CN111275433A - Method for realizing personal wallet of block chain mobile equipment end - Google Patents

Method for realizing personal wallet of block chain mobile equipment end Download PDF

Info

Publication number
CN111275433A
CN111275433A CN201911424440.9A CN201911424440A CN111275433A CN 111275433 A CN111275433 A CN 111275433A CN 201911424440 A CN201911424440 A CN 201911424440A CN 111275433 A CN111275433 A CN 111275433A
Authority
CN
China
Prior art keywords
user
personal wallet
wallet
personal
user side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911424440.9A
Other languages
Chinese (zh)
Inventor
白玉龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Medicine Chain Group Co Ltd
Original Assignee
Shaanxi Medicine Chain Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Medicine Chain Group Co Ltd filed Critical Shaanxi Medicine Chain Group Co Ltd
Priority to CN201911424440.9A priority Critical patent/CN111275433A/en
Publication of CN111275433A publication Critical patent/CN111275433A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures

Abstract

The invention relates to a method for realizing a personal wallet of a block chain mobile equipment end, which is characterized in that the personal wallet is arranged at the mobile equipment end, when a user accesses the personal wallet through a user end, the mobile equipment end checks a network token of the user end, and the user end sends an identity authentication request to the personal wallet; if the user identity is legal, the personal wallet transmits the network token back to the user side; the method comprises the steps that a user side initiates a public key acquisition request to a personal wallet, and after the personal wallet receives the public key acquisition request, the user side initiates a transaction signature request to the personal wallet through a public key; after receiving the transaction signature request, the personal wallet returns a signature string corresponding to the transaction signature request to the user side; after the user side receives the signature string, the user data is linked to the corresponding block, and the personal wallet of the mobile equipment side is used, so that management of the background server on the personal wallet is reduced, maintenance of the server wallet is reduced, and labor cost is greatly saved.

Description

Method for realizing personal wallet of block chain mobile equipment end
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a method for realizing a personal computer at a block chain mobile equipment end.
Background
The blockchain wallet is a wallet designed for all users, is oriented to all public users, and has the functions of both individual users and groups or organizations, each user creates an independent wallet to meet the blockchain business requirements and security, but each user has an own wallet file as the number of users increases, so that the management of the wallets is more difficult. The wallet service may be one user-one service or one wallet service shared by a plurality of users, but if one user-one service results in resource waste, the use of one wallet service by a plurality of users causes resource competition, so that the wallet service is more and more difficult to divide as the number of users increases.
Disclosure of Invention
The invention has the advantages that each user stores the data of the personal wallet on the mobile equipment, the personal wallets in the block chain store the public and private key information of the users in a magnetic disk in a file writing mode, each user has a wallet file, and the number of the files of the personal wallets in the block chain is increased along with the increase of the traffic of the users, so that a background server is difficult to manage the wallets, and the management of the background server on the personal wallets is reduced by using the personal wallets at the mobile equipment end, thereby reducing the maintenance of the server wallets and greatly saving the labor cost.
In order to solve the problems in the background art, the invention is realized by the following technical scheme:
a blockchain mobile device-side personal wallet implementation method, comprising the steps of:
s1: when a user accesses a personal wallet arranged at a mobile equipment end through a user end, the mobile equipment end checks a network token at the user end to judge whether the network token is valid, and if the network token is invalid, network identity authentication is carried out on the user;
s2: the user side initiates an identity authentication request to the personal wallet;
s3: the personal wallet identifies the identity of the user, and if the identity of the user is legal, the personal wallet transmits the network token back to the user side;
s4: a user side initiates a public key acquisition request to a personal wallet;
s5: after receiving the public key acquisition request, the personal wallet firstly checks the network token, judges that the user identity is legal, and then returns a public key corresponding to the personal wallet to the user side;
s6: a user side initiates a transaction signature request to a personal wallet through a public key;
s7: after receiving the transaction signature request, the personal wallet checks the network token, and returns a signature string corresponding to the transaction signature request to the user side after judging that the identity is legal;
s8: after receiving the signature string, the user side transmits the acquired signature string to a transaction, then pushes transaction data to a production node, the production node sends a transaction confirmation request to the super node, and the super node links user data to a corresponding block after verifying and confirming the transaction data.
The invention is further provided with: the network identity authentication comprises the following steps:
s11: the personal wallet sends a user information input request to the user side;
s12: a user inputs corresponding user information and a corresponding telephone number through a user side;
s13: after acquiring the user information, the personal wallet binds the user information with the telephone number, and after the binding is successful, the personal wallet displays information for identity authentication through the telephone number to the user;
s14: the user confirms the identity authentication information, the personal wallet automatically generates a verification code, stores the verification code, and simultaneously sends a short message containing the verification code to the telephone number to be authenticated through the network server;
s15: after the user side receives the verification code, the user inputs the verification code into the personal wallet, the mobile equipment side matches the verification code input by the user with the stored verification code, and if the verification code is consistent with the stored verification code, the identity of the user is judged to be legal.
The invention is further provided with: the verification code is randomly generated.
The invention is further provided with: the user information comprises a user name, a user identity card number and a user real name.
The invention is further provided with: and (S13) after the personal wallet receives the user information, calling the telephone number registration information in the database through the network server, matching the user identity card number, the user real name and the telephone number registration information, and if the matching is consistent, successfully binding.
The invention is further provided with: the user side accesses the personal wallet through https protocol.
The invention is further provided with: and the http message is encrypted between the user side and the personal wallet through an https protocol.
Compared with the prior art, the invention has the following beneficial technical effects:
1. the technical scheme introduces the concept of the personal wallet on the block chain, each wallet is arranged on the mobile equipment terminal owned by the user, and the user only needs to manage wallet data on the mobile equipment, so that the independence of personal user wallet data is ensured.
2. The functions of user identity authentication and storage and caching are added in the wallet, the user accesses the wallet by using the https protocol, and the http message is encrypted by using the https protocol, so that a hacker is prevented from directly obtaining a password of the user after intercepting the message, and the security of wallet access data in a network transmission process is ensured.
3. Each user saves the data of the personal wallet on the mobile device, the personal wallets in the blockchain store the public and private key information of the users in a magnetic disk in a file writing mode, each user has a wallet file, and with the increase of the traffic, the number of the files of the personal wallets in the blockchain can increase, so that the wallets are not easily managed by a background server, and the management of the background server on the personal wallets is reduced by using the personal wallets at the mobile device end, so that the maintenance of the server wallets is reduced, and the labor cost is greatly saved.
4. The personal wallet is arranged at the mobile equipment end, each user only needs to manage personal wallet data of the user, and the personal wallet data of the user are stored at the mobile equipment end of the user, so that the safety of the personal wallet can be greatly improved, and meanwhile, the whole efficiency of the block chain can also be improved.
Drawings
FIG. 1 is a block flow diagram of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a detailed description of the present invention will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings or the orientations or positional relationships that the products of the present invention are conventionally placed in use, and are only used for convenience in describing the present invention and simplifying the description, but do not indicate or imply that the devices or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Furthermore, the terms "horizontal", "vertical" and the like do not imply that the components are required to be absolutely horizontal or pendant, but rather may be slightly inclined. For example, "horizontal" merely means that the direction is more horizontal than "vertical" and does not mean that the structure must be perfectly horizontal, but may be slightly inclined.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
As shown in fig. 1, a method for implementing a blockchain mobile device-side personal wallet includes the following steps:
s1: when a user accesses a personal wallet arranged at a mobile equipment end through a user end, the mobile equipment end checks a network token at the user end to judge whether the network token is valid, and if the network token is invalid, network identity authentication is carried out on the user;
s2: the user side initiates an identity authentication request to the personal wallet;
s3: the personal wallet identifies the identity of the user, if the identity of the user is legal, the personal wallet transmits the network token back to the user side, the user side establishes a session with the personal wallet through the network token, meanwhile, the user wallet caches session data for calling and using when the user accesses the personal wallet next time, and after the session is invalid, identity authentication needs to be carried out again;
s4: a user side initiates a public key acquisition request to a personal wallet;
s5: after receiving the public key acquisition request, the personal wallet firstly checks the network token, judges that the user identity is legal, and then returns a public key corresponding to the personal wallet to the user side;
s6: a user side initiates a transaction signature request to a personal wallet through a public key;
s7: after receiving the transaction signature request, the personal wallet checks the network token, and returns a signature string corresponding to the transaction signature request to the user side after judging that the identity is legal;
s8: after receiving the signature string, the user side transmits the acquired signature string to a transaction, then pushes transaction data to a production node, the production node sends a transaction confirmation request to the super node, and the super node links user data to a corresponding block after verifying and confirming the transaction data.
The network identity authentication in the S1 comprises the following steps:
s11: the personal wallet sends a user information input request to the user side;
s12: a user inputs corresponding user information and a telephone number through a user side, wherein the user information comprises a user name, a user identity card number and a user real name;
s13: after the personal wallet acquires the user information, the user information and the telephone number are bound, the binding process comprises the steps of calling telephone number registration information in a database through a network server, matching the user identity card number and the real name of the user with the telephone number registration information, if the matching is consistent, successfully binding, then displaying information for carrying out identity authentication through the telephone number to the user, and if the matching is not consistent, requiring the user to input correct user information again;
s14: the user confirms the identity authentication information, the personal wallet automatically and randomly generates a verification code with 6 digits, the verification code is stored, and meanwhile, a short message containing the verification code is sent to the telephone number to be authenticated through the network server;
s15: after the user side receives the verification code, the user inputs the verification code into the personal wallet, the mobile equipment side matches the verification code input by the user with the stored verification code, and if the verification code is consistent with the stored verification code, the identity of the user is judged to be legal.
In the above steps, the user side accesses the personal wallet through the https protocol, and the http message is encrypted between the user side and the personal wallet through the https protocol.
The embodiments given above are preferable examples for implementing the present invention, and the present invention is not limited to the above-described embodiments. Any non-essential addition and replacement made by the technical characteristics of the technical scheme of the invention by a person skilled in the art belong to the protection scope of the invention.

Claims (7)

1. A method for realizing a block chain mobile device end personal wallet is characterized by comprising the following steps:
s1: the method comprises the steps that a personal wallet is deployed at the end of a mobile device, when a user accesses the personal wallet through a user side, the mobile device side checks a network token of the user side to judge whether the network token is valid, and if the network token is invalid, network identity authentication is conducted on the user;
s2: the user side initiates an identity authentication request to the personal wallet;
s3: the personal wallet identifies the identity of the user, and if the identity of the user is legal, the personal wallet transmits the network token back to the user side;
s4: a user side initiates a public key acquisition request to a personal wallet;
s5: after receiving the public key acquisition request, the personal wallet firstly checks the network token, judges that the user identity is legal, and then returns a public key corresponding to the personal wallet to the user side;
s6: a user side initiates a transaction signature request to a personal wallet through a public key;
s7: after receiving the transaction signature request, the personal wallet checks the network token, and returns a signature string corresponding to the transaction signature request to the user side after judging that the identity is legal;
s8: after receiving the signature string, the user side transmits the acquired signature string to a transaction, then pushes transaction data to a production node, the production node sends a transaction confirmation request to the super node, and the super node links user data to a corresponding block after verifying and confirming the transaction data.
2. The method of claim 1, wherein the method comprises: the network identity authentication comprises the following steps:
s11: the personal wallet sends a user information input request to the user side;
s12: a user inputs corresponding user information and a corresponding telephone number through a user side;
s13: after acquiring the user information, the personal wallet binds the user information with the telephone number, and after the binding is successful, the personal wallet displays information for identity authentication through the telephone number to the user;
s14: the user confirms the identity authentication information, the personal wallet automatically generates a verification code, stores the verification code, and simultaneously sends a short message containing the verification code to the telephone number to be authenticated through the network server;
s15: after the user side receives the verification code, the user inputs the verification code into the personal wallet, the mobile equipment side matches the verification code input by the user with the stored verification code, and if the verification code is consistent with the stored verification code, the identity of the user is judged to be legal.
3. The method of claim 2, wherein said authentication code is randomly generated.
4. The method as claimed in claim 3, wherein the user information includes a user name, a user identification number and a user real name.
5. The method as claimed in claim 4, wherein the personal wallet of the blockchain mobile device side receives the user information in S13, the personal wallet calls the phone number registration information in the database through the network server, matches the user identification number, the user real name and the phone number registration information, and if the matching is consistent, the binding is successful.
6. The method of claim 1, wherein the client accesses the personal wallet via https protocol.
7. The method as claimed in claim 6, wherein the http message is encrypted between the user side and the personal wallet via https protocol.
CN201911424440.9A 2019-12-31 2019-12-31 Method for realizing personal wallet of block chain mobile equipment end Pending CN111275433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911424440.9A CN111275433A (en) 2019-12-31 2019-12-31 Method for realizing personal wallet of block chain mobile equipment end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911424440.9A CN111275433A (en) 2019-12-31 2019-12-31 Method for realizing personal wallet of block chain mobile equipment end

Publications (1)

Publication Number Publication Date
CN111275433A true CN111275433A (en) 2020-06-12

Family

ID=71000081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911424440.9A Pending CN111275433A (en) 2019-12-31 2019-12-31 Method for realizing personal wallet of block chain mobile equipment end

Country Status (1)

Country Link
CN (1) CN111275433A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064695A (en) * 2007-05-16 2007-10-31 杭州看吧科技有限公司 P2P(Peer to Peer) safe connection method
CN103259667A (en) * 2013-06-07 2013-08-21 北京邮电大学 Method and system for eID authentication on mobile terminal
CN107888382A (en) * 2017-11-24 2018-04-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity checking based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064695A (en) * 2007-05-16 2007-10-31 杭州看吧科技有限公司 P2P(Peer to Peer) safe connection method
CN103259667A (en) * 2013-06-07 2013-08-21 北京邮电大学 Method and system for eID authentication on mobile terminal
CN107888382A (en) * 2017-11-24 2018-04-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity checking based on block chain

Similar Documents

Publication Publication Date Title
CN102790674B (en) Auth method, equipment and system
CN1879071B (en) Method and system for the authentication of a user of a data processing system
EP3438902A1 (en) System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same
US7793102B2 (en) Method for authentication between a portable telecommunication object and a public access terminal
US7231371B1 (en) Method and system for ordering and delivering digital certificates
EP1615097B1 (en) Dual-path-pre-approval authentication method
CN105246073B (en) The access authentication method and server of wireless network
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
RU2007120466A (en) ELECTRONIC SYSTEM FOR THE PROVISION OF BANK SERVICES
CN1347541A (en) Telepayment method and system for implementing said method
CN106936792A (en) Safety certifying method and system and the mobile terminal for safety certification
CN104735027B (en) A kind of safety certifying method and authentication server
CN101512576A (en) Method and computer system for ensuring authenticity of an electronic transaction
CN109063438A (en) A kind of data access method, device, local data secure access equipment and terminal
CN109379388B (en) Identity recognition method, terminal and wearable device
JP2013097650A (en) Authentication system, authentication method and authentication server
CN113411184B (en) Integrated management terminal device and integrated management method
CN112347188A (en) Authorization and access auditing system and method based on private chain
JP2008097263A (en) Authentication system, authentication method and service providing server
CN111914231A (en) Block chain-based identity authentication method, system, equipment and storage medium
CN111222858A (en) Method for realizing block chain fingerprint identification authentication of personal wallet
US7187920B2 (en) Connection service providing system and connection service providing method
RU2354066C2 (en) Method and system for authentication of data processing system user
CN102083066A (en) Unified safety authentication method and system
CN111275433A (en) Method for realizing personal wallet of block chain mobile equipment end

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination