CN109801071B - Password resetting method and device - Google Patents

Password resetting method and device Download PDF

Info

Publication number
CN109801071B
CN109801071B CN201910045085.8A CN201910045085A CN109801071B CN 109801071 B CN109801071 B CN 109801071B CN 201910045085 A CN201910045085 A CN 201910045085A CN 109801071 B CN109801071 B CN 109801071B
Authority
CN
China
Prior art keywords
password
module
wallet
public key
keystore
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910045085.8A
Other languages
Chinese (zh)
Other versions
CN109801071A (en
Inventor
汪东山
董佳俊
李宇航
陈鸿图
王静波
黄及峰
洪小军
阮永丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meitu Technology Co Ltd
Original Assignee
Xiamen Meitu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meitu Technology Co Ltd filed Critical Xiamen Meitu Technology Co Ltd
Priority to CN201910045085.8A priority Critical patent/CN109801071B/en
Publication of CN109801071A publication Critical patent/CN109801071A/en
Application granted granted Critical
Publication of CN109801071B publication Critical patent/CN109801071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

According to the password resetting method and the password resetting device, the private key or the mnemonic word input by the user is received, the first public key is generated according to the private key or the mnemonic word through calculation, and the newly generated first public key is compared with the original second public key of the target block chain wallet of the password to be reset. If the first public key is the same as the second public key, the reset password is used as a new password of the blockchain wallet of the password to be reset. And replaces the original KeyStore file of the blockchain wallet to be reset with the password. According to the technical scheme, the complex operation of the original method for resetting the blockchain wallet is simplified, and meanwhile, the data of other wallets in the blockchain wallet client side are prevented from being damaged.

Description

Password resetting method and device
Technical Field
The present application relates to the field of block chains, and in particular, to a password resetting method and apparatus.
Background
In blockchain technology, a user has the private key or mnemonic of a blockchain wallet and can prove that he has the wallet. However, if the password of the blockchain wallet of the user is forgotten, the wallet client cannot be used for managing the wallet, such as deleting operation, and transfer transaction cannot be performed on digital money in the wallet, and at this time, the password of the wallet needs to be reset. At present, a user forcibly removes the data of the wallet from a wallet client in a mode of unloading software or clearing software data and the like, and then re-imports the wallet through a private key import or mnemonic import function of a blockchain client, and a new wallet password can be set during import. The method is complicated in operation, the removal of the data of the whole client can cause the information of other wallets owned by the user at the client to be removed and the user needs to restore the information manually, and if the wallet is not backed up by the user, the user permanently loses assets owned by the wallet for a long time.
Disclosure of Invention
In order to overcome the above-mentioned deficiencies in the prior art, the present application aims to provide a password resetting method applied to a blockchain wallet client, and the method comprises the following steps:
determining a target blockchain wallet of the password to be reset;
acquiring a password resetting request, wherein the password resetting request comprises a resetting password and authentication information, the authentication information comprises a private key or a mnemonic word, and a first public key is generated according to the authentication information;
comparing the first public key with a second public key of the target block chaining wallet;
and if the first public key is the same as the second public key, taking the reset password as a new password of the target block chaining wallet.
Optionally, the method further comprises:
and encrypting the private key according to the new password to obtain a new KeyStore file, and replacing the original KeyStore file of the target block chain wallet by the new KeyStore file.
Optionally, before the encrypting the private key according to the new password to obtain a new KeyStore file, replacing the original KeyStore file of the target block chaining wallet with the new KeyStore file, the method further includes:
and backing up the original KeyStore file of the target block chain wallet to obtain the KeyStore backup file.
Optionally, the method further comprises:
deleting the KeyStore backup file after the user enters the target block chain wallet through the new password for the first time;
and the user enters the target block chain wallet through the new password for the first time, and if the password input times of the user exceed a preset threshold value, the new KeyStore file is replaced by the KeyStore backup file.
Optionally, the method further comprises:
and if the times of the public key or the mnemonic word input by the user exceed a preset threshold value, forbidding the user to input the public key or the mnemonic word again within preset time.
Another object of the present application is to provide a password resetting device, applied to a client of a blockchain wallet, including a determining module, a requesting module, a comparing module and a resetting module;
the determining module is used for determining a target blockchain wallet of a password to be reset;
the request module is used for acquiring a password resetting request, the password resetting request comprises a resetting password and authentication information, the authentication information comprises a private key or a mnemonic word, and a first public key is generated according to the authentication information;
the comparison module is used for comparing the first public key with a second public key of the target block chaining wallet;
the reset module is used for taking the reset password as a new password of the target block chaining wallet if the first public key is the same as the second public key.
Optionally, the password resetting apparatus further comprises a KeyStroe replacement module;
the KeyStroe replacing module is used for encrypting the private key according to the new password to obtain a new KeyStore file, and replacing the original KeyStore file of the target block chain wallet by the new KeyStore file.
Optionally, the password resetting apparatus further includes a backup module;
the backup module is used for performing backup processing on the original KeyStore file of the target block chain wallet to obtain the KeyStore backup file.
Optionally, the password resetting apparatus further includes a deleting module and a recovering module;
the deleting module is used for deleting the KeyStore backup file after a user enters the target block chain wallet through the new password for the first time;
the recovery module is used for the user to enter the target block chain wallet through the new password for the first time, and if the number of times of password input by the user exceeds a preset threshold value, the new KeyStore file is replaced by the KeyStore backup file.
Optionally, the password resetting apparatus further includes a delay module;
the time delay module is used for forbidding the user to input the public key or the mnemonic word again within the preset time if the times of the public key or the mnemonic word input by the user exceed the preset threshold.
Compared with the prior art, the method has the following beneficial effects:
according to the password resetting method and the password resetting device, the private key or the mnemonic word input by the user is received, the first public key is generated according to the private key or the mnemonic word through calculation, and the newly generated first public key is compared with the original second public key of the target block chain wallet of the password to be reset. If the first public key is the same as the second public key, the reset password is used as a new password of the blockchain wallet of the password to be reset. And replaces the original KeyStore file of the blockchain wallet to be reset with the password. According to the technical scheme, the complex operation of the original method for resetting the blockchain wallet is simplified, and meanwhile, the data of other wallets in the blockchain wallet client side are prevented from being damaged.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
FIG. 2 is a flowchart illustrating steps of a password resetting method according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of the steps provided in an embodiment of the present application to validate KeyStore files;
fig. 4 is a diagram illustrating a configuration of a password resetting apparatus according to an embodiment of the present disclosure;
fig. 5 is a second structural diagram of a password resetting apparatus according to an embodiment of the present application.
Icon: 100-an electronic device; 130-a processor; 110-password reset means; 120-a memory; 1101-a determination module; 1102-a request module; 1103 — contrast module; 1104-a reset module; 1105-KeyStore replacement module; 1106-backup module; 1107-delete module; 1108-a delay module; 1109-recovery module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present application, it is further noted that, unless expressly stated or limited otherwise, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
In the existing method for resetting the password of the block chain wallet, the data of the wallet is forcibly removed from the wallet client side by means of software unloading, software data clearing and the like, and then the wallet is re-imported by the private key import or mnemonic import function of the block chain client side, and a new wallet password can be set during import. The method is cumbersome to operate, and since the blockchain client often includes a plurality of blockchain wallets, when the password of one of the blockchain wallets is reset, the existing method may cause data of other blockchain wallets to be damaged or lost.
In view of this, the present embodiment provides a solution for resetting a block chain wallet with a password to be reset in a targeted manner, and the solution provided in the present embodiment is described in detail below.
First, referring to fig. 1, the present embodiment provides a hardware structure diagram of an electronic device 100, where the electronic device 100 is configured with a blockchain client, and the electronic device 100 includes a password resetting apparatus 110, a memory 120, and a processor 130. The memory 120, the processor 130, and the various elements are electrically connected to each other, directly or indirectly, to enable data transfer or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The electronic device 100 may be, but is not limited to, a smart phone, a Personal Computer (PC), a tablet PC, a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), and the like. The operating system of the electronic device 100 may be, but is not limited to, an Android system, an ios (Android system), a Windows phone system, a Windows system, and the like.
The Memory 120 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 120 is used for storing a program, and the processor 130 executes the program after receiving the execution instruction.
The processor 130 may be an integrated circuit chip having signal processing capabilities. The Processor 130 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Referring to fig. 2, the present embodiment provides a flowchart of steps of a password resetting method applied to the electronic device 100 shown in fig. 1, and the steps of the method will be described in detail below.
