CN111639937A - Digital currency risk management and control method and system - Google Patents

Digital currency risk management and control method and system Download PDF

Info

Publication number
CN111639937A
CN111639937A CN202010480169.7A CN202010480169A CN111639937A CN 111639937 A CN111639937 A CN 111639937A CN 202010480169 A CN202010480169 A CN 202010480169A CN 111639937 A CN111639937 A CN 111639937A
Authority
CN
China
Prior art keywords
transaction
abstract
data
image
digital currency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010480169.7A
Other languages
Chinese (zh)
Inventor
陈议尊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010480169.7A priority Critical patent/CN111639937A/en
Publication of CN111639937A publication Critical patent/CN111639937A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a digital currency risk control method and a digital currency risk control system, wherein when each transaction node performs a transaction, a transaction image is collected and stored, then the data of the transaction image is subjected to Hash operation to obtain an abstract, and the transaction image data, the abstract and a public key are stored in a block; when any node needs to verify a certain transaction operation, only transaction image data, an abstract and a public key need to be extracted from a control block chain, the public key is firstly adopted to decrypt the data of the transaction image, then hash operation is carried out on the data of the transaction image to obtain a verification abstract, the verification abstract is compared with the extracted abstract, and due to the irreversibility of the abstract, if the two abstracts are equal, the transaction image is not distorted, so that the authenticity and the non-tamper property of the transaction image collected by each transaction node are ensured.

Description

Digital currency risk management and control method and system
Technical Field
The invention relates to the technical field of block chains, in particular to a digital currency risk management and control method and a digital currency risk management and control system.
Background
At present, mobile Payment based on Electronic account is very popular, and so-called Digital Currency (DCEP) is usually issued by a central bank or authorized by the central bank, and legal currency represented by an encrypted digital string representing a specific amount of money is supported by cryptography. In contrast to traditional mobile payments, data currency is itself legal currency and may no longer need to be associated with an electronic account, so digital currency has been more than just a payment instrument. In the current digital currency transaction, the transaction security needs to be improved continuously.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a digital currency risk control method and device, which can collect images in a transaction node to improve the transaction security of digital currency.
A digital currency risk management and control method, the method comprising:
acquiring digital currency transactions to be executed, acquiring transaction images of transaction executors when transactions occur at each transaction node, transferring the transaction images into data, performing hash operation on the data to obtain an abstract, encrypting the abstract by using a private key, and attaching a digital signature to the transaction images; packaging the data of the transaction image and the private key into a block, and constructing the blocks generated in sequence into a control block chain, wherein the control block chain is independent of the block chain of the digital currency transaction; taking the acquisition time of the transaction image, the hash of the transaction image data and the hash of the last block as the characteristic value of the block head of the current block, and recording the transaction image, the abstract of the transaction image data and the public key into the block body of the current block;
further comprising a verification step: and decrypting the data of the transaction image in the control block chain by adopting a public key in the transaction node, then carrying out hash operation on the data of the transaction image to obtain a verification abstract, comparing the verification abstract with the called abstract, and if the verification abstract is equal to the called abstract, not tampering the data of the transaction image.
Further, a public key corresponding to the private key is stored in an intelligent contract of the control block chain, the transaction image is attached with a digital signature, and the public key is stored in each transaction node in a distributed manner through the control block chain.
Furthermore, each transaction node conducts transaction according to the transaction priority and collects transaction images in advance according to the transaction priority.
Further, the transaction priority is set according to a preset mark, and the mark comprises one or more marks; digital currency transactions labeled with the same priority have the same rank.
A storable computing device comprising a processor and a memory to store processor executable instructions;
wherein the processor performs the method of any of the preceding claims 1-4.
Digital currency risk management and control device includes:
the transaction node module acquires digital currency transactions to be executed, collects transaction images of transaction executors when the transactions occur in each transaction node module, and forwards the transaction images into data which are subjected to hash operation to obtain an abstract; the transaction node module encrypts the abstract by using a private key and attaches a digital signature to the transaction image; the transaction node module or the affiliated server thereof packs the data of the transaction image and the private key into a block, and mutually constructs the blocks generated in sequence into a control block chain, wherein the control block chain is independent of the block chain of the digital currency transaction; the transaction node module or the affiliated server thereof takes the acquisition time of the transaction image, the hash of the transaction image data and the hash of the last block as the characteristic value of the block head of the current block, and records the transaction image, the abstract of the transaction image data and the public key into the block body of the current block;
the verification module is arranged in the transaction node module and used for decrypting the data of the transaction image in the tube control block chain by adopting a public key, then carrying out Hash operation on the data of the transaction image to obtain a verification abstract, comparing the verification abstract with the called abstract, and if the verification abstract and the called abstract are equal, the transaction image data is not tampered.
Further, a public key corresponding to the private key is stored in an intelligent contract of the control block chain, the transaction image is attached with a digital signature, and the public key is stored in each transaction node in a distributed manner through the control block chain.
Furthermore, each transaction node conducts transaction according to the transaction priority and collects transaction images in advance according to the transaction priority.
Further, the transaction priority is set according to a preset mark, and the mark comprises one or more marks; digital currency transactions labeled with the same priority have the same rank.
The invention has the beneficial effects that:
the invention provides a digital currency risk control method and a digital currency risk control system, wherein when each transaction node performs a transaction, a transaction image is collected and stored, then the data of the transaction image is subjected to Hash operation to obtain an abstract, and the transaction image data, the abstract and a public key are stored in a block; when a certain node needs to verify a certain transaction, the transaction condition when the transaction occurs can be known only by extracting a transaction image collected from the transaction node where the transaction occurs from the control block chain; the transaction image is stored in the control block chain after being encrypted, and even if the terminal which is not in the control block chain obtains the encrypted transaction image, the terminal does not have a public key for decrypting the encrypted transaction image, so that the encrypted transaction image can prevent the transaction image from being leaked; when any node needs to verify a certain transaction operation, only transaction image data, an abstract and a public key need to be extracted from a control block chain, the public key is firstly adopted to decrypt the data of the transaction image, then hash operation is carried out on the data of the transaction image to obtain a verification abstract, the verification abstract is compared with the extracted abstract, and due to the irreversibility of the abstract, if the two abstracts are equal, the transaction image is not distorted, so that the authenticity and the non-tamper property of the transaction image collected by each transaction node are ensured.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a schematic flow chart of a digital currency risk management and control method according to an embodiment of the present application.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby.
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
The blockchain system refers to a system for performing a blockchain between nodes, and the blockchain system may include a plurality of nodes, and the plurality of nodes may refer to respective clients in the blockchain system. Each node may receive input information during normal operation and maintain shared data within the blockchain system based on the received input information. In order to ensure the information intercommunication in the blockchain system, information connection can exist between each node in the blockchain system, and the nodes can transmit information through the information connection. For example, when any node in the blockchain system receives input information, other nodes in the blockchain system can acquire the input information according to a consensus algorithm, and store the input information as data in shared data, so that the data stored on all nodes in the blockchain system are consistent.
Each node in the blockchain system has a corresponding node identifier, and each node in the blockchain system can store node identifiers of other nodes in the blockchain system, so that the generated block can be broadcast to other nodes in the blockchain system according to the node identifiers of other nodes. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
Figure BDA0002517046990000041
Figure BDA0002517046990000051
Each node in the blockchain system stores one identical blockchain. The block chain is composed of a plurality of blocks, the starting block comprises a block head and a block main body, the block head stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
In some blockchain networks, cryptography is implemented to maintain privacy of transactions. For example, two nodes may encrypt transaction data if they want to maintain transaction privacy so that other nodes in the blockchain network cannot see the details of the transaction. Examples of encryption processes include, but are not limited to, symmetric encryption and asymmetric encryption. Symmetric encryption refers to an encryption process that uses a single key to both encrypt (generate ciphertext from plaintext) and decrypt (generate plaintext from ciphertext). In symmetric encryption, the same key may be used for multiple nodes, so each node may encrypt/decrypt transaction data.
Asymmetric encryption uses key pairs, each key pair comprising a private key and a public key, the private key being known only to the respective node, and the public key being known to any or all other nodes in the blockchain network. A node may encrypt data using a public key of another node, and the encrypted data may be decrypted using a private key of the other node. For example, participant a may encrypt data using participant B's public key and send the encrypted data to participant B. Participant B can use its private key to decrypt the encrypted data (ciphertext) and extract the original data (plaintext). Messages encrypted using a node's public key can only be decrypted using the node's private key.
Asymmetric encryption is used to provide a digital signature that enables a participant in a transaction to confirm the other participants in the transaction and the validity of the transaction. For example, a node may digitally sign a message, and another node may confirm that the message was sent by the node based on the digital signature of participant a. Digital signatures may also be used to ensure that messages are not tampered with during transmission. For example, participant a will send a message to participant B. Participant a generates a hash value of the message and then encrypts the hash value using its private key to provide a digital signature as an encrypted hash value. Participant a appends the digital signature to the message and sends the message with the digital signature to participant B. Participant B decrypts the digital signature using participant a's public key and extracts the hash value. Participant B hashes the message and compares the hash values. If the hash values are the same, participant B can confirm that the message did indeed come from participant A and has not been tampered with.
The asymmetric cryptosystem has the characteristics that: the algorithm is complex in strength and security, depends on the algorithm and the secret key, but the encryption and decryption speed is not as fast as the symmetric encryption and decryption speed due to the complex algorithm. The symmetric cryptosystem has only one kind of key and is not public, and if the key is required to be decrypted, the opposite party can know the key. Therefore, the security of the key is ensured, and the asymmetric key body is provided with two keys, wherein one of the two keys is public, so that the key of the other party does not need to be transmitted like a symmetric cipher. Thus, the security is much greater.
In performing blockchain transactions, the smart contract validates multiple transaction agreements.
The embodiments of the present application will be described below with reference to the drawings.
In some embodiments, the present invention provides a digital currency risk management method, as shown in fig. 1, the method including: acquiring digital currency transactions to be executed, acquiring transaction images of transaction executors when transactions occur at each transaction node, transferring the transaction images into data, performing hash operation on the data to obtain an abstract, encrypting the abstract by using a private key, and attaching a digital signature to the transaction images; packaging the data of the transaction image and the private key into a block, and constructing the blocks generated in sequence into a control block chain, wherein the control block chain is independent of the block chain of the digital currency transaction; taking the acquisition time of the transaction image, the hash of the transaction image data and the hash of the last block as the characteristic value of the block head of the current block, and recording the transaction image, the abstract of the transaction image data and the public key into the block body of the current block; further comprising a verification step: and decrypting the data of the transaction image in the control block chain by adopting a public key in the transaction node, then carrying out hash operation on the data of the transaction image to obtain a verification abstract, comparing the verification abstract with the called abstract, and if the verification abstract is equal to the called abstract, not tampering the data of the transaction image.
Specifically, when a transaction occurs at each transaction node, a transaction image is collected and stored, then hash operation is performed on data of the transaction image to obtain an abstract, and the transaction image data, the abstract and a public key are stored in a block;
when a certain node needs to verify a certain transaction, the transaction condition when the transaction occurs can be known only by extracting a transaction image collected from the transaction node where the transaction occurs from the control block chain; the transaction image is stored in the control block chain after being encrypted, and even if the terminal which is not in the control block chain obtains the encrypted transaction image, the terminal does not have a public key for decrypting the encrypted transaction image, so that the encrypted transaction image can prevent the transaction image from being leaked;
when any node needs to verify a certain transaction operation, only transaction image data, an abstract and a public key need to be extracted from a control block chain, the public key is firstly adopted to decrypt the data of the transaction image, then hash operation is carried out on the data of the transaction image to obtain a verification abstract, the verification abstract is compared with a called abstract, the called abstract refers to an abstract obtained by calculating the transaction image data by an initial transaction node module, and due to the irreversibility of the abstract, if the two abstracts are equal, the transaction image is not tampered, so that the authenticity and the irreversibility of the transaction image collected by each transaction node are ensured.
Preferably, the public key corresponding to the private key is further stored in an intelligent contract of the control block chain, the transaction image is attached with a digital signature, and the public key is stored in each transaction node in a distributed manner through the control block chain. The digital signature can be used for verifying the authenticity of the public key, the public key stored in the intelligent contract can provide the alternative, and when the public key in the control block chain cannot be called, the public key can be obtained through the intelligent contract.
Preferably, each transaction node conducts transaction according to the transaction priority, and acquires the transaction image in advance according to the transaction priority, the transaction priority can be determined according to the transaction amount or the transaction time or the pre-mark, and the transaction image is acquired in advance when the priority of a certain transaction is higher than that of the digital currency.
In one embodiment, the transaction priority is set according to a pre-marking, the marking comprising one or more; digital currency transactions marked with the same priority have the same rank, and the marking may be set by a human.
A storable computing device comprising a processor and a memory to store processor executable instructions;
wherein the processor performs the method of any of the preceding claims 1-4.
Digital currency risk management and control device includes:
the transaction node module acquires digital currency transactions to be executed, collects transaction images of transaction executors when the transactions occur in each transaction node module, and forwards the transaction images into data which are subjected to hash operation to obtain an abstract; the transaction node module encrypts the abstract by using a private key and attaches a digital signature to the transaction image; the transaction node module or the affiliated server thereof packs the data of the transaction image and the private key into a block, and mutually constructs the blocks generated in sequence into a control block chain, wherein the control block chain is independent of the block chain of the digital currency transaction; the transaction node module or the affiliated server thereof takes the acquisition time of the transaction image, the hash of the transaction image data and the hash of the last block as the characteristic value of the block head of the current block, and records the transaction image, the abstract of the transaction image data and the public key into the block body of the current block;
the verification module is arranged in the transaction node module and used for decrypting the data of the transaction image in the tube control block chain by adopting a public key, then carrying out Hash operation on the data of the transaction image to obtain a verification abstract, comparing the verification abstract with the called abstract, and if the verification abstract and the called abstract are equal, the transaction image data is not tampered.
Similarly, when the transaction occurs in each transaction node module, the transaction image is collected and stored, the data of the transaction image is subjected to hash operation to obtain an abstract, and the transaction image data, the abstract and the public key are stored in the block; when any node needs to verify a certain transaction operation, only transaction image data, an abstract and a public key need to be extracted from a control block chain, the public key is firstly adopted to decrypt the data of the transaction image, then hash operation is carried out on the data of the transaction image to obtain a verification abstract, the verification abstract is compared with a called abstract, the called abstract refers to an abstract obtained by calculating the transaction image data by an initial transaction node module, and due to the irreversibility of the abstract, if the two abstracts are equal, the transaction image is not tampered, so that the authenticity and the irreversibility of the transaction image acquired by each transaction node module are ensured.
Preferably, the public key corresponding to the private key is further stored in an intelligent contract of the control block chain, the transaction image is attached with a digital signature, and the public key is stored in each transaction node in a distributed manner through the control block chain. And each transaction node carries out transaction according to the transaction priority and collects transaction images in advance according to the transaction priority. The transaction priority is set according to a preset mark, and the mark comprises one or more marks; digital currency transactions labeled with the same priority have the same rank.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (9)

1. The digital currency risk management and control method is characterized by comprising the following steps: the method comprises the following steps:
acquiring digital currency transactions to be executed, acquiring transaction images of transaction executors when transactions occur at each transaction node, transferring the transaction images into data, performing hash operation on the data to obtain an abstract, encrypting the abstract by using a private key, and attaching a digital signature to the transaction images; packaging the data of the transaction image and the private key into a block, and constructing the blocks generated in sequence into a control block chain, wherein the control block chain is independent of the block chain of the digital currency transaction; taking the acquisition time of the transaction image, the hash of the transaction image data and the hash of the last block as the characteristic value of the block head of the current block, and recording the transaction image, the abstract of the transaction image data and the public key into the block body of the current block;
further comprising a verification step: and decrypting the data of the transaction image in the control block chain by adopting a public key in the transaction node, then carrying out hash operation on the data of the transaction image to obtain a verification abstract, comparing the verification abstract with the called abstract, and if the verification abstract is equal to the called abstract, not tampering the data of the transaction image.
2. The digital currency risk management and control method according to claim 1, characterized in that: and the public key corresponding to the private key is also stored in an intelligent contract of the control block chain, the transaction image is attached with a digital signature, and the public key is stored in each transaction node in a distributed manner through the control block chain.
3. The digital currency risk management and control method according to claim 2, characterized in that: and each transaction node carries out transaction according to the transaction priority and collects transaction images in advance according to the transaction priority.
4. The digital currency risk management and control method according to claim 3, characterized in that: the transaction priority is set according to a preset mark, and the mark comprises one or more marks; digital currency transactions labeled with the same priority have the same rank.
5. A storable computing device characterized by: comprising a processor and a memory for storing processor-executable instructions;
wherein the processor performs the method of any of the preceding claims 1-4.
6. Digital currency risk management and control device, its characterized in that: the method comprises the following steps:
the transaction node module acquires digital currency transactions to be executed, collects transaction images of transaction executors when the transactions occur in each transaction node module, and forwards the transaction images into data which are subjected to hash operation to obtain an abstract; the transaction node module encrypts the abstract by using a private key and attaches a digital signature to the transaction image; the transaction node module or the affiliated server thereof packs the data of the transaction image and the private key into a block, and mutually constructs the blocks generated in sequence into a control block chain, wherein the control block chain is independent of the block chain of the digital currency transaction; the transaction node module or the affiliated server thereof takes the acquisition time of the transaction image, the hash of the transaction image data and the hash of the last block as the characteristic value of the block head of the current block, and records the transaction image, the abstract of the transaction image data and the public key into the block body of the current block;
the verification module is arranged in the transaction node module and used for decrypting the data of the transaction image in the tube control block chain by adopting a public key, then carrying out Hash operation on the data of the transaction image to obtain a verification abstract, comparing the verification abstract with the called abstract, and if the verification abstract and the called abstract are equal, the transaction image data is not tampered.
7. The digital currency risk management and control device of claim 6, wherein:
and the public key corresponding to the private key is also stored in an intelligent contract of the control block chain, the transaction image is attached with a digital signature, and the public key is stored in each transaction node in a distributed manner through the control block chain.
8. The digital currency risk management and control device of claim 7, wherein:
and each transaction node carries out transaction according to the transaction priority and collects transaction images in advance according to the transaction priority.
9. The digital currency risk management and control device of claim 8, wherein:
the transaction priority is set according to a preset mark, and the mark comprises one or more marks; digital currency transactions labeled with the same priority have the same rank.
CN202010480169.7A 2020-05-30 2020-05-30 Digital currency risk management and control method and system Withdrawn CN111639937A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010480169.7A CN111639937A (en) 2020-05-30 2020-05-30 Digital currency risk management and control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010480169.7A CN111639937A (en) 2020-05-30 2020-05-30 Digital currency risk management and control method and system

Publications (1)

Publication Number Publication Date
CN111639937A true CN111639937A (en) 2020-09-08

Family

ID=72332127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010480169.7A Withdrawn CN111639937A (en) 2020-05-30 2020-05-30 Digital currency risk management and control method and system

Country Status (1)

Country Link
CN (1) CN111639937A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868255A (en) * 2021-09-28 2021-12-31 华能山东石岛湾核电有限公司 Block chain-based equipment identifier storage method and device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868255A (en) * 2021-09-28 2021-12-31 华能山东石岛湾核电有限公司 Block chain-based equipment identifier storage method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN106357396B (en) Digital signature method and system and quantum key card
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
CN112199649B (en) Anonymous identity verification method under moving edge calculation based on block chain
US5680458A (en) Root key compromise recovery
US8396218B2 (en) Cryptographic module distribution system, apparatus, and program
CN109257180A (en) A kind of method and device for depositing card based on the intellectual property file of block chain
CN111555872B (en) Communication data processing method, device, computer system and storage medium
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
US8687812B2 (en) Method and apparatus for public key cryptography
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN108347419A (en) Data transmission method and device
CN109218825A (en) A kind of video encryption system
US20110320359A1 (en) secure communication method and device based on application layer for mobile financial service
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN108737323A (en) A kind of digital signature method, apparatus and system
CN109151508A (en) A kind of video encryption method
TW201537937A (en) Unified identity authentication platform and authentication method thereof
CN113811874A (en) Encrypted data verification method
Van Aubel et al. Non-repudiation and End-to-End security for electric-vehicle charging
CN111861485A (en) Block chain-based digital currency control method and equipment
CN111639937A (en) Digital currency risk management and control method and system
CN111639943A (en) Digital currency transaction method and system
JPH0969831A (en) Cipher communication system
CN116155483A (en) Block chain signing machine safety design method and signing machine
EP3883178A1 (en) Encryption system and method employing permutation group-based encryption technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200908

WW01 Invention patent application withdrawn after publication