CN111461721A - Block chain-based method and device for protecting account and verifying transaction - Google Patents

Block chain-based method and device for protecting account and verifying transaction Download PDF

Info

Publication number
CN111461721A
CN111461721A CN202010301651.XA CN202010301651A CN111461721A CN 111461721 A CN111461721 A CN 111461721A CN 202010301651 A CN202010301651 A CN 202010301651A CN 111461721 A CN111461721 A CN 111461721A
Authority
CN
China
Prior art keywords
account
transaction
blockchain
signature
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010301651.XA
Other languages
Chinese (zh)
Inventor
晏敏敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Liangzuo Technology Co Ltd
Original Assignee
Beijing Liangzuo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Liangzuo Technology Co Ltd filed Critical Beijing Liangzuo Technology Co Ltd
Priority to CN202010301651.XA priority Critical patent/CN111461721A/en
Publication of CN111461721A publication Critical patent/CN111461721A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses a method and a device for protecting an account and verifying a transaction based on a block chain. The method of the invention comprises the following steps: the safety account is established according to the information input by the user and can sign all transactions; the device account is created according to key device information of the user computing device and can sign common transactions; firstly, binding a security account to a blockchain account, and then adding a bound device account by using the blockchain account and the security account; a special transaction must have a signature of the secure account; a common transaction must have a signature of the secure account or any of the device accounts; initiating a transaction to replace a blockchain account with the blockchain account and the secure account, migrating the old blockchain account to the new blockchain account. Therefore, user input is bound for the blockchain account, trusted equipment is set, loss caused by theft is reduced, replacement of the blockchain account is supported, and safety of the blockchain account is protected.

Description

Block chain-based method and device for protecting account and verifying transaction
Technical Field
The present application relates to the field of blockchain, and in particular, to a method and an apparatus for protecting an account and verifying a transaction based on a blockchain.
Background
The block chain network, also called distributed ledger network, is characterized by decentralization, openness and transparency and traceable data history. In the field of blockchain technology, accounts and transactions are essential elements. An account corresponds to a set of keys generated by using an asymmetric encryption algorithm, and an account address is obtained by deforming a public key part of the keys and is used as an account mark. The account holder signs the transaction using the private key portion of the key, and each transaction must contain the signature of the account that created the transaction, so the transaction initiated by the account address is actually the transaction initiated by the holder of the key. However, after the private key is stolen, the user cannot migrate the assets and data on the account to a new account, and other beneficial measures are not provided to prevent the operation of the private key, which often results in data being tampered, assets being stolen, and the user being counterfeited. Therefore, an invention is needed to verify whether the operation of the private key is truly authorized by the user, verify whether the device operated by the private key is trusted and authorized by the user, ensure that the private key can be prevented from further loss after being stolen, replace the blockchain account, and simultaneously support that the device can be cancelled after being lost or abandoned.
Disclosure of Invention
The embodiment of the application provides an account protecting and transaction verifying method and device based on a block chain, which are used for solving the safety problem of the block chain account, supporting verification of real authorization and management trust equipment, and cancelling the equipment and replacing the block chain account after a private key operation equipment is lost.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
the method for protecting the account based on the block chain provided by the embodiment of the application comprises the following steps:
creating the blockchain account, binding the secure account to the blockchain account, and adding the binding of the device account using the blockchain account and the secure account.
The safety account is created according to information input by a user and can sign all transactions of the block chain account; the special transaction comprises the replacement operation of the blockchain account, the binding and replacement operation of the safety account and the adding, deleting and modifying operation of the equipment account.
In one embodiment, the user enters information; processing the information by using the blockchain account to obtain deformed information, wherein the processing comprises HMAC calculation of the information by using a private key of the blockchain account; generating the secure account by using the deformation information, wherein the secure account comprises a secret key and a secure account address, and initiating a transaction bound with the secure account by using the blockchain account; and after the transaction is linked, binding the safety account to the block chain account on the block chain.
It should be noted that, the private key of the blockchain account is used to perform HMAC calculation on the information, so that even if the information is very simple, other people can hardly obtain the deformed information by cracking under the condition that the private key is kept secret. Therefore, the user can obtain the real secure private key through simple input and use the private key as the private key of the secure account.
Furthermore, the information input mode of the user can be a keyboard input mode, a two-dimensional code scanning mode, a bar code scanning mode, a gesture input mode and the like, and the flexible input mode can help the user to use the safety account better.
Preferably, each time the private key of the secure account needs to be used, the private key of the secure account is required to be generated through input of a user, and the private key of the secure account is not spread and not stored, so that the problems of disclosure and theft of the private key file of the secure account cannot occur.
In one embodiment, device information is collected for a user computing device; extracting the equipment information to obtain key equipment information; processing the key equipment information by using the block chain account to obtain deformed key equipment information, wherein the processing comprises performing HMAC calculation on the key equipment information by using a private key of the block chain account; creating the device account using the transformed key device information, the device account including a key, a backup account address; creating a transaction to which the device account is bound, the transaction including a signature of the blockchain account, a signature of the secure account, the device account; initiating the transaction; and after the transaction is linked, adding and binding the equipment account to the block chain account on the block chain.
It should be noted that, the private key of the blockchain account is used to perform HMAC calculation on the key device information, so that different private keys obtain different device accounts on the same user computing device. The device account is determined by the key device information of the user computing device and the blockchain account, so that the user can be supported to independently use a plurality of blockchain accounts on one user computing device, and the private key of the device account can be prevented from being cracked by cracking the algorithm for extracting the key device information.
Preferably, the device account can be dynamically generated, and the private key of the device account is not stored and not spread, so that the problems of leakage and theft of the private key file of the device account cannot occur.
In one embodiment, a transaction is initiated to replace the equipment account, the transaction including a signature of the blockchain account, a signature of the secure account, an old equipment account, a new equipment account, the old equipment account of the blockchain account being replaced with the new equipment account on a blockchain after the transaction is linked.
In one embodiment, initiating a transaction to delete the equipment account, the transaction including the signature of the blockchain account, the signature of the secure account, the equipment account to be processed, and deleting the equipment account to be processed from the blockchain account on a blockchain after the transaction is linked;
in one embodiment, a transaction is initiated to replace the secure account, the transaction including a signature of the blockchain account, a signature of an old secure account, a new secure account, the blockchain account being replaced with the new secure account on the blockchain after the transaction is linked.
Another method for protecting an account based on a blockchain is further provided in an embodiment of the present application, where the blockchain account has bound to the secure account, where the secure account is created according to information input by a user and can sign all transactions of the blockchain account, and the method includes:
preparing a new blockchain account; preparing a new secure account; creating a transaction to replace the blockchain account, the transaction including a signature of the new blockchain account, a signature of the new secure account, a signature of the old blockchain account, a signature of the old secure account; initiating the transaction; the transaction cochain is used for creating the new blockchain account on a blockchain, transferring the data of the old blockchain account to the new blockchain account, binding the new security account for the new blockchain account, and processing the old blockchain account.
Another method for verifying a transaction based on a blockchain provided in an embodiment of the present application includes:
the safety account is established according to information input by a user and can sign all transactions of the block chain account;
the device account, created according to key device information of the user computing device, can sign a common transaction of the blockchain account;
the special transaction comprises the replacement operation of the blockchain account, the binding and replacement operation of the security account and the adding, deleting and modifying operation of the equipment account;
identifying a type of the transaction; verifying a signature of the transaction.
And verifying the signature differently according to whether the created account of the transaction is bound with the secure account and the transaction type of the transaction.
When the creating account of the transaction is not bound with the safety account, the transaction is rejected in a blockchain when the transaction belongs to the special transaction but not to the special transaction bound with the safety account, otherwise, the transaction requirement contains the signature of the blockchain account.
When the created account of the transaction is only bound with the secure account, the signature of the secure account is required to be available when the transaction is verified.
After the created account of the transaction binds the secure account and the device account, the signature of the secure account is required when the transaction belongs to the special transaction; the signature of the secure account or any of the device accounts is necessary when the transaction belongs to a normal transaction.
An account protection device based on a block chain provided by an embodiment of the application includes:
the block chain account module is used for creating and managing the block chain accounts and signing by using the block chain accounts;
the security account module is used for creating and managing the security account and signing by using the security account;
the device account module is used for creating and managing the device account and signing by using the device account;
the request module is used for creating the special transaction and initiating the special transaction, wherein the special transaction comprises the replacement operation of the blockchain account, the binding and replacement operation of the security account and the adding, deleting and modifying operation of the equipment account;
the checking module is used for checking whether the special transaction is valid;
the storage module is used for storing the bound security accounts and the device accounts with the added bindings in the data state of the blockchain account on the blockchain, and also used for replacing the security accounts of the blockchain account and replacing and deleting the device accounts of the blockchain account on the blockchain;
and the transaction type module is used for appointing the specific type of the special transaction and identifying the specific type of the transaction.
Another device for protecting an account based on a block chain provided in an embodiment of the present application includes:
the block chain account module is used for creating and managing the block chain accounts and signing by using the block chain accounts;
the security account module is used for creating and managing the security account and signing by using the security account;
a request module for generating a transaction to replace the blockchain account and initiating the transaction;
the verification module is used for verifying whether the transaction for replacing the blockchain account is valid;
a storage module, configured to create a new blockchain account on a blockchain according to the transaction for replacing the blockchain account, migrate data of an old blockchain account to the new blockchain account, bind a new security account for the new blockchain account, and process the old blockchain account;
a transaction type module to identify whether the transaction belongs to a transaction that replaces the blockchain account.
Another device for verifying a transaction based on a blockchain provided in an embodiment of the present application includes:
the first execution module is used for identifying the transaction type of the transaction and preparing a signature to be verified;
the first detection module is used for detecting whether the transaction account is bound with a security account or a device account;
the second detection module is used for detecting whether the transaction is a special transaction;
the third detection module detects whether the transaction contains the signature of the block chain account;
the fourth detection module is used for detecting whether the transaction contains a signature of a safety account or any equipment account bound to the block chain account;
the fifth detection module is used for detecting whether the transaction contains the signature of the safety account bound by the block chain account;
the sixth detection module is used for detecting whether the transaction belongs to a transaction bound with a secure account;
and the second execution module passes the signature verification and continues other operations.
According to the technical scheme provided by the embodiment of the application, on one hand, a user binds a security account for a blockchain account and adds a binding trust device, the transaction of the blockchain account is required to have a signature of the bound security account or any device account when the blockchain verifies the transaction, the private keys of the security account and the device account are not transmitted and stored, so that the trusted user computing device can be conveniently operated, the other user computing devices confirm real authorization through user input information, the transaction on the blockchain is truly authorized by the user, and the transaction created after the private key of the blockchain account is stolen can be rejected by the blockchain; on the other hand, the user can log off the corresponding device account after losing the device, and when the private key is lost, the private key is stolen, and the user suspects that the private key is safe, the user can use the blockchain account and the security account to initiate a transaction of replacing the blockchain account, so that the user can transfer the data of the old blockchain account to a new blockchain account.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the prior art of the present application, the following embodiments or the prior art will be described
While the drawings that are needed to be utilized in the description of the technology are briefly described, it should be apparent that only the illustrated drawings in the following description are of a type that is presently preferred
Some of the embodiments described in the application will be apparent to those skilled in the art without inventive faculty
Other figures may also be derived from these figures.
Fig. 1 is a schematic flowchart of a method for protecting an account based on a blockchain according to an embodiment of the present disclosure;
FIG. 2 is a flow diagram of binding a secure account as provided by an embodiment of the present application;
FIG. 3 is a schematic diagram of adding a bound device account provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of an account of a replacement device provided by an embodiment of the present application;
FIG. 5 is a schematic diagram of deleting a device account provided by an embodiment of the present application;
FIG. 6 is a schematic diagram of a replacement secure account provided by an embodiment of the present application;
fig. 7 is a flowchart illustrating a method for protecting an account based on a blockchain according to an embodiment of the present application;
fig. 8 is a flowchart of a method for validating a transaction based on a blockchain according to an embodiment of the present application;
fig. 9 is a schematic diagram of an apparatus for protecting an account based on a blockchain according to an embodiment of the present application;
fig. 10 is a schematic diagram of an apparatus for protecting an account based on a blockchain according to an embodiment of the present application;
fig. 11 is a schematic diagram of an apparatus for validating a transaction based on a blockchain according to an embodiment of the present disclosure.
Detailed Description
The embodiment of the application provides an account protecting and transaction verifying method and device based on a block chain.
In order to make the technical solution in the present application better understood by those skilled in the art, the present application will be combined with the following embodiments
The technical solutions in the embodiments of the present application are clearly and completely described in the drawings of the embodiments, and obviously, the described implementations
The examples are only a few examples of the present application and not all examples. Based on the embodiments in this application, it is common in the art
All other embodiments, which can be obtained by a person skilled in the art without making any inventive step, shall be covered by the present application
The range of (1).
As mentioned above, after the private key is stolen, the user cannot migrate the assets and data on the account to a new account, and there is no other beneficial measure to prevent the operation of the private key, which often results in data being tampered, assets being stolen, and the user being counterfeited. Therefore, the technical scheme of the application solves the safety problem of the block chain account, supports the verification of the real authorization and the management of the trust equipment, and can log off the equipment and replace the block chain account after the private key operation equipment is lost.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for protecting an account based on a blockchain according to an embodiment of the present application, including the following steps:
s101, a block chain account is created.
A private key is created and an account is generated as a blockchain account that a user uses to initiate a transaction. And establishing an account system on the blockchain by taking the blockchain account as a unit, wherein the account system stores common information such as assets, states and the like and also stores bound security accounts and equipment accounts. When the first transaction of the blockchain account is linked, the blockchain account on the blockchain is not bound with the security account and the equipment account. When the block chain account is not bound with the security account and the equipment account, the block chain account only needs a signature of the block chain account when initiating a transaction; otherwise the signature of the secure account or any device account is also required.
And S102, binding the safe account to the block chain account.
A user creates a security account by inputting information; then, initiating a transaction of binding the secure account by using the blockchain account, wherein the transaction only comprises the signature of the blockchain account; and the blockchain node receives the transaction, updates the configuration of the blockchain account on the blockchain when the transaction is linked, and binds a safety account for the blockchain account.
Secure accounts are used primarily to sign special transactions. The special transaction includes a change operation of the blockchain account, a binding and change operation of the secure account, and an adding and deleting operation of the device account.
The secure user may also be used for signatures for other transactions.
And S103, adding a bound device account by using the block chain account and the security account.
The user may only add the bound device account after the blockchain account has bound the secure account.
Dynamically creating an equipment account according to equipment information of a user computing device; initiating a transaction of adding a binding device account by the blockchain account, wherein the transaction comprises a signature of the blockchain account and a signature of the security account; and the blockchain node receives the transaction, modifies the configuration of the blockchain account on the blockchain during the transaction uplink and adds a binding equipment account for the blockchain account.
The device account is associated with the user equipment, and when the configuration information of one user equipment is not changed, the device account generated by the system for the same blockchain account is not changed. The device account is calculated according to the device information of the user computing device, so that no operation is required by the user, and therefore the block chain account and the device account signature can be directly used on the device for general transactions.
Thus, when a blockchain account is bound to a secure account or a device account, the blockchain requires that the blockchain account transaction contain not only the signature of the blockchain account but also the signature of the secure account or any device account. Even if the private key of a blockchain account is stolen, the blockchain can prevent the account from initiating the transaction chain with unqualified signature.
Fig. 2 is a flowchart of binding a secure account provided in an embodiment of the present application.
S201, a user inputs information.
The user inputs information, the complexity of the information is not required, and the user can input any information.
The information input mode of the user can be a keyboard input mode, a two-dimensional code scanning mode, a bar code scanning mode, a gesture input mode and the like, and the flexible input mode can help the user to use the safe account better. The bar code scanning and the gesture input have less input information, the two-dimensional code scanning operation is simple, rich information can be input, and the keyboard input and the gesture input are suitable for inputting short messages.
And S202, performing deformation processing on the information by using the block chain account to obtain deformation information.
Using a private key of the block chain account as a key of the HAMC function and carrying out HMAC calculation on the information, and if the length of a result obtained by the HMAC calculation meets the requirement of creating the private key, using the result as deformation information; otherwise, the result of the HMAC calculation, the information and the hash result of the information are spliced together to be used as the deformed information, if the length of the deformed information is not enough, the hash value of the deformed information is continuously inserted into the tail part of the deformed information until the length of the deformed information meets the requirement of creating the private key, and the deformed information obtained in the way is used as the seed of creating the private key.
Preferably, a HMAC function with a large number of bits is recommended, so that the obtained transformation information can be directly used as a seed for creating the private key.
Therefore, the same information is used by the same blockchain account to obtain the same deformation information, different blockchain accounts can also obtain different deformation information by using the same information, and therefore security accounts created by inputting the same information when different blockchain accounts are used are different.
And S203, generating a security account by using the deformation information.
And using the deformation information as a seed to create a private key, creating an account address for the private key, wherein the private key is used as a private key of the secure account, and the account address is used as an address of the secure account.
And S204, initiating a transaction of binding the secure account by using the blockchain account.
Creating a transaction bound to the secure account using the blockchain account, the transaction including an address of the blockchain account, an address of the secure account, a signature of the blockchain account. Preferably, the signature of the secure account is included in the transaction, so that whether the user mistacks the secure account address can be confirmed through the signature of the secure account while ensuring that the user has a private key corresponding to the secure account address.
Submitting the transaction to the blockchain node, and waiting for the blockchain to chain up the transaction.
S205, transaction cochain, binding the secure account.
The block chain export node verifies the transaction, and at the moment, the block chain account does not bind the security account and the equipment account on the block chain, so the export node only requires that the transaction has the signature of the block chain account. If the transaction is valid, the account system of the blockchain account binds the safe account in the transaction when the transaction is linked. At this time, the blockchain account successfully binds to a secure account, the blockchain account can add an equipment account, and the blockchain account must have a signature of the secure account when initiating a transaction.
Fig. 3 is a schematic diagram of a bound device account provided in an embodiment of the present application.
S301, collecting user equipment information.
The method comprises the steps of collecting equipment information of a user computing device, wherein the types of parameters collected by different types of equipment are different, and the parameters collected by the same equipment are the same.
S302, extracting the equipment information to obtain key equipment information.
And extracting the equipment information, and removing indiscriminate and unstable information to obtain key equipment information.
And S303, processing the key equipment information by using the block chain account to create an equipment account.
Using a private key of the block chain account as a key of the HAMC function and carrying out HMAC calculation on key equipment information, and if the length of a result obtained by the HMAC calculation meets the requirement of creating the private key, using the result as deformed key equipment information; otherwise, the result of the HMAC calculation, the key equipment information and the hash result of the key equipment information are spliced together to be used as the deformed key equipment information, if the length of the deformed key equipment information is not enough, the hash value of the deformed key equipment information is continuously inserted into the tail part of the deformed key equipment information until the length of the deformed key equipment information meets the requirement of creating the private key, and the deformed key equipment information obtained in the way is used as the seed of creating the private key.
Thus, the same blockchain account obtains the same deformed key device information on the same device, and different blockchain accounts obtain different deformed key device information on the same device, so that device accounts created by one user when using a plurality of blockchain accounts on the same device are different.
And using the deformed key device information as a seed and creating a private key, and simultaneously creating an account address for the private key, wherein the private key is used as the private key of the device account, and the account address is used as the address of the device account.
S304, creating a transaction for adding the bound device account, wherein the transaction comprises a block chain account signature and a safety account signature, and initiating the transaction.
And creating a transaction for adding the bound device account by using the blockchain account, wherein the transaction comprises the address of the blockchain account, the address of the security account, the address of the device account, the signature of the blockchain account and the signature of the security account. Preferably, the signature of the device account is included in the transaction, so that it can be confirmed whether the device account address is correct by the signature of the device account.
Submitting the transaction to the blockchain node, and waiting for the blockchain to chain up the transaction.
S305, transacting uplink and binding the equipment account.
And the block chain exit node verifies the transaction, at the moment, the secure account is bound on the block chain account chain, and the block exit node requires the transaction to have the signature of the block chain account and the signature of the secure account bound by the block chain account. If the transaction is valid, the account system of the blockchain account adds the device account address in the transaction to the device account list of the blockchain account when the transaction is uplink. At this time, the blockchain account successfully adds the device account, and the signature of the device account can be used when the blockchain account initiates a normal transaction.
Fig. 4 is a schematic diagram of replacing an account of a device according to an embodiment of the present application.
S311, the key device information of the user computing apparatus changes.
The user may update the operating system and replace the hardware during the use process, which may cause the change of the key device information of the user computing device, if the key device information changes, the private key of the old device account cannot be created, the old device account cannot be used normally, and at this time, a new device account needs to be created to replace the old device account.
S312, a new device account is created.
Wherein a new device account is created using the blockchain account.
The embodiment of the application and the schematic diagram of the account of the add-binding device shown in fig. 3 are embodiments based on the same inventive concept, and for the explanation of the related concept, reference may be made to the explanation of the schematic diagram of the account of the add-binding device shown in fig. 3.
S313, a transaction to replace the device account is created, including the new and old device accounts.
The transaction comprises a signature of a block chain account, a signature of a security account, a new device account and an old device account.
And S314, initiating the transaction.
Wherein the transaction is submitted to a node of the blockchain.
S315, trading and linking, and replacing the equipment account.
And after the transaction is linked up, replacing the old equipment account under the created account of the transaction with a new equipment account.
Fig. 5 is a schematic diagram of deleting a device account according to an embodiment of the present application.
S321, create a transaction to delete the device account, including the device account to be deleted.
The transaction also comprises a signature of the blockchain account and a signature of the security account.
And S322, initiating a transaction.
Wherein the transaction is submitted to a node of the blockchain.
And S323, trading the uplink and deleting the equipment account.
And after the transaction is linked, deleting the equipment account contained in the transaction from the created account of the transaction on the blockchain.
Fig. 6 is a schematic diagram of replacing a secure account according to an embodiment of the present application.
S331, a new secure account is created.
The input information of the user should be different from the input information corresponding to the old security account, otherwise, the security account generated last is not changed. The block chain account is used for creating a new secure account, the embodiment of the present application and the schematic diagram of the bound secure account shown in fig. 2 are embodiments based on the same inventive concept, and for the explanation of the related concept, reference may be made to the explanation of the schematic diagram of the bound secure account shown in fig. 2.
S332, a transaction for replacing the secure account is created.
The transaction comprises a signature of the blockchain account, a signature of the security account and a new security account.
And S333, initiating a transaction.
Wherein the transaction is submitted to a node of the blockchain.
And S334, trading the chain and replacing the security account.
And after the transaction is linked, replacing the secure account under the created account of the transaction with a new secure account in the transaction on the blockchain.
Fig. 7 is a flowchart illustrating a method for protecting an account based on a blockchain according to an embodiment of the present disclosure.
S401, prepare a new blockchain account.
Creating a new private key and generating an account as a blockchain account, or generating a blockchain account by importing a private key that has already been generated but the corresponding account has not yet been linked.
S402, preparing a new security account.
The user creates a secure account with the new blockchain account by entering information.
The embodiment of the present application and the schematic diagram of the bound secure account shown in fig. 2 are embodiments based on the same inventive concept, and for explanation of related concepts, reference may be made to the explanation of the schematic diagram of the bound secure account shown in fig. 2.
S403, creating a transaction for replacing the blockchain account.
A transaction is created from the old blockchain account that changes accounts, the transaction including a signature of the old blockchain account, a signature of the old secure account, an address of the new blockchain account, and an address of the new secure account. Preferably, the transaction includes a new blockchain account signature, a new secure account signature.
S404, initiating a transaction for replacing the blockchain account.
The transaction is submitted to the blockchain node, and uplink is requested.
S405, performing transaction uplink, creating a new block chain account, binding a new security account, and processing an old account.
The blockchain node verifies the transaction, confirms whether the signature of the old blockchain account is accurate, confirms whether the signature of the old safety account is accurate, confirms whether the address of the new blockchain account and the address of the safety account are accurate, preferably, verifies whether the signature of the new blockchain account and the signature of the new safety account are accurate, and if the requirements are met, the transaction can be linked. The job of the transaction uplink includes: creating a new blockchain account, binding a new secure account address in the transaction to the new blockchain account, filtering invalid information from state data of an old blockchain account, and transferring the invalid information to the new blockchain account, wherein the invalid information comprises a secure account and an equipment account list of the old blockchain account; the old blockchain account is marked as migrated to the new blockchain account, and optionally, the old blockchain account may be deleted.
The private key is dynamically generated by the security account through the input information, the private key of the security account is not stored, and the private key of the security account is not spread, so that the private key corresponding to the security account is not lost and is not stolen. Therefore, when the user encounters or subjectively thinks that the blockchain account is lost or stolen, the blockchain account can replace the old blockchain account with the new blockchain account by using the mode, and simultaneously replace the old security account with the matched new security account.
Fig. 8 is a flowchart of a method for validating a transaction based on a blockchain according to an embodiment of the present application.
Step 501, identifying the transaction type, and preparing to verify the signature of the transaction.
The transaction types are divided into special transactions and common transactions, and more specifically, the special transactions include replacement operations of the blockchain account, binding and replacement operations of the secure account, and addition, deletion and modification operations of the device account. The number of signatures of the signature part of the transaction is undetermined and needs to be judged according to the transaction type and whether the transaction creation account is bound with a security account.
Step 502, determine if the transaction creator has a secure account or device account bound.
The block chain is required to inquire whether a transaction creator is bound with one or more secure accounts or multiple device accounts.
Step 503, determine whether the transaction is a special transaction.
Where a special transaction requires a signature of a secure account. Preferably, the special transaction may also include a signature for the blockchain account, where the signature portion of the transaction has 2 signatures.
At step 504, it is determined whether the transaction contains a signature for a secure account.
Preferably, if the signature part of the transaction contains 2 signatures, it is further determined that another signature belongs to the signatures of the blockchain accounts, and if not, the transaction is rejected, and the process ends.
Step 505, determine if the transaction contains a signature for a secure account or any device account.
It is necessary to determine whether the signature includes a signature of any one of the secure account and all device accounts. Preferably, the transaction may further include signatures of the blockchain accounts, where the signature part of the transaction has 2 signatures, and it is further necessary to determine that another signature belongs to the signatures of the blockchain accounts, and if not, the transaction is rejected, and the process ends.
At step 506, it is determined whether the transaction includes a signature for the blockchain account.
The signature part of the transaction can only have 1 signature, namely the signature of the blockchain account.
Step 507, determine whether the transaction is a special transaction.
Step 508, determine whether the transaction is a transaction with a secure account.
Before the created account of the transaction is not bound with the security account, only the special transaction of the bound security account is supported, and the uplink is refused by other special transactions of specific types.
In step 509, the signature check passes and the other operations continue.
The method for verifying the transaction provided by the invention mainly relates to signature verification, and does not relate to parts except for signature verification, so other operations in the verification transaction are not described. Signature verification is only part of the verification transaction, but other operations must actually continue in the verification transaction.
Fig. 9 is a schematic diagram of an apparatus for protecting an account based on a blockchain according to an embodiment of the present application.
And the blockchain account module 11 is used for creating and managing a private key of the blockchain account and a blockchain account address, signing by using the private key of the blockchain account and performing HMAC calculation on the information.
The secure account module 12 is used for receiving input information of a user, creating and managing a private key of the secure account, a secure account address and signing by using the private key of the secure account.
The device account module 13 is configured to collect user device information, extract key device information, create and manage a private key of the device account, a device account address, and use a private key signature of the device account.
A request account module 14 for creating a special transaction, which is initiated to the blockchain.
And the checking module 15 is used for checking whether the transaction meets the requirements. When the block chain account is not bound with the security account and the equipment account, the block chain only requires a block chain account signature; when the blockchain account only binds with the safety account, the blockchain requires the transaction to have the signature of the blockchain account and the signature of the safety account; when the blockchain account binds the secure account and the device account, the blockchain requires the transaction to have a signature of the blockchain account, and also requires the transaction to have a signature of the secure account or a signature of any one device account.
The storage module 16 is configured to store the secure account address and the device account address into the status data of the blockchain account on the blockchain, and provide a list for querying the secure account address and the device account address of the blockchain account.
The device provided by the invention realizes the binding of input information and the setting of trusted equipment for the blockchain account through the security account module 12 and the equipment account module 13, so that a user sets a secure operating environment for a private key of the blockchain account.
Fig. 10 is a schematic diagram of an apparatus for protecting an account based on a blockchain according to an embodiment of the present application.
And the blockchain account module 21 is configured to create and manage a private key of the blockchain account, a blockchain account address, perform signature using the private key of the blockchain account, and perform HMAC calculation on the information.
The secure account module 22 is used for receiving input information of a user, creating and managing a private key of the secure account, a secure account address and signing by using the private key of the secure account.
A request account module 23 for creating a transaction to replace a blockchain account and initiating the transaction to the blockchain.
And the checking module 24 is used for checking whether the transaction meets the requirements. When the block chain account is not bound with the security account and the equipment account, the block chain only requires a block chain account signature; when the blockchain account is bound to only the secure account, the blockchain requires the transaction to have a signature of the blockchain account and a signature of the secure account. The verification module 24 is also used to verify that the transaction binding the secure account and the transaction modifying the account are legitimate.
The storage module 25 is configured to store the security account address in the status data of the blockchain account on the blockchain, provide a security account address for querying the blockchain account, migrate the data of the old blockchain account to a new account, and process the old blockchain account.
Compared with the prior art, the block chain account replacing device can prevent the block chain account from being lost after being stolen, and help a user to easily realize the function of replacing the block chain account.
Fig. 11 is a schematic diagram of an apparatus for protecting an account based on a blockchain according to an embodiment of the present application.
A first execution module identifies a transaction type of the transaction, preparing a signature to be verified.
The first detection module detects whether the transaction account is bound with a security account or a device account.
And the second detection module is used for detecting whether the transaction is a special transaction.
The third detection module detects whether the transaction contains a signature of the blockchain account.
And the fourth detection module is used for detecting whether the transaction contains the signature of the safety account or any equipment account bound by the block chain account.
And the fifth detection module is used for detecting whether the transaction contains the signature of the safety account bound by the block chain account.
And the sixth detection module is used for detecting whether the transaction belongs to the transaction bound with the secure account.
And the second execution module passes the signature verification and continues other operations.
The device provided by the invention realizes that the first execution module is used for preparing verification transaction, the first detection module and the second detection module determine how to verify the signature, the third detection module and the sixth detection module are used for verifying the signature when the block chain account is not bound with the security account, and on the contrary, the fourth detection module and the fifth detection module are used for verifying the signature, and the second execution module is continuously executed if the signature is correct. Compared with the prior art, the method has the advantages that the standby safe account and the device account are signed during the transaction, so that the transaction on the blockchain is truly authorized by the user.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data.
Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product.
Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for securing an account based on a blockchain, comprising:
the safety account is established according to information input by a user and can sign all transactions of the block chain account;
the device account, created according to key device information of the user computing device, can sign a common transaction of the blockchain account;
the special transaction comprises the replacement operation of the blockchain account, the binding and replacement operation of the security account and the adding, deleting and modifying operation of the equipment account;
the block chain account is bound with the security account first,
and adding and binding the device account by using the blockchain account and the security account.
2. The method for blocking chain based account protection according to claim 1, comprising:
inputting information by a user, processing the information by using the block chain account to obtain deformation information, and generating the safety account by using the deformation information; creating a transaction bound to the secure account using the blockchain account and initiating the transaction; and after the transaction is linked, binding the safety account to the block chain account on the block chain.
3. The method for blocking chain based account protection according to claim 1, comprising:
collecting device information of a user computing device; extracting the equipment information to obtain key equipment information; processing the key equipment information by using the block chain account to obtain deformed key equipment information, and creating the equipment account by using the deformed key equipment information; creating a transaction with the blockchain account to which the device account is added, the transaction including a signature of the blockchain account, a signature of the secure account, and initiating the transaction; and after the transaction is linked, adding and binding the equipment account to the block chain account on the block chain.
4. The method for blocking chain based account protection according to claim 1, comprising:
initiating a transaction for replacing the equipment account, wherein the transaction comprises a signature of the blockchain account, a signature of the secure account, an old equipment account and a new equipment account, and the old equipment account of the blockchain account is replaced by the new equipment account on a blockchain after the transaction is linked;
initiating a transaction for deleting the equipment account, wherein the transaction comprises the signature of the blockchain account, the signature of the secure account and the equipment account to be processed, and the equipment account to be processed is deleted from the blockchain account on the blockchain after the transaction is linked;
and initiating a transaction for replacing the secure account, wherein the transaction comprises a new secure account, a signature of the block chain account and an old signature of the secure account, and the block chain account is replaced and bound as the new secure account on the block chain after the transaction is linked.
5. A method for securing an account based on a blockchain, wherein the blockchain account has bound to it the secure account, wherein the secure account, created from information input by a user, can sign all transactions of the blockchain account, the method comprising:
preparing a new blockchain account; preparing a new secure account; creating a transaction to replace the blockchain account, the transaction including the signature of the new blockchain account, the signature of the new secure account, the signature of the old blockchain account, the signature of the old secure account; initiating the transaction; the transaction cochain is used for creating the new blockchain account on a blockchain, transferring the data of the old blockchain account to the new blockchain account, binding the new security account for the new blockchain account, and processing the old blockchain account.
6. A method for blockchain based authenticated transactions, comprising:
the safety account is established according to information input by a user and can sign all transactions of the block chain account;
the device account, created according to key device information of the user computing device, can sign a common transaction of the blockchain account;
the special transaction comprises the replacement operation of the blockchain account, the binding and replacement operation of the security account and the adding, deleting and modifying operation of the equipment account;
the blockchain identifies a type of the transaction; if the blockchain account creating the transaction is bound with the secure account, when the transaction is the special transaction, the signature of the secure account bound with the blockchain account is required to be verified, and when the transaction is not the special transaction, the signature of the secure account bound with the blockchain account or any device account is required to be included in the transaction.
7. The blockchain-based method of validating a transaction of claim 4, comprising:
if the blockchain account that created the transaction is not bound to the secure account, then verification is required that the transaction request contains a signature of the blockchain account, and the blockchain rejects the transaction when the transaction belongs to the special transaction but not to the special transaction that is bound to the secure account.
8. An apparatus for securing an account based on a blockchain, comprising:
the block chain account module is used for creating and managing the block chain accounts and signing by using the block chain accounts;
the security account module is used for creating and managing the security account and signing by using the security account;
the device account module is used for creating and managing the device account and signing by using the device account;
the request module is used for creating the special transaction and initiating the special transaction, wherein the special transaction comprises the replacement operation of the blockchain account, the binding and replacement operation of the security account and the adding, deleting and modifying operation of the equipment account;
a verification module for verifying whether the special transaction is valid;
the storage module is used for storing the bound security accounts and the device accounts with the added bindings in the data state of the blockchain account on the blockchain, and also used for replacing the security accounts of the blockchain account and replacing and deleting the device accounts of the blockchain account on the blockchain;
and the transaction type module is used for appointing the specific type of the special transaction and identifying the specific type of the transaction.
9. An apparatus for securing an account based on a blockchain, comprising:
the block chain account module is used for creating and managing the block chain accounts and signing by using the block chain accounts;
the security account module is used for creating and managing the security account and signing by using the security account;
a request module for generating a transaction to replace the blockchain account and initiating the transaction;
the verification module is used for verifying whether the transaction for replacing the blockchain account is valid;
a storage module, configured to create a new blockchain account on a blockchain according to the transaction for replacing the blockchain account, migrate data of the old blockchain account to the new blockchain account, bind the new security account to the new blockchain account, and process the old blockchain account;
a transaction type module to identify whether the transaction belongs to a transaction that replaces the blockchain account.
10. An apparatus for blockchain based authenticated transaction, comprising:
the first execution module is used for identifying the transaction type of the transaction and preparing a signature to be verified;
the first detection module is used for detecting whether the transaction account is bound with a security account or a device account;
the second detection module is used for detecting whether the transaction is a special transaction;
the third detection module detects whether the transaction contains the signature of the block chain account;
the fourth detection module is used for detecting whether the transaction contains a signature of a safety account or any equipment account bound to the block chain account;
the fifth detection module is used for detecting whether the transaction contains the signature of the safety account bound by the block chain account;
the sixth detection module is used for detecting whether the transaction belongs to a transaction bound with a secure account;
and the second execution module passes the signature verification and continues other operations.
CN202010301651.XA 2020-04-16 2020-04-16 Block chain-based method and device for protecting account and verifying transaction Pending CN111461721A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010301651.XA CN111461721A (en) 2020-04-16 2020-04-16 Block chain-based method and device for protecting account and verifying transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010301651.XA CN111461721A (en) 2020-04-16 2020-04-16 Block chain-based method and device for protecting account and verifying transaction

Publications (1)

Publication Number Publication Date
CN111461721A true CN111461721A (en) 2020-07-28

Family

ID=71684536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010301651.XA Pending CN111461721A (en) 2020-04-16 2020-04-16 Block chain-based method and device for protecting account and verifying transaction

Country Status (1)

Country Link
CN (1) CN111461721A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150148A (en) * 2020-09-24 2020-12-29 普华云创科技(北京)有限公司 Enterprise asset protection method and system based on block chain technology

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468534A (en) * 2014-11-21 2015-03-25 小米科技有限责任公司 Account protection method and device
WO2017136643A1 (en) * 2016-02-03 2017-08-10 Luther Systems System and method for secure management of digital contracts
CN107408245A (en) * 2015-02-27 2017-11-28 维萨国际服务协会 Utilize the trading signature of Asymmetric Cryptography
GB201717414D0 (en) * 2017-10-23 2017-12-06 Cygnetise Ltd Methods and apparatus for verifying a user transaction
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
WO2018157788A1 (en) * 2017-02-28 2018-09-07 腾讯科技(深圳)有限公司 Method and device for use in processing account information in block chains, storage medium and electronic device
CN108683667A (en) * 2018-05-16 2018-10-19 深圳市网心科技有限公司 Account protection method, device, system and storage medium
CN108694668A (en) * 2018-06-15 2018-10-23 腾讯科技(深圳)有限公司 Digital asset method of commerce, device, medium and equipment
CN108959871A (en) * 2018-07-12 2018-12-07 越信智能科技(深圳)有限公司 A kind of method and system of more account operations and management
CN110070363A (en) * 2019-03-13 2019-07-30 咪咕文化科技有限公司 Account management method, verification method and terminal device in block chain network
US20190311337A1 (en) * 2018-04-04 2019-10-10 Vijay K. Madisetti Method and System for Exchange of Value or Tokens Between Blockchain Networks
CN110462652A (en) * 2017-03-31 2019-11-15 西门子股份公司 For area of computer aided provide the shielded number of safety twin method and apparatus
CN110555684A (en) * 2019-08-26 2019-12-10 北京米弘科技有限公司 Account and system based on block chain system
US20200076601A1 (en) * 2018-09-04 2020-03-05 Microsoft Technology Licensing, Llc Identity system for use with blockchain platform
JP2020042671A (en) * 2018-09-12 2020-03-19 富士通株式会社 Transaction management device, transaction management method and transaction management program

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468534A (en) * 2014-11-21 2015-03-25 小米科技有限责任公司 Account protection method and device
CN107408245A (en) * 2015-02-27 2017-11-28 维萨国际服务协会 Utilize the trading signature of Asymmetric Cryptography
WO2017136643A1 (en) * 2016-02-03 2017-08-10 Luther Systems System and method for secure management of digital contracts
WO2018157788A1 (en) * 2017-02-28 2018-09-07 腾讯科技(深圳)有限公司 Method and device for use in processing account information in block chains, storage medium and electronic device
CN110462652A (en) * 2017-03-31 2019-11-15 西门子股份公司 For area of computer aided provide the shielded number of safety twin method and apparatus
GB201717414D0 (en) * 2017-10-23 2017-12-06 Cygnetise Ltd Methods and apparatus for verifying a user transaction
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
US20190311337A1 (en) * 2018-04-04 2019-10-10 Vijay K. Madisetti Method and System for Exchange of Value or Tokens Between Blockchain Networks
CN108683667A (en) * 2018-05-16 2018-10-19 深圳市网心科技有限公司 Account protection method, device, system and storage medium
CN108694668A (en) * 2018-06-15 2018-10-23 腾讯科技(深圳)有限公司 Digital asset method of commerce, device, medium and equipment
CN108959871A (en) * 2018-07-12 2018-12-07 越信智能科技(深圳)有限公司 A kind of method and system of more account operations and management
US20200076601A1 (en) * 2018-09-04 2020-03-05 Microsoft Technology Licensing, Llc Identity system for use with blockchain platform
JP2020042671A (en) * 2018-09-12 2020-03-19 富士通株式会社 Transaction management device, transaction management method and transaction management program
CN110070363A (en) * 2019-03-13 2019-07-30 咪咕文化科技有限公司 Account management method, verification method and terminal device in block chain network
CN110555684A (en) * 2019-08-26 2019-12-10 北京米弘科技有限公司 Account and system based on block chain system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
XIONG F等: "" A key protection scheme based on secret sharing for blockchain-based construction supply chain system"" *
李赞;: "基于新时期区块链技术发展的安全性分析" *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150148A (en) * 2020-09-24 2020-12-29 普华云创科技(北京)有限公司 Enterprise asset protection method and system based on block chain technology

Similar Documents

Publication Publication Date Title
US11196572B2 (en) Blockchain-based content verification
RU2728524C1 (en) Method and device for consensus verification
CA3057331C (en) Method and apparatus for processing transaction requests
EP3591510A1 (en) Method and device for writing service data in block chain system
CN110795501A (en) Method, device, equipment and system for creating verifiable statement based on block chain
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN113542288B (en) Service authorization method, device, equipment and system
CN111753335B (en) Editing method and device for block content
EP3824403A1 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
TW202002570A (en) Electronic signature method and device based on block chain and electronic equipment
CN108628611B (en) Data calling method and data calling device
US11303443B2 (en) Electronic system to enable rapid acquisition and delivery of services and to provide strong protection of security and privacy
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
CN112800436B (en) Data authorization method and device and electronic equipment
CN111770112B (en) Information sharing method, device and equipment
CN112037058B (en) Data verification method, device and storage medium
CN113704775A (en) Service processing method based on distributed digital identity and related device
CN111461721A (en) Block chain-based method and device for protecting account and verifying transaction
CN113112354A (en) Transaction processing method of block chain network, block chain network and storage medium
US9424543B2 (en) Authenticating a response to a change request
US20210406395A1 (en) Personal information vault
CN107947934A (en) The fingerprint recognition Verification System and method of mobile terminal based on banking system
US11374920B2 (en) Authentication system and authentication method using personal electronic identity gadgets
CN111314057A (en) Private key using method and device depending on user input
CN115022864B (en) Verification method and device for subscription service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200728

WD01 Invention patent application deemed withdrawn after publication