CN109919766A - Data deposit card and verify the method and terminal, server of trade user authenticity - Google Patents

Data deposit card and verify the method and terminal, server of trade user authenticity Download PDF

Info

Publication number
CN109919766A
CN109919766A CN201910124178.XA CN201910124178A CN109919766A CN 109919766 A CN109919766 A CN 109919766A CN 201910124178 A CN201910124178 A CN 201910124178A CN 109919766 A CN109919766 A CN 109919766A
Authority
CN
China
Prior art keywords
information
string
card
net
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910124178.XA
Other languages
Chinese (zh)
Inventor
张磊
何彬
杨逸尘
蒋华超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Baishitong Legal Information Technology Co Ltd
Shanghai Zhangjiang Notary Office
Original Assignee
Shanghai Baishitong Legal Information Technology Co Ltd
Shanghai Zhangjiang Notary Office
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Baishitong Legal Information Technology Co Ltd, Shanghai Zhangjiang Notary Office filed Critical Shanghai Baishitong Legal Information Technology Co Ltd
Priority to CN201910124178.XA priority Critical patent/CN109919766A/en
Publication of CN109919766A publication Critical patent/CN109919766A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The purpose of the application is to provide a kind of data and deposits card and verify the method and its terminal, server of trade user authenticity, and method includes: to call net results card service interface, obtains the first verification information of user;Processing is formatted to first verification information, obtains corresponding JSON string;The JSON is gone here and there and carries out symmetric cryptography processing, obtains corresponding encryption string;Encryption string is added in the transaction record information of the user, and the transaction record information is stored on block chain.

Description

Data deposit card and verify the method and terminal, server of trade user authenticity
Technical field
A kind of method deposited card this application involves block chain field more particularly to data and verify trade user authenticity And its terminal, server.
Background technique
After block chain transaction data cochain, data are tampered in order to prevent, and usual customer transaction data are demonstrate,proved by using CA Bookmark name proves the authenticity of both parties, but CA certificate in storing process there are risk of leakage, and effective time model Enclose usually bigger, the true identity of unsuitable justification function user at some time point.
Summary of the invention
The purpose of the application is to provide a kind of data and deposits card and verify method and its end of trade user authenticity End, server, to solve the problems, such as that the authenticity to trade user is verified.
According to the first aspect of the invention, a kind of method that data deposit card is provided, comprising:
It calls net results to demonstrate,prove service interface, obtains the first verification information of user;
Processing is formatted to first verification information, obtains corresponding JSON string;
The JSON is gone here and there and carries out symmetric cryptography processing, obtains corresponding encryption string;
Encryption string is added in the transaction record information of the user, and the transaction record information is stored in On block chain.
Further, first verification information includes:
Verify application time, verification result acquisition time, verification result bit string.
Further, the format of the JSON string are as follows:
TmpString=" QuestTime ": " the first lint-long integer ", " ResultTime ": " the second lint-long integer ", " CheckResult ": " verification result bit string " };
Wherein, first lint-long integer is the verifying application time, and second lint-long integer is that the verification result obtains Take the time.
Further, described go here and there to the JSON carries out symmetric cryptography processing, obtains corresponding encryption string, comprising:
CTID=3DES (TmpString);
Wherein, the encryption string that CTID is, 3DES (TmpString) indicate to be DES three times to JSON string Encryption Algorithm.
Further, which comprises
Hash operation is done to the transaction record information, obtains corresponding cryptographic Hash;
The cryptographic Hash is added to the transaction record information.
According to the second aspect of the invention, a kind of method for verifying trade user authenticity is provided, comprising:
Encryption string is extracted from the transaction record information of user, and symmetrical decryption is done to encryption string, is obtained corresponding JSON string;
The net that the user is obtained from JSON string demonstrate,proves information;
Information is demonstrate,proved according to the net, calls net card information authentication service to verify the authenticity of the user.
According to the third aspect of the invention we, the device that a kind of data deposit card is provided, comprising: net card information memory cell and Kazakhstan Uncommon value cell, the net card information memory cell and Hash value cell are set in the transaction record information unit of block chain,
The net demonstrate,proves information memory cell, and the net for storing user demonstrate,proves verification information;
The Hash value cell, for storing the first cryptographic Hash, wherein first cryptographic Hash is tactful according to first It arrives, first strategy includes:
Hash operation is done to transaction record information and the encryption string generated based on the net card verification information.
According to the fourth aspect of the invention, a kind of computer readable storage medium, the computer-readable storage medium are provided Matter store instruction, the method that described instruction data according to the present invention deposit card are executed.
According to the fifth aspect of the invention, a kind of terminal is provided, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Reason device executes the operation that data as described in the present invention deposit the method for card.
According to the sixth aspect of the invention, a kind of server is provided, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Reason device executes the operation that data as described in the present invention deposit the method for card.
A kind of data provided by the present application deposit the method and its terminal, server of card, call net results to demonstrate,prove service interface, obtain Take first verification information at family;Processing is formatted to first verification information, obtains corresponding JSON string;To described JSON string carries out symmetric cryptography processing, obtains corresponding encryption string;The encryption string is added to the transaction record of the user In information, and the transaction record information is stored on block chain.In this way, net card verification information and Transaction Information are incorporated in It records together, is associated with transaction data by force with real user information, to solve to ask what the authenticity of trade user was verified Topic.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow diagram that the data of the embodiment of the present invention one deposit the method for card;
Fig. 2 is the flow diagram of the method for the verifying trade user authenticity of the embodiment of the present invention two;
Fig. 3 is the structural schematic diagram that the data of the embodiment of the present invention three deposit the device of card;
Fig. 4 is the structural schematic diagram that the data of the embodiment of the present invention four deposit the device of card.
Fig. 5 is the structural schematic diagram of the terminal of the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the server of the embodiment of the present invention six.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (such as central processing unit (Central Processing Unit, CPU), input/output interface, network interface and interior It deposits.
Memory may include the non-volatile memory in computer-readable medium, random access memory (Random Access Memory, RAM) and/or the forms such as Nonvolatile memory, such as read-only memory (Read-Only Memory, ROM) Or flash memory (flash RAM).Memory is the example of computer-readable medium.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (Phase Change RAM, PRAM), static random is deposited Access to memory (Static Random Access Memory, SRAM), dynamic random access memory (Dynamic Random Access Memory, DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable can It is program read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), fast Dodge memory body or other memory techniques, read-only disc read only memory (CD-ROM) (Compact Disc Read-Only Memory, CD- ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, Computer-readable medium does not include non-temporary computer readable media (transitory media), the data-signal and load of such as modulation Wave.
Fig. 1 is the flow diagram that the data of the embodiment of the present invention one deposit the method for card, as shown in Figure 1, the present invention is implemented The method that the data that example one provides deposit card, this method comprises:
Step S101 calls net results to demonstrate,prove service interface, obtains the first verification information of user.
The executing subject for the method that the data that the embodiment of the present invention one provides deposit card can be terminal device, be also possible to take Business device.Here net card can be resident identification card function line voucher, can be by calling Ministry of Public Security's net card service for checking credentials to connect Mouthful, to obtain the first verification information of user, user may refer to the user for the identity reality to be verified participated in business here.
In one embodiment, first verification information includes: verifying application time QuestTime, and verification result obtains Take time ResultTime, verification result bit string CheckResult.
Step S102 is formatted processing to first verification information, obtains corresponding JSON string.
In one embodiment, the format of the JSON string are as follows: the length of TmpString={ " QuestTime ": " first is whole Number ", " ResultTime ": " the second lint-long integer ", " CheckResult ": " verification result bit string " };Wherein, described first is long Integer is the verifying application time, and second lint-long integer is the verification result acquisition time.Specifically, verifying is applied Time, verification result acquisition time, verification result information these three types bit string are formatted as a JSON string (JavaScript Object Notation, JS object numbered musical notation string).
Step S103 goes here and there the JSON and carries out symmetric cryptography processing, obtains corresponding encryption string.
In one embodiment, described go here and there to the JSON carries out symmetric cryptography processing, obtains corresponding encryption string, packet It includes: CTID=3DES (TmpString);Wherein, the encryption string that CTID is, 3DES (TmpString) are indicated to institute It states JSON string and does des encryption algorithm three times.Specifically, the string of JSON described in the key pair using 2 different 56 TmpString Tertiary infilling is carried out, to obtain the encryption string CTID.
Encryption string is added in the transaction record information of the user by step S104, and by the transaction record Information is stored on block chain.
Specifically, can be by the encrypted characters string (i.e. CTID) obtained after encryption as transaction record information one Divide cochain storage.
In one embodiment, which comprises Hash operation is done to the transaction record information, obtains corresponding Kazakhstan Uncommon value;The cryptographic Hash is added to the transaction record information.Specifically, using certain hash algorithm to transaction record information (including encryption string) does Hash calculating, and Hash result is attached to transaction record information, and cochain stores together.Here it does Hash calculating is to judge transaction data integrality according to hash value.
In the present embodiment, since to demonstrate,prove usual effective time very short for net results, and every time application net results card when, need pair A possibility that user carries out the biological characteristic validations such as fingerprint or brush face, is falsely used is extremely low, by net card verification information and transaction record Information combines cochain, can valid certificates trade user authenticity.
Fig. 2 is the flow diagram of the method for the verifying trade user authenticity of the embodiment of the present invention two, as shown in Fig. 2, The method of verifying trade user authenticity provided by Embodiment 2 of the present invention, including
Step 201, encryption string is extracted from the transaction record information of user, and symmetrical decryption is done to encryption string, is obtained Corresponding JSON string.
The method of verifying trade user authenticity provided by Embodiment 2 of the present invention can be applied to implement based on the present invention The method that the data that example one provides deposit card deposit the data of card.
Step 202, the net for the user being obtained from JSON string demonstrate,proves information;
Step 203, information is demonstrate,proved according to the net, calls net card information authentication service to verify the authenticity of the user.
Specifically, can call the Ministry of Public Security net card information authentication service come when proving to trade at that time user identity it is true Property.
In the present embodiment, by being verified to each Transaction Information and hash value, can quickly confirm transaction data and Net is demonstrate,proved the integrality of verification information and is not tampered with, more rapidly and reliable compared to the mode that traditional CA certificate is signed; According to original net card information is symmetrically decrypted, Ministry of Public Security's net card service for checking credentials is called, relevant net card information obtains public affairs when trading After the net card service for checking credentials confirmation of peace portion, it is believed that trade user authenticity is confirmed, in this way, user identity when realizing proof transaction Authenticity.
Fig. 3 is the structural schematic diagram that the data of the embodiment of the present invention three deposit the device of card, as shown in figure 3, the present invention is implemented The data that example three provides deposit the device 300 of card, comprising:
Net card information memory cell 301, the net for storing user demonstrate,prove verification information;
Hash value cell 302, for storing the first cryptographic Hash, wherein first cryptographic Hash is obtained according to the first strategy, First strategy includes:
Hash operation is done to transaction record information and the encryption string generated based on the net card verification information.
Wherein, the transaction record letter in block chain can be set in net card information memory cell 301 and Hash value cell 302 In interest statement member, it can in the Transaction Information unit of block chain, increase net card information memory cell 301 and Hash value cell 302.Number of deals can be judged according to the first cryptographic Hash (hash value of entire transaction record) stored in Hash value cell 302 According to integrality, and verification information can be demonstrate,proved by the net stored in net card information memory cell 301 to judge the true of user identity Reality.In practical application, the structural schematic diagram for the device that the data for being referred to the embodiment of the present invention four shown in Fig. 4 deposit card comes It realizes.
Mainly method provided by the present application is described above, it is corresponding, the application also provide a kind of terminal and A kind of server, wherein the terminal includes the module or unit for the method shown in Fig. 1 or Fig. 2 that is able to carry out, which includes energy The module or unit of method shown in Fig. 1 or Fig. 2 are enough executed, these modules or unit can pass through software, hardware or soft or hard combination Mode realize that the application does not limit.Fig. 5 and Fig. 6 is combined to carry out terminal and server provided by the present application separately below It illustrates.
Fig. 5 is the structural schematic diagram of the terminal of the embodiment of the present invention five, as shown in figure 5, what the embodiment of the present invention five provided Terminal includes:
Module 501 is obtained, for calling net results to demonstrate,prove service interface, obtains the first verification information of user;
Formatting module 502 obtains corresponding JSON string for being formatted processing to first verification information;
Encrypting module 503 carries out symmetric cryptography processing for going here and there to the JSON, obtains corresponding encryption string;
Memory module 504, for encryption string to be added in the transaction record information of the user, and by the friendship Easily record information is stored on block chain.
Fig. 6 is the structural schematic diagram of the server of the embodiment of the present invention six, as shown in fig. 6, the embodiment of the present invention six provides Server include:
Module 601 is obtained, for calling net results to demonstrate,prove service interface, obtains the first verification information of user;
Formatting module 602 obtains corresponding JSON string for being formatted processing to first verification information;
Encrypting module 603 carries out symmetric cryptography processing for going here and there to the JSON, obtains corresponding encryption string;
Memory module 604, for encryption string to be added in the transaction record information of the user, and by the friendship Easily record information is stored on block chain.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage refers to It enables, described instruction is according to embodiments of the present invention one, method described in embodiment two is executed.
The embodiment of the present invention also provides a kind of terminal, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Reason device executes the data of the embodiment of the present invention one such as and deposits the side of the authenticity of the method for card or the verifying trade user of embodiment two The operation of method.
The embodiment of the present invention also provides a kind of server, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Reason device executes the method for depositing the method for card or the verifying trade user authenticity of embodiment two such as the data of the embodiment of the present invention one Operation.
Meaning terminal of the invention includes but is not limited to that any one can carry out human-computer interaction with user and (such as pass through touch tablet Carry out human-computer interaction) the mobile electronic products such as electronic product, such as smart phone, tablet computer, the mobile electronic product Any operating system, such as android operating system, iOS operating system can be used.Wherein, the server includes one kind Can be according to the instruction for being previously set or storing, automatic progress numerical value calculates and the electronic equipment of information processing, hardware include But it is not limited to microprocessor, specific integrated circuit (ASIC), programmable logic device (PLD), field programmable gate array (FPGA), digital signal processor (DSP), embedded device etc..The server includes but is not limited to computer, network master The cloud that machine, single network server, multiple network server collection or multiple servers are constituted;Here, cloud is by being based on cloud computing The a large number of computers or network servers of (Cloud Computing) is constituted, wherein and cloud computing is one kind of distributed computing, A virtual supercomputer consisting of a loosely coupled set of computers.The network include but is not limited to internet, Wide area network, Metropolitan Area Network (MAN), local area network, VPN network, wireless self-organization network (Ad Hoc network) etc..Preferably, the terminal kimonos Business device can also be that running on the terminal, server or terminal and server crosses network and be integrated in constituted equipment Program.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed to implement the above steps or functions by processor.Similarly, the application Software program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example Such as, as the circuit cooperated with processor thereby executing each step or function.
In addition, a part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. And the program instruction of the present processes is called, it is possibly stored in fixed or moveable recording medium, and/or pass through Broadcast or the data flow in other signal-bearing mediums and transmitted, and/or be stored according to described program instruction operation In the working storage of computer equipment.Here, including a device according to one embodiment of the application, which includes using Memory in storage computer program instructions and processor for executing program instructions, wherein when the computer program refers to When enabling by processor execution, method and/or skill of the device operation based on aforementioned multiple embodiments according to the application are triggered Art scheme.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (10)

1. a kind of method that data deposit card characterized by comprising
It calls net results to demonstrate,prove service interface, obtains the first verification information of user;
Processing is formatted to first verification information, obtains corresponding JSON string;
The JSON is gone here and there and carries out symmetric cryptography processing, obtains corresponding encryption string;
Encryption string is added in the transaction record information of the user, and the transaction record information is stored in block On chain.
2. the method that data according to claim 1 deposit card, which is characterized in that first verification information includes:
Verify application time, verification result acquisition time, verification result bit string.
3. the method that data according to claim 2 deposit card, which is characterized in that the format of the JSON string are as follows:
TmpString=" QuestTime ": " the first lint-long integer ", " ResultTime ": " the second lint-long integer ", " CheckResult ": " verification result bit string " };
Wherein, first lint-long integer is the verifying application time, when second lint-long integer is that the verification result obtains Between.
4. the method that data according to claim 1 or 3 deposit card, which is characterized in that described to be carried out pair to JSON string Claim encryption, obtain corresponding encryption string, comprising:
CTID=3DES (TmpString);
Wherein, the encryption string that CTID is, 3DES (TmpString) indicate to do des encryption three times to JSON string Algorithm.
5. the method that data according to claim 1 deposit card, which is characterized in that the described method includes:
Hash operation is done to the transaction record information, obtains corresponding cryptographic Hash;
The cryptographic Hash is added to the transaction record information.
6. a kind of method for verifying trade user authenticity characterized by comprising
Encryption string is extracted from the transaction record information of user, symmetrical decryption is done to encryption string, obtains corresponding JSON string;
The net that the user is obtained from JSON string demonstrate,proves information;
Information is demonstrate,proved according to the net, calls net card information authentication service to verify the authenticity of the user.
7. the device that a kind of data deposit card characterized by comprising net card information memory cell and Hash value cell, the net Card information memory cell and Hash value cell are set in the transaction record information unit of block chain,
The net demonstrate,proves information memory cell, and the net for storing user demonstrate,proves verification information;
The Hash value cell, for storing the first cryptographic Hash, wherein first cryptographic Hash is obtained according to the first strategy, institute Stating the first strategy includes:
Hash operation is done to transaction record information and the encryption string generated based on the net card verification information.
8. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage instruction, the finger The method for enabling data according to any one of claim 1 to 5 deposit card is executed.
9. a kind of terminal characterized by comprising
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute the operation that the data as described in any one of claims 1 to 5 deposit the method for card.
10. a kind of server characterized by comprising
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute the operation that the data as described in any one of claims 1 to 5 deposit the method for card.
CN201910124178.XA 2019-02-19 2019-02-19 Data deposit card and verify the method and terminal, server of trade user authenticity Pending CN109919766A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910124178.XA CN109919766A (en) 2019-02-19 2019-02-19 Data deposit card and verify the method and terminal, server of trade user authenticity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910124178.XA CN109919766A (en) 2019-02-19 2019-02-19 Data deposit card and verify the method and terminal, server of trade user authenticity

Publications (1)

Publication Number Publication Date
CN109919766A true CN109919766A (en) 2019-06-21

Family

ID=66961703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910124178.XA Pending CN109919766A (en) 2019-02-19 2019-02-19 Data deposit card and verify the method and terminal, server of trade user authenticity

Country Status (1)

Country Link
CN (1) CN109919766A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111901099A (en) * 2020-06-16 2020-11-06 上海眼控科技股份有限公司 Method, system and equipment for encrypting vehicle information
CN113259133A (en) * 2021-07-02 2021-08-13 深圳市深圳通有限公司 Encryption communication method, equipment and storage medium based on HTTP protocol

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN106354994A (en) * 2016-08-22 2017-01-25 布比(北京)网络技术有限公司 Method and system for processing medical data
CN107844978A (en) * 2017-11-30 2018-03-27 中链科技有限公司 A kind of staple commodities transaction processing method and system based on block chain
CN108650252A (en) * 2018-04-28 2018-10-12 分布共享(北京)信息技术有限公司 The data-sharing systems and method of a kind of safety, fair protection privacy
CN108805563A (en) * 2018-03-21 2018-11-13 中思博安科技(北京)有限公司 A kind of medical management of differential account method and device based on block chain
CN108833081A (en) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method
CN109101572A (en) * 2018-07-17 2018-12-28 何晓行 Card method, apparatus and server, storage medium are deposited based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN106354994A (en) * 2016-08-22 2017-01-25 布比(北京)网络技术有限公司 Method and system for processing medical data
CN107844978A (en) * 2017-11-30 2018-03-27 中链科技有限公司 A kind of staple commodities transaction processing method and system based on block chain
CN108805563A (en) * 2018-03-21 2018-11-13 中思博安科技(北京)有限公司 A kind of medical management of differential account method and device based on block chain
CN108650252A (en) * 2018-04-28 2018-10-12 分布共享(北京)信息技术有限公司 The data-sharing systems and method of a kind of safety, fair protection privacy
CN108833081A (en) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method
CN109101572A (en) * 2018-07-17 2018-12-28 何晓行 Card method, apparatus and server, storage medium are deposited based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111901099A (en) * 2020-06-16 2020-11-06 上海眼控科技股份有限公司 Method, system and equipment for encrypting vehicle information
CN113259133A (en) * 2021-07-02 2021-08-13 深圳市深圳通有限公司 Encryption communication method, equipment and storage medium based on HTTP protocol
CN113259133B (en) * 2021-07-02 2021-10-15 深圳市深圳通有限公司 Encryption communication method, equipment and storage medium based on HTTP protocol

Similar Documents

Publication Publication Date Title
CN109359974B (en) Block chain transaction method and device and electronic equipment
CN109359971B (en) Block chain transaction method and device and electronic equipment
ES2881289T3 (en) Method to manage a trusted identity
CN107465505B (en) Key data processing method and device and server
EP3673609B1 (en) Method and apparatus for obtaining input of secure multiparty computation protocol
JP2021529397A (en) Systems and methods for blockchain address and owner verification
WO2021174927A1 (en) Blockchain-based identity verification method and apparatus, device, and storage medium
CN112215608A (en) Data processing method and device
Barsoum et al. Integrity verification of multiple data copies over untrusted cloud servers
CN104967693B (en) Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage
LU100497B1 (en) Method and system for securely enrolling cryptographic keys on physical media for cryptographic keys, and physical media product
CN113704775B (en) Service processing method and related device based on distributed digital identity
Sarfaraz et al. A tree structure-based improved blockchain framework for a secure online bidding system
CN107070896B (en) Safe and efficient block chain network customized login method and safe reinforcement system
Rahmadika et al. Toward Privacy‐Preserving Shared Storage in Untrusted Blockchain P2P Networks
CN112347516A (en) Asset certification method and device based on block chain
JP2021064891A (en) Consortium block chain system, computer, and transaction approval method
WO2021134897A1 (en) Blockchain supply chain transaction hidden dynamic supervision system and method
CN109948370A (en) A kind of method for processing business based on block chain, device and electronic equipment
CN109919766A (en) Data deposit card and verify the method and terminal, server of trade user authenticity
US11956347B2 (en) Method and apparatus with mobile payment and verification
Shahariar et al. A Secure Land Record Management System using Blockchain Technology
CN115604023A (en) Block chain private data protection method and system
CN109687967A (en) Electric endorsement method and equipment
Rao et al. Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190621

WD01 Invention patent application deemed withdrawn after publication