In step S100, a target blockchain wallet for a password to be reset is determined.
Optionally, the blockchain wallet client is used to manage software for blockchain wallets, through which wallets can be imported and deleted, through which assets in the blockchain wallet can be transferred, or collected, transaction records viewed, and the like. Multiple blockchain wallets, such as BTC wallets, ETH wallets, EOS wallets or other blockchain wallets, can be managed by our wallet client. The user selects a target blockchain wallet from the blockchain client for the password to be reset.
Step S200, a password resetting request is obtained, the password resetting request comprises a resetting password and authentication information, the authentication information comprises a private key or mnemonic words, and a first public key is generated according to the authentication information.
Optionally, an interface is provided through which the user enters a mnemonic or private key and enters a reset password. The electronic device 100 generates a first public key according to the mnemonic word or the private key.
Step S300, comparing the first public key with the original second public key of the target block chaining wallet.
In step S400, if the first public key is the same as the second public key, the reset password is used as a new password of the target block chaining wallet.
Optionally, the electronic device 100 compares the first public key and the second public key. And if the first public key is the same as the second public key, taking the reset password as a new password of the target block chaining wallet. Further, the electronic device 100 encrypts the private key according to the reset password to obtain a new KeyStore file, and replaces the original KeyStore file of the target block chain wallet with the new KeyStore file. It should be noted that, before replacing the original KeyStore file of the target block chain wallet, the electronic device 100 performs backup processing on the original KeyStore file to obtain a KeyStore backup file.
To prevent an unexpected situation from occurring when a new KeyStore file is generated, resulting in damage or other data errors in the newly generated KeyStore file. Referring to FIG. 3, a flowchart illustrating steps for validating a KeyStore file is shown.
In step S5001, the KeyStore backup file is deleted after the user enters the target blockchain wallet with the new password for the first time.
Optionally, after the user has reset the password, the target blockchain wallet is entered with a new password. If the user can successfully enter the target blockchain wallet with a new password, the electronic device 100 deletes the KeyStore backup file.
Step S5002, the user enters the target blockchain wallet with the new password for the first time, and if the number of times of password input by the user exceeds a preset threshold, the new KeyStore file is replaced with the KeyStore backup file.
Alternatively, if the number of times the user enters a new password exceeds a preset threshold, the target blockchain wallet cannot be entered. For example, if the user enters a new password more than 5 times and cannot enter the target blockchain wallet, it indicates that the newly generated KeyStore file is corrupted or has other data errors when the new KeyStore file is generated. The electronic device 100 replaces the KeyStore backup file with the newly generated KeyStore file and prompts the user to reset the password again. Through the mode, file damage or other data errors are avoided when the generated KeyStore file is generated, so that the encrypted private key is not the original private key of the blockchain wallet. And finally, forcibly removing the data of the wallet from the wallet client only by means of software unloading, software data clearing and the like, and re-importing the data into the wallet through a private key import or mnemonic import function of the blockchain client, wherein a new wallet password can be set during import.
Optionally, in order to prevent an illegal user from brute force cracking, if the number of times of the public key or the mnemonic word input by the user exceeds a preset threshold, the user is prohibited from inputting the public key or the mnemonic word again within a preset time. For example, if the user inputs a mnemonic word or the private key cannot be successfully matched with the original public key of the target block chain wallet after the time exceeds 10 hours, the user is allowed to perform the operation of resetting the password again after delaying for 1 hour.
The present embodiment further provides a password resetting apparatus 110, where the password resetting apparatus 110 includes at least one software functional module that can be stored in the memory 120 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the electronic device 100. The processor 130 is used for executing executable modules stored in the memory 120, such as software functional modules and computer programs included in the password resetting apparatus 110.
Referring to fig. 4, the present embodiment further provides one of the structural diagrams of the password resetting apparatus 110, where the password resetting apparatus 110 includes at least one functional module that can be stored in a machine-readable storage medium in a software form. Functionally, the password resetting apparatus 110 may include a determining module 1101, a requesting module 1102, a comparing module 1103, and a resetting module 1104.
The determination module 1101 is configured to determine a target blockchain wallet for a password to be reset.
In the present embodiment, the determining module 1101 is configured to execute step S100 in fig. 1, and reference may be made to the detailed description of step S100 for a detailed description of the determining module 1101.
The request module 1102 is configured to obtain a password resetting request, where the password resetting request includes a reset password and authentication information, the authentication information includes a private key or a mnemonic word, and generates a first public key according to the authentication information.
In this embodiment, the request module 1102 is configured to execute step S200 in fig. 2, and reference may be made to the detailed description of step S200 for a detailed description of the request module 1102.
The comparison module 1103 is configured to compare the first public key with a second public key of the target block chaining wallet.
In this embodiment, the comparison module 1103 is configured to perform step S300 in fig. 2, and reference may be made to the detailed description of step S300 for a detailed description of the comparison module 1103.
The reset module 1104 is configured to use the reset password as a new password of the target block chaining wallet if the first public key is the same as the second public key.
In this embodiment, the reset module 1104 is configured to execute step S400 in fig. 2, and reference may be made to the detailed description of step S400 for a detailed description of the reset module 1104.
Optionally, referring to fig. 5, a second block diagram of the password resetting apparatus 110 is shown, where the password resetting apparatus 110 further includes a KeyStore replacing module 1105;
the KeyStore replacing module 1105 is configured to encrypt the private key according to the new password to obtain a new KeyStore file, and replace the original KeyStore file of the target block chain wallet with the new KeyStore file.
Optionally, referring to fig. 5 again, the password resetting apparatus 110 further includes a backup module 1106;
the backup module 1106 is configured to perform backup processing on the original KeyStore file of the target block chaining wallet to obtain a KeyStore backup file.
Optionally, referring to fig. 5 again, the password resetting apparatus 110 further includes a deleting module 1107 and a recovering module 1109;
the deleting module 1107 is configured to delete the KeyStore backup file after the user enters the target blockchain wallet with the new password for the first time.
The recovery module 1109 is configured to enable the user to enter the target blockchain wallet through the new password for the first time, and replace the new KeyStore file with the KeyStore backup file if the number of times that the user inputs the password exceeds a preset threshold.
Optionally, referring to fig. 5 again, the password resetting apparatus 110 further includes a delay module 1108;
the delay module 1108 is configured to prohibit the user from inputting the public key or the mnemonic word again within a preset time if the number of times of the public key or the mnemonic word input by the user exceeds a preset threshold.
In summary, the password resetting method and device provided by the application generate the first public key by receiving the private key or the mnemonic word input by the user and calculating according to the private key or the mnemonic word, and compare the newly generated first public key with the original second public key of the target block chain wallet of the password to be reset. If the first public key is the same as the second public key, the reset password is used as a new password of the blockchain wallet of the password to be reset. And replaces the original KeyStore file of the blockchain wallet to be reset with the password. According to the technical scheme, the complex operation of the original method for resetting the blockchain wallet is simplified, and meanwhile, the data of other wallets in the blockchain wallet client side are prevented from being damaged.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for various embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and all such changes or substitutions are included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (4)

1. A password resetting method applied to an electronic device configured with a blockchain wallet client, the method comprising the steps of:
determining a target blockchain wallet of the password to be reset;
acquiring a password resetting request, wherein the password resetting request comprises a resetting password and authentication information, the authentication information comprises a private key or a mnemonic word, and a first public key is generated according to the authentication information;
comparing the first public key with an original second public key of the target block chaining wallet;
if the first public key is the same as the second public key, taking the reset password as a new password of the target block chaining wallet;
backing up the original KeyStore file of the target block chain wallet to obtain a KeyStore backup file;
encrypting the private key according to the new password to obtain a new KeyStore file, and replacing the original KeyStore file of the target block chain wallet by the new KeyStore file;
deleting the KeyStore backup file after the user enters the target block chain wallet through the new password for the first time;
and the user enters the target block chain wallet through the new password for the first time, and if the password input times of the user exceed a preset threshold value, the new KeyStore file is replaced by the KeyStore backup file.
2. The password reset method of claim 1, wherein the method further comprises:
and if the times of the public key or the mnemonic word input by the user exceed a preset threshold value, forbidding the user to input the public key or the mnemonic word again within preset time.
3. The password resetting device is applied to an electronic device which is provided with a blockchain wallet client, and comprises a determining module, a requesting module, a comparing module, a backup module, a KeyStroe replacing module, a deleting module, a recovering module and a resetting module;
the determining module is used for determining a target blockchain wallet of a password to be reset;
the request module is used for acquiring a password resetting request, the password resetting request comprises a resetting password and authentication information, the authentication information comprises a private key or a mnemonic word, and a first public key is generated according to the authentication information;
the comparison module is used for comparing the first public key with an original second public key of the target block chaining wallet;
the reset module is used for taking the reset password as a new password of the target block chaining wallet if the first public key is the same as the second public key;
the backup module is used for performing backup processing on the original KeyStore file of the target block chain wallet to obtain a KeyStore backup file;
the KeyStroe replacing module is used for encrypting the private key according to the new password to obtain a new KeyStore file, and replacing the original KeyStore file of the target block chain wallet by the new KeyStore file;
the deleting module is used for deleting the KeyStore backup file after a user enters the target block chain wallet through the new password for the first time;
the recovery module is used for the user to enter the target block chain wallet through the new password for the first time, and if the number of times of password input by the user exceeds a preset threshold value, the new KeyStore file is replaced by the KeyStore backup file.
4. The password reset apparatus of claim 3, further comprising a delay module;
the time delay module is used for forbidding the user to input the public key or the mnemonic word again within the preset time if the times of the public key or the mnemonic word input by the user exceed the preset threshold.
CN201910045085.8A 2019-01-17 2019-01-17 Password resetting method and device Active CN109801071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910045085.8A CN109801071B (en) 2019-01-17 2019-01-17 Password resetting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910045085.8A CN109801071B (en) 2019-01-17 2019-01-17 Password resetting method and device

Publications (2)

Publication Number Publication Date
CN109801071A CN109801071A (en) 2019-05-24
CN109801071B true CN109801071B (en) 2020-09-29

Family

ID=66559515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910045085.8A Active CN109801071B (en) 2019-01-17 2019-01-17 Password resetting method and device

Country Status (1)

Country Link
CN (1) CN109801071B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110289946B (en) * 2019-07-12 2022-11-11 深圳市元征科技股份有限公司 Block chain wallet localized file generation method and block chain node point equipment
CN111401888B (en) * 2020-03-05 2023-07-07 北京庚金科技有限公司 Method and device for generating multi-signature wallet
CN111835512B (en) * 2020-07-13 2023-01-31 杭州时戳信息科技有限公司 Private key fragment management method, signature fragment generation method, system and node equipment
CN112306563B (en) * 2020-11-03 2023-11-17 深圳软牛科技有限公司 Method, device, equipment and storage medium for resetting IOS screen using time password

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106066960A (en) * 2016-05-26 2016-11-02 珠海市魅族科技有限公司 A kind of replacement cryptographic methods and replacement encryption apparatus
CN106934623A (en) * 2016-12-07 2017-07-07 中国银联股份有限公司 Account's integrality checking method based on ether mill block chain technology
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN108647961A (en) * 2018-04-26 2018-10-12 华南理工大学 Digital cash wallet based on electrocardiosignal authentication
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key
CN108876605A (en) * 2018-05-27 2018-11-23 北京轻松筹信息技术有限公司 Digital asset method of commerce and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9749297B2 (en) * 2014-11-12 2017-08-29 Yaron Gvili Manicoding for communication verification
US10846663B2 (en) * 2015-10-29 2020-11-24 Cornell University Systems and methods for securing cryptocurrency purchases

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106066960A (en) * 2016-05-26 2016-11-02 珠海市魅族科技有限公司 A kind of replacement cryptographic methods and replacement encryption apparatus
CN106934623A (en) * 2016-12-07 2017-07-07 中国银联股份有限公司 Account's integrality checking method based on ether mill block chain technology
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN108647961A (en) * 2018-04-26 2018-10-12 华南理工大学 Digital cash wallet based on electrocardiosignal authentication
CN108876605A (en) * 2018-05-27 2018-11-23 北京轻松筹信息技术有限公司 Digital asset method of commerce and device
CN108833093A (en) * 2018-06-14 2018-11-16 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of account key

Also Published As

Publication number Publication date
CN109801071A (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN109801071B (en) Password resetting method and device
US11392940B2 (en) Multi-approval system using M of N keys to perform an action at a customer device
US11074139B2 (en) Dynamic block chain system using metadata for backing up data based on digest rules
TWI635412B (en) Method, device and system for verifying user identity by using social relationship data
EP3044901B1 (en) Keying infrastructure
US11601281B2 (en) Managing user profiles securely in a user environment
US20190236274A1 (en) Detection of and recovery from ransomware in backup data
US9497188B2 (en) Offline authentication with embedded authorization attributes
CN101770552B (en) Method for clearing computer password, computer and system for clearing computer password
CN110334153B (en) Authorization method, system, device and equipment in block chain type account book
CN107563192B (en) Lesso software protection method and device, electronic equipment and storage medium
US11275835B2 (en) Method of speeding up a full antivirus scan of files on a mobile device
EP1494460A1 (en) Process and device for authenticating digital data using an authentication plug-in
CN110569636A (en) Application program login method and device based on block chain and storage medium
EP3742367A1 (en) Method for determining information integrity and computer system using the same
CN111080233B (en) Method, device and storage medium for generating subscription information
US11762806B2 (en) Hardening system clock for retention lock compliance enabled systems
US20140108588A1 (en) System and Method for Migration of Digital Assets Leveraging Data Protection
CN110633585B (en) Hard disk locking and unlocking method, device, equipment and readable storage medium
EP3166252B1 (en) Method for secure storing of data, corresponding device and program
CN111464294B (en) Block chain data extraction method, device and storage medium
Varenkamp iPhone Acquisition Using Jailbreaking Techniques
US11874752B1 (en) Methods and systems for facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations
KR102511570B1 (en) Method, device, system and computer readable storage medium for processes in blockchain network
EP1494461B1 (en) Process and device for authenticating digital data using an authentication plug-in

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant