, the only various embodiments of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
Claims (10)
1. a kind of password remapping method, which is characterized in that be applied to electronic equipment, the electronic equipment is configured with block chain wallet
The step of client, the method includes:
Determine the target block chain wallet of password to be reset;
Password resetting request is obtained, the password resetting request includes resetting password and authentication information, the authentication information include
Private key or mnemonic word, and the first public key is generated according to the authentication information;
Original second public key of first public key and the target block chain wallet is compared;
If first public key is identical with second public key, using the resetting password as the new of the target block chain wallet
Password.
2. password remapping method according to claim 1, which is characterized in that the method also includes:
New KeyStore file is obtained to the private key encryption according to the new password, is replaced by new KeyStore file
Fall the original KeyStore file of the target block chain wallet.
3. password remapping method according to claim 2, which is characterized in that it is described according to the new password to the private key
Encryption obtains new KeyStore file, and it is original to replace the target block chain wallet by new KeyStore file
It is further comprised the steps of: before KeyStore file
Original KeyStore file of the target block chain wallet is backuped to handle and obtains KeyStore backup file.
4. password remapping method according to claim 3, which is characterized in that the method also includes:
After user enters the target block chain wallet by the new password for the first time, the KeyStore backup file is deleted
It removes;
The user enters the target block chain wallet by the new password for the first time, if the user inputs close synchronous codes
Number is more than preset threshold, replaces the new KeyStore file by the KeyStore backup file.
5. password remapping method according to claim 1, which is characterized in that the method also includes:
If the public key or mnemonic word number of user's input are more than preset threshold, forbid the user defeated again within a preset time
Enter public key or mnemonic word.
6. a kind of password reset apparatus, which is characterized in that be applied to electronic equipment, the electronic equipment is configured with block chain wallet
Client, the password reset apparatus include determining module, request module, contrast module and resetting module;
The determining module is for determining the target block chain wallet of password to be reset;
The request module resets request for obtaining password, and the password resetting request includes resetting password and authentication information,
The authentication information includes private key or mnemonic word, and generates the first public key according to the authentication information;
The contrast module is for comparing first public key and original second public key of the target block chain wallet;
If the resetting module is identical with second public key for first public key, using the resetting password as the mesh
Mark the new password of block chain wallet.
7. password reset apparatus according to claim 6, which is characterized in that the password reset apparatus further includes
KeyStroe replacement module;
The KeyStroe replacement module is used to obtain the private key encryption new KeyStore file according to the new password,
The original KeyStore file of the target block chain wallet is replaced by new KeyStore file.
8. password reset apparatus according to claim 7, which is characterized in that the password reset apparatus further includes backup mould
Block;
The backup module is used for processing acquisition that original KeyStore file of the target block chain wallet backups
KeyStore backup file.
9. password reset apparatus according to claim 8, which is characterized in that the password reset apparatus further includes deleting mould
Block and recovery module;
It, will be described after the removing module enters the target block chain wallet by the new password for the first time for user
KeyStore backup file is deleted;
The recovery module enters the target block chain wallet by the new password for the first time for the user, if described
The number that user inputs password is more than preset threshold, replaces the new KeyStore by the KeyStore backup file
File.
10. password reset apparatus according to claim 6, which is characterized in that the password reset apparatus further includes delay
Module;
If public key or mnemonic word number of the time delay module for user's input are more than preset threshold, the user is forbidden to exist
Public key or mnemonic word are inputted in preset time again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910045085.8A CN109801071B (en) | 2019-01-17 | 2019-01-17 | Password resetting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910045085.8A CN109801071B (en) | 2019-01-17 | 2019-01-17 | Password resetting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109801071A true CN109801071A (en) | 2019-05-24 |
CN109801071B CN109801071B (en) | 2020-09-29 |
Family
ID=66559515
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910045085.8A Active CN109801071B (en) | 2019-01-17 | 2019-01-17 | Password resetting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109801071B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110289946A (en) * | 2019-07-12 | 2019-09-27 | 深圳市元征科技股份有限公司 | A kind of generation method and block chain node device of block chain wallet localization file |
CN111401888A (en) * | 2020-03-05 | 2020-07-10 | 海南新软软件有限公司 | Method and device for generating multiple signature wallets |
CN111835512A (en) * | 2020-07-13 | 2020-10-27 | 杭州时戳信息科技有限公司 | Private key fragment management method, signature fragment generation method, system and node equipment |
CN112306563A (en) * | 2020-11-03 | 2021-02-02 | 深圳软牛科技有限公司 | Method, device, equipment and storage medium for resetting IOS screen use time password |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160134593A1 (en) * | 2014-11-12 | 2016-05-12 | Yaron Gvili | Manicoding for communication verification |
CN106066960A (en) * | 2016-05-26 | 2016-11-02 | 珠海市魅族科技有限公司 | A kind of replacement cryptographic methods and replacement encryption apparatus |
US20170124535A1 (en) * | 2015-10-29 | 2017-05-04 | Cornell University | Systems and methods for securing cryptocurrency purchases |
CN106934623A (en) * | 2016-12-07 | 2017-07-07 | 中国银联股份有限公司 | Account's integrality checking method based on ether mill block chain technology |
CN107579817A (en) * | 2017-09-12 | 2018-01-12 | 广州广电运通金融电子股份有限公司 | User ID authentication method, apparatus and system based on block chain |
CN108647961A (en) * | 2018-04-26 | 2018-10-12 | 华南理工大学 | Digital cash wallet based on electrocardiosignal authentication |
CN108833093A (en) * | 2018-06-14 | 2018-11-16 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, equipment and the storage medium of account key |
CN108876605A (en) * | 2018-05-27 | 2018-11-23 | 北京轻松筹信息技术有限公司 | Digital asset method of commerce and device |
-
2019
- 2019-01-17 CN CN201910045085.8A patent/CN109801071B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160134593A1 (en) * | 2014-11-12 | 2016-05-12 | Yaron Gvili | Manicoding for communication verification |
US20170124535A1 (en) * | 2015-10-29 | 2017-05-04 | Cornell University | Systems and methods for securing cryptocurrency purchases |
CN106066960A (en) * | 2016-05-26 | 2016-11-02 | 珠海市魅族科技有限公司 | A kind of replacement cryptographic methods and replacement encryption apparatus |
CN106934623A (en) * | 2016-12-07 | 2017-07-07 | 中国银联股份有限公司 | Account's integrality checking method based on ether mill block chain technology |
CN107579817A (en) * | 2017-09-12 | 2018-01-12 | 广州广电运通金融电子股份有限公司 | User ID authentication method, apparatus and system based on block chain |
CN108647961A (en) * | 2018-04-26 | 2018-10-12 | 华南理工大学 | Digital cash wallet based on electrocardiosignal authentication |
CN108876605A (en) * | 2018-05-27 | 2018-11-23 | 北京轻松筹信息技术有限公司 | Digital asset method of commerce and device |
CN108833093A (en) * | 2018-06-14 | 2018-11-16 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, equipment and the storage medium of account key |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110289946A (en) * | 2019-07-12 | 2019-09-27 | 深圳市元征科技股份有限公司 | A kind of generation method and block chain node device of block chain wallet localization file |
CN111401888A (en) * | 2020-03-05 | 2020-07-10 | 海南新软软件有限公司 | Method and device for generating multiple signature wallets |
CN111401888B (en) * | 2020-03-05 | 2023-07-07 | 北京庚金科技有限公司 | Method and device for generating multi-signature wallet |
CN111835512A (en) * | 2020-07-13 | 2020-10-27 | 杭州时戳信息科技有限公司 | Private key fragment management method, signature fragment generation method, system and node equipment |
CN111835512B (en) * | 2020-07-13 | 2023-01-31 | 杭州时戳信息科技有限公司 | Private key fragment management method, signature fragment generation method, system and node equipment |
CN112306563A (en) * | 2020-11-03 | 2021-02-02 | 深圳软牛科技有限公司 | Method, device, equipment and storage medium for resetting IOS screen use time password |
CN112306563B (en) * | 2020-11-03 | 2023-11-17 | 深圳软牛科技有限公司 | Method, device, equipment and storage medium for resetting IOS screen using time password |
Also Published As
Publication number | Publication date |
---|---|
CN109801071B (en) | 2020-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109801071A (en) | Password remapping method and device | |
US10341123B2 (en) | User identification management system and method | |
US20160027017A1 (en) | Method and system for using dynamic cvv in qr code payments | |
US20140279558A1 (en) | Two-Way, Token-Based Validation for NFC-Enabled Transactions | |
US20160277412A1 (en) | Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations | |
US20140089196A1 (en) | Securing personal identification numbers for mobile payment applications by combining with random components | |
WO2013155562A1 (en) | Nfc card lock | |
TW201530346A (en) | Method, device, and system for client authentication using social relationship data | |
WO2016037415A1 (en) | Mobile payment method, system and device, and computer storage medium | |
CN101770552B (en) | Method for clearing computer password, computer and system for clearing computer password | |
US9563773B2 (en) | Systems and methods for securing BIOS variables | |
CN111386690B (en) | Method for authenticating payment card, storage medium and computer system | |
CN104867009A (en) | Intelligent card, quota control system thereof, and quota control method thereof | |
EP3311325A1 (en) | System, apparatus and method for providing randomly generated codes in a user anonymous manner | |
CN104573661A (en) | Fingerprint data processing method and device | |
CN103678983A (en) | Smartphone usage permission verification system and method | |
CN105095714A (en) | User system recognition system and method based on fingerprint recognition | |
KR101156102B1 (en) | Memory card reader apparatus having security features and the method thereof | |
CN105787711B (en) | Information authentication method, device and system based on confirmation code | |
WO2017091133A1 (en) | Method and system for secure storage of information | |
ES2725456T3 (en) | Emulation module of at least one payment card, procedure, payment device, computer program product and corresponding storage medium | |
CN110633585B (en) | Hard disk locking and unlocking method, device, equipment and readable storage medium | |
KR101571126B1 (en) | Apparatus and method for user authentication | |
CN107657533B (en) | Self-service transaction reminding method and device and terminal equipment | |
CN107959670B (en) | Dynamic password generation method and device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |