CN109919766A - Data deposit card and verify the method and terminal, server of trade user authenticity - Google Patents
Data deposit card and verify the method and terminal, server of trade user authenticity Download PDFInfo
- Publication number
- CN109919766A CN109919766A CN201910124178.XA CN201910124178A CN109919766A CN 109919766 A CN109919766 A CN 109919766A CN 201910124178 A CN201910124178 A CN 201910124178A CN 109919766 A CN109919766 A CN 109919766A
- Authority
- CN
- China
- Prior art keywords
- information
- string
- card
- net
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The purpose of the application is to provide a kind of data and deposits card and verify the method and its terminal, server of trade user authenticity, and method includes: to call net results card service interface, obtains the first verification information of user;Processing is formatted to first verification information, obtains corresponding JSON string;The JSON is gone here and there and carries out symmetric cryptography processing, obtains corresponding encryption string;Encryption string is added in the transaction record information of the user, and the transaction record information is stored on block chain.
Description
Technical field
A kind of method deposited card this application involves block chain field more particularly to data and verify trade user authenticity
And its terminal, server.
Background technique
After block chain transaction data cochain, data are tampered in order to prevent, and usual customer transaction data are demonstrate,proved by using CA
Bookmark name proves the authenticity of both parties, but CA certificate in storing process there are risk of leakage, and effective time model
Enclose usually bigger, the true identity of unsuitable justification function user at some time point.
Summary of the invention
The purpose of the application is to provide a kind of data and deposits card and verify method and its end of trade user authenticity
End, server, to solve the problems, such as that the authenticity to trade user is verified.
According to the first aspect of the invention, a kind of method that data deposit card is provided, comprising:
It calls net results to demonstrate,prove service interface, obtains the first verification information of user;
Processing is formatted to first verification information, obtains corresponding JSON string;
The JSON is gone here and there and carries out symmetric cryptography processing, obtains corresponding encryption string;
Encryption string is added in the transaction record information of the user, and the transaction record information is stored in
On block chain.
Further, first verification information includes:
Verify application time, verification result acquisition time, verification result bit string.
Further, the format of the JSON string are as follows:
TmpString=" QuestTime ": " the first lint-long integer ", " ResultTime ": " the second lint-long integer ", "
CheckResult ": " verification result bit string " };
Wherein, first lint-long integer is the verifying application time, and second lint-long integer is that the verification result obtains
Take the time.
Further, described go here and there to the JSON carries out symmetric cryptography processing, obtains corresponding encryption string, comprising:
CTID=3DES (TmpString);
Wherein, the encryption string that CTID is, 3DES (TmpString) indicate to be DES three times to JSON string
Encryption Algorithm.
Further, which comprises
Hash operation is done to the transaction record information, obtains corresponding cryptographic Hash;
The cryptographic Hash is added to the transaction record information.
According to the second aspect of the invention, a kind of method for verifying trade user authenticity is provided, comprising:
Encryption string is extracted from the transaction record information of user, and symmetrical decryption is done to encryption string, is obtained corresponding
JSON string;
The net that the user is obtained from JSON string demonstrate,proves information;
Information is demonstrate,proved according to the net, calls net card information authentication service to verify the authenticity of the user.
According to the third aspect of the invention we, the device that a kind of data deposit card is provided, comprising: net card information memory cell and Kazakhstan
Uncommon value cell, the net card information memory cell and Hash value cell are set in the transaction record information unit of block chain,
The net demonstrate,proves information memory cell, and the net for storing user demonstrate,proves verification information;
The Hash value cell, for storing the first cryptographic Hash, wherein first cryptographic Hash is tactful according to first
It arrives, first strategy includes:
Hash operation is done to transaction record information and the encryption string generated based on the net card verification information.
According to the fourth aspect of the invention, a kind of computer readable storage medium, the computer-readable storage medium are provided
Matter store instruction, the method that described instruction data according to the present invention deposit card are executed.
According to the fifth aspect of the invention, a kind of terminal is provided, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Reason device executes the operation that data as described in the present invention deposit the method for card.
According to the sixth aspect of the invention, a kind of server is provided, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Reason device executes the operation that data as described in the present invention deposit the method for card.
A kind of data provided by the present application deposit the method and its terminal, server of card, call net results to demonstrate,prove service interface, obtain
Take first verification information at family;Processing is formatted to first verification information, obtains corresponding JSON string;To described
JSON string carries out symmetric cryptography processing, obtains corresponding encryption string;The encryption string is added to the transaction record of the user
In information, and the transaction record information is stored on block chain.In this way, net card verification information and Transaction Information are incorporated in
It records together, is associated with transaction data by force with real user information, to solve to ask what the authenticity of trade user was verified
Topic.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow diagram that the data of the embodiment of the present invention one deposit the method for card;
Fig. 2 is the flow diagram of the method for the verifying trade user authenticity of the embodiment of the present invention two;
Fig. 3 is the structural schematic diagram that the data of the embodiment of the present invention three deposit the device of card;
Fig. 4 is the structural schematic diagram that the data of the embodiment of the present invention four deposit the device of card.
Fig. 5 is the structural schematic diagram of the terminal of the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the server of the embodiment of the present invention six.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more
Processor (such as central processing unit (Central Processing Unit, CPU), input/output interface, network interface and interior
It deposits.
Memory may include the non-volatile memory in computer-readable medium, random access memory (Random
Access Memory, RAM) and/or the forms such as Nonvolatile memory, such as read-only memory (Read-Only Memory, ROM)
Or flash memory (flash RAM).Memory is the example of computer-readable medium.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (Phase Change RAM, PRAM), static random is deposited
Access to memory (Static Random Access Memory, SRAM), dynamic random access memory (Dynamic Random
Access Memory, DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable can
It is program read-only memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), fast
Dodge memory body or other memory techniques, read-only disc read only memory (CD-ROM) (Compact Disc Read-Only Memory, CD-
ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages
Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article,
Computer-readable medium does not include non-temporary computer readable media (transitory media), the data-signal and load of such as modulation
Wave.
Fig. 1 is the flow diagram that the data of the embodiment of the present invention one deposit the method for card, as shown in Figure 1, the present invention is implemented
The method that the data that example one provides deposit card, this method comprises:
Step S101 calls net results to demonstrate,prove service interface, obtains the first verification information of user.
The executing subject for the method that the data that the embodiment of the present invention one provides deposit card can be terminal device, be also possible to take
Business device.Here net card can be resident identification card function line voucher, can be by calling Ministry of Public Security's net card service for checking credentials to connect
Mouthful, to obtain the first verification information of user, user may refer to the user for the identity reality to be verified participated in business here.
In one embodiment, first verification information includes: verifying application time QuestTime, and verification result obtains
Take time ResultTime, verification result bit string CheckResult.
Step S102 is formatted processing to first verification information, obtains corresponding JSON string.
In one embodiment, the format of the JSON string are as follows: the length of TmpString={ " QuestTime ": " first is whole
Number ", " ResultTime ": " the second lint-long integer ", " CheckResult ": " verification result bit string " };Wherein, described first is long
Integer is the verifying application time, and second lint-long integer is the verification result acquisition time.Specifically, verifying is applied
Time, verification result acquisition time, verification result information these three types bit string are formatted as a JSON string (JavaScript
Object Notation, JS object numbered musical notation string).
Step S103 goes here and there the JSON and carries out symmetric cryptography processing, obtains corresponding encryption string.
In one embodiment, described go here and there to the JSON carries out symmetric cryptography processing, obtains corresponding encryption string, packet
It includes: CTID=3DES (TmpString);Wherein, the encryption string that CTID is, 3DES (TmpString) are indicated to institute
It states JSON string and does des encryption algorithm three times.Specifically, the string of JSON described in the key pair using 2 different 56 TmpString
Tertiary infilling is carried out, to obtain the encryption string CTID.
Encryption string is added in the transaction record information of the user by step S104, and by the transaction record
Information is stored on block chain.
Specifically, can be by the encrypted characters string (i.e. CTID) obtained after encryption as transaction record information one
Divide cochain storage.
In one embodiment, which comprises Hash operation is done to the transaction record information, obtains corresponding Kazakhstan
Uncommon value;The cryptographic Hash is added to the transaction record information.Specifically, using certain hash algorithm to transaction record information
(including encryption string) does Hash calculating, and Hash result is attached to transaction record information, and cochain stores together.Here it does
Hash calculating is to judge transaction data integrality according to hash value.
In the present embodiment, since to demonstrate,prove usual effective time very short for net results, and every time application net results card when, need pair
A possibility that user carries out the biological characteristic validations such as fingerprint or brush face, is falsely used is extremely low, by net card verification information and transaction record
Information combines cochain, can valid certificates trade user authenticity.
Fig. 2 is the flow diagram of the method for the verifying trade user authenticity of the embodiment of the present invention two, as shown in Fig. 2,
The method of verifying trade user authenticity provided by Embodiment 2 of the present invention, including
Step 201, encryption string is extracted from the transaction record information of user, and symmetrical decryption is done to encryption string, is obtained
Corresponding JSON string.
The method of verifying trade user authenticity provided by Embodiment 2 of the present invention can be applied to implement based on the present invention
The method that the data that example one provides deposit card deposit the data of card.
Step 202, the net for the user being obtained from JSON string demonstrate,proves information;
Step 203, information is demonstrate,proved according to the net, calls net card information authentication service to verify the authenticity of the user.
Specifically, can call the Ministry of Public Security net card information authentication service come when proving to trade at that time user identity it is true
Property.
In the present embodiment, by being verified to each Transaction Information and hash value, can quickly confirm transaction data and
Net is demonstrate,proved the integrality of verification information and is not tampered with, more rapidly and reliable compared to the mode that traditional CA certificate is signed;
According to original net card information is symmetrically decrypted, Ministry of Public Security's net card service for checking credentials is called, relevant net card information obtains public affairs when trading
After the net card service for checking credentials confirmation of peace portion, it is believed that trade user authenticity is confirmed, in this way, user identity when realizing proof transaction
Authenticity.
Fig. 3 is the structural schematic diagram that the data of the embodiment of the present invention three deposit the device of card, as shown in figure 3, the present invention is implemented
The data that example three provides deposit the device 300 of card, comprising:
Net card information memory cell 301, the net for storing user demonstrate,prove verification information;
Hash value cell 302, for storing the first cryptographic Hash, wherein first cryptographic Hash is obtained according to the first strategy,
First strategy includes:
Hash operation is done to transaction record information and the encryption string generated based on the net card verification information.
Wherein, the transaction record letter in block chain can be set in net card information memory cell 301 and Hash value cell 302
In interest statement member, it can in the Transaction Information unit of block chain, increase net card information memory cell 301 and Hash value cell
302.Number of deals can be judged according to the first cryptographic Hash (hash value of entire transaction record) stored in Hash value cell 302
According to integrality, and verification information can be demonstrate,proved by the net stored in net card information memory cell 301 to judge the true of user identity
Reality.In practical application, the structural schematic diagram for the device that the data for being referred to the embodiment of the present invention four shown in Fig. 4 deposit card comes
It realizes.
Mainly method provided by the present application is described above, it is corresponding, the application also provide a kind of terminal and
A kind of server, wherein the terminal includes the module or unit for the method shown in Fig. 1 or Fig. 2 that is able to carry out, which includes energy
The module or unit of method shown in Fig. 1 or Fig. 2 are enough executed, these modules or unit can pass through software, hardware or soft or hard combination
Mode realize that the application does not limit.Fig. 5 and Fig. 6 is combined to carry out terminal and server provided by the present application separately below
It illustrates.
Fig. 5 is the structural schematic diagram of the terminal of the embodiment of the present invention five, as shown in figure 5, what the embodiment of the present invention five provided
Terminal includes:
Module 501 is obtained, for calling net results to demonstrate,prove service interface, obtains the first verification information of user;
Formatting module 502 obtains corresponding JSON string for being formatted processing to first verification information;
Encrypting module 503 carries out symmetric cryptography processing for going here and there to the JSON, obtains corresponding encryption string;
Memory module 504, for encryption string to be added in the transaction record information of the user, and by the friendship
Easily record information is stored on block chain.
Fig. 6 is the structural schematic diagram of the server of the embodiment of the present invention six, as shown in fig. 6, the embodiment of the present invention six provides
Server include:
Module 601 is obtained, for calling net results to demonstrate,prove service interface, obtains the first verification information of user;
Formatting module 602 obtains corresponding JSON string for being formatted processing to first verification information;
Encrypting module 603 carries out symmetric cryptography processing for going here and there to the JSON, obtains corresponding encryption string;
Memory module 604, for encryption string to be added in the transaction record information of the user, and by the friendship
Easily record information is stored on block chain.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage refers to
It enables, described instruction is according to embodiments of the present invention one, method described in embodiment two is executed.
The embodiment of the present invention also provides a kind of terminal, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Reason device executes the data of the embodiment of the present invention one such as and deposits the side of the authenticity of the method for card or the verifying trade user of embodiment two
The operation of method.
The embodiment of the present invention also provides a kind of server, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
Reason device executes the method for depositing the method for card or the verifying trade user authenticity of embodiment two such as the data of the embodiment of the present invention one
Operation.
Meaning terminal of the invention includes but is not limited to that any one can carry out human-computer interaction with user and (such as pass through touch tablet
Carry out human-computer interaction) the mobile electronic products such as electronic product, such as smart phone, tablet computer, the mobile electronic product
Any operating system, such as android operating system, iOS operating system can be used.Wherein, the server includes one kind
Can be according to the instruction for being previously set or storing, automatic progress numerical value calculates and the electronic equipment of information processing, hardware include
But it is not limited to microprocessor, specific integrated circuit (ASIC), programmable logic device (PLD), field programmable gate array
(FPGA), digital signal processor (DSP), embedded device etc..The server includes but is not limited to computer, network master
The cloud that machine, single network server, multiple network server collection or multiple servers are constituted;Here, cloud is by being based on cloud computing
The a large number of computers or network servers of (Cloud Computing) is constituted, wherein and cloud computing is one kind of distributed computing,
A virtual supercomputer consisting of a loosely coupled set of computers.The network include but is not limited to internet,
Wide area network, Metropolitan Area Network (MAN), local area network, VPN network, wireless self-organization network (Ad Hoc network) etc..Preferably, the terminal kimonos
Business device can also be that running on the terminal, server or terminal and server crosses network and be integrated in constituted equipment
Program.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment
In, the software program of the application can be executed to implement the above steps or functions by processor.Similarly, the application
Software program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory,
Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example
Such as, as the circuit cooperated with processor thereby executing each step or function.
In addition, a part of the application can be applied to computer program product, such as computer program instructions, when its quilt
When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution.
And the program instruction of the present processes is called, it is possibly stored in fixed or moveable recording medium, and/or pass through
Broadcast or the data flow in other signal-bearing mediums and transmitted, and/or be stored according to described program instruction operation
In the working storage of computer equipment.Here, including a device according to one embodiment of the application, which includes using
Memory in storage computer program instructions and processor for executing program instructions, wherein when the computer program refers to
When enabling by processor execution, method and/or skill of the device operation based on aforementioned multiple embodiments according to the application are triggered
Art scheme.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple
Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table
Show title, and does not indicate any particular order.
Claims (10)
1. a kind of method that data deposit card characterized by comprising
It calls net results to demonstrate,prove service interface, obtains the first verification information of user;
Processing is formatted to first verification information, obtains corresponding JSON string;
The JSON is gone here and there and carries out symmetric cryptography processing, obtains corresponding encryption string;
Encryption string is added in the transaction record information of the user, and the transaction record information is stored in block
On chain.
2. the method that data according to claim 1 deposit card, which is characterized in that first verification information includes:
Verify application time, verification result acquisition time, verification result bit string.
3. the method that data according to claim 2 deposit card, which is characterized in that the format of the JSON string are as follows:
TmpString=" QuestTime ": " the first lint-long integer ", " ResultTime ": " the second lint-long integer ", "
CheckResult ": " verification result bit string " };
Wherein, first lint-long integer is the verifying application time, when second lint-long integer is that the verification result obtains
Between.
4. the method that data according to claim 1 or 3 deposit card, which is characterized in that described to be carried out pair to JSON string
Claim encryption, obtain corresponding encryption string, comprising:
CTID=3DES (TmpString);
Wherein, the encryption string that CTID is, 3DES (TmpString) indicate to do des encryption three times to JSON string
Algorithm.
5. the method that data according to claim 1 deposit card, which is characterized in that the described method includes:
Hash operation is done to the transaction record information, obtains corresponding cryptographic Hash;
The cryptographic Hash is added to the transaction record information.
6. a kind of method for verifying trade user authenticity characterized by comprising
Encryption string is extracted from the transaction record information of user, symmetrical decryption is done to encryption string, obtains corresponding JSON string;
The net that the user is obtained from JSON string demonstrate,proves information;
Information is demonstrate,proved according to the net, calls net card information authentication service to verify the authenticity of the user.
7. the device that a kind of data deposit card characterized by comprising net card information memory cell and Hash value cell, the net
Card information memory cell and Hash value cell are set in the transaction record information unit of block chain,
The net demonstrate,proves information memory cell, and the net for storing user demonstrate,proves verification information;
The Hash value cell, for storing the first cryptographic Hash, wherein first cryptographic Hash is obtained according to the first strategy, institute
Stating the first strategy includes:
Hash operation is done to transaction record information and the encryption string generated based on the net card verification information.
8. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage instruction, the finger
The method for enabling data according to any one of claim 1 to 5 deposit card is executed.
9. a kind of terminal characterized by comprising
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed
Execute the operation that the data as described in any one of claims 1 to 5 deposit the method for card.
10. a kind of server characterized by comprising
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed
Execute the operation that the data as described in any one of claims 1 to 5 deposit the method for card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910124178.XA CN109919766A (en) | 2019-02-19 | 2019-02-19 | Data deposit card and verify the method and terminal, server of trade user authenticity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910124178.XA CN109919766A (en) | 2019-02-19 | 2019-02-19 | Data deposit card and verify the method and terminal, server of trade user authenticity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109919766A true CN109919766A (en) | 2019-06-21 |
Family
ID=66961703
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910124178.XA Pending CN109919766A (en) | 2019-02-19 | 2019-02-19 | Data deposit card and verify the method and terminal, server of trade user authenticity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109919766A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111901099A (en) * | 2020-06-16 | 2020-11-06 | 上海眼控科技股份有限公司 | Method, system and equipment for encrypting vehicle information |
CN113259133A (en) * | 2021-07-02 | 2021-08-13 | 深圳市深圳通有限公司 | Encryption communication method, equipment and storage medium based on HTTP protocol |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN106354994A (en) * | 2016-08-22 | 2017-01-25 | 布比(北京)网络技术有限公司 | Method and system for processing medical data |
CN107844978A (en) * | 2017-11-30 | 2018-03-27 | 中链科技有限公司 | A kind of staple commodities transaction processing method and system based on block chain |
CN108650252A (en) * | 2018-04-28 | 2018-10-12 | 分布共享(北京)信息技术有限公司 | The data-sharing systems and method of a kind of safety, fair protection privacy |
CN108805563A (en) * | 2018-03-21 | 2018-11-13 | 中思博安科技(北京)有限公司 | A kind of medical management of differential account method and device based on block chain |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN109101572A (en) * | 2018-07-17 | 2018-12-28 | 何晓行 | Card method, apparatus and server, storage medium are deposited based on block chain |
-
2019
- 2019-02-19 CN CN201910124178.XA patent/CN109919766A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN106354994A (en) * | 2016-08-22 | 2017-01-25 | 布比(北京)网络技术有限公司 | Method and system for processing medical data |
CN107844978A (en) * | 2017-11-30 | 2018-03-27 | 中链科技有限公司 | A kind of staple commodities transaction processing method and system based on block chain |
CN108805563A (en) * | 2018-03-21 | 2018-11-13 | 中思博安科技(北京)有限公司 | A kind of medical management of differential account method and device based on block chain |
CN108650252A (en) * | 2018-04-28 | 2018-10-12 | 分布共享(北京)信息技术有限公司 | The data-sharing systems and method of a kind of safety, fair protection privacy |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN109101572A (en) * | 2018-07-17 | 2018-12-28 | 何晓行 | Card method, apparatus and server, storage medium are deposited based on block chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111901099A (en) * | 2020-06-16 | 2020-11-06 | 上海眼控科技股份有限公司 | Method, system and equipment for encrypting vehicle information |
CN113259133A (en) * | 2021-07-02 | 2021-08-13 | 深圳市深圳通有限公司 | Encryption communication method, equipment and storage medium based on HTTP protocol |
CN113259133B (en) * | 2021-07-02 | 2021-10-15 | 深圳市深圳通有限公司 | Encryption communication method, equipment and storage medium based on HTTP protocol |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109359974B (en) | Block chain transaction method and device and electronic equipment | |
CN109359971B (en) | Block chain transaction method and device and electronic equipment | |
ES2881289T3 (en) | Method to manage a trusted identity | |
CN107465505B (en) | Key data processing method and device and server | |
EP3673609B1 (en) | Method and apparatus for obtaining input of secure multiparty computation protocol | |
JP2021529397A (en) | Systems and methods for blockchain address and owner verification | |
WO2021174927A1 (en) | Blockchain-based identity verification method and apparatus, device, and storage medium | |
CN112215608A (en) | Data processing method and device | |
Barsoum et al. | Integrity verification of multiple data copies over untrusted cloud servers | |
CN104967693B (en) | Towards the Documents Similarity computational methods based on full homomorphism cryptographic technique of cloud storage | |
LU100497B1 (en) | Method and system for securely enrolling cryptographic keys on physical media for cryptographic keys, and physical media product | |
CN113704775B (en) | Service processing method and related device based on distributed digital identity | |
Sarfaraz et al. | A tree structure-based improved blockchain framework for a secure online bidding system | |
CN107070896B (en) | Safe and efficient block chain network customized login method and safe reinforcement system | |
Rahmadika et al. | Toward Privacy‐Preserving Shared Storage in Untrusted Blockchain P2P Networks | |
CN112347516A (en) | Asset certification method and device based on block chain | |
JP2021064891A (en) | Consortium block chain system, computer, and transaction approval method | |
WO2021134897A1 (en) | Blockchain supply chain transaction hidden dynamic supervision system and method | |
CN109948370A (en) | A kind of method for processing business based on block chain, device and electronic equipment | |
CN109919766A (en) | Data deposit card and verify the method and terminal, server of trade user authenticity | |
US11956347B2 (en) | Method and apparatus with mobile payment and verification | |
Shahariar et al. | A Secure Land Record Management System using Blockchain Technology | |
CN115604023A (en) | Block chain private data protection method and system | |
CN109687967A (en) | Electric endorsement method and equipment | |
Rao et al. | Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190621 |
|
WD01 | Invention patent application deemed withdrawn after publication |