CN107920052A - A kind of encryption method and intelligent apparatus - Google Patents
A kind of encryption method and intelligent apparatus Download PDFInfo
- Publication number
- CN107920052A CN107920052A CN201710655465.4A CN201710655465A CN107920052A CN 107920052 A CN107920052 A CN 107920052A CN 201710655465 A CN201710655465 A CN 201710655465A CN 107920052 A CN107920052 A CN 107920052A
- Authority
- CN
- China
- Prior art keywords
- terminal
- server
- private key
- identification code
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
- G06Q20/0658—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Abstract
The present invention is a kind of encryption method and intelligent terminal.The described method includes;User, which can click on, obtains identifying code button, the local remaining half private key generated after last time operation can be submitted to submit to server, half private key in server splicing last time presence server obtains complete private key, the last information acquisition identifying code submitted of decrypted user, by short message sending on user mobile phone;The mobile phone identifying code of acquisition is spliced on the half password generated before by user, obtain complete wallet password, unlock wallet, backup wallet, wallet needs to arrive first server service business acquisition cloud storage upload voucher and wallet file encryption public key when backing up, wallet file encryption is uploaded, the key that cloud storage returns, notice tap backup wallet cloud storage address are obtained after success;Solve and while can ensure user local wallet file security, solve the problems, such as the backup of wallet file, recover.
Description
Technical field
The present invention relates to the technical field of block chain, refers in particular to a kind of encryption method and intelligent apparatus.
Background technology
At present, in conventional center system, it is excessive to trust cost all in presence server for user security information.Then go out
In existing block chain wallet technology, user's wallet is stored in user local, server only preserves the use for being able to verify that user identity
Family public key, although solve trust crisis, and the opaque problem of data, once user's wallet file loses or password
Pass into silence, user can not just prove the identity of oneself, and the money in account, which can only just look at, not to be taken not come out again.Conventional centerization is used
Family system has the disadvantages that:
Threatened 1. user information safety and privacy exist.Due to all data all on a centralized server, its pole is caused
It is vulnerable to hacking, and cause fund theft and privacy of user leakage.
2. trust is of high cost, in centralized system, user, which will give tacit consent to, believes that system is believable, if system operator
Do evil, user data may the person of being managed distort, or even theft.
3. data are opaque, in centralized system, data are opaque.
Traditional decentralization block chain wallet technology has the disadvantages that:
1. user needs to undertake backup wallet task.User's wallet file needs user oneself to preserve, once wallet file
Lose, user can not just access to your account, and let alone bring back the money in account.
2. user needs to undertake to forget password risk, user needs to remember wallet password, once user forgets password, user
Just take less than the secret key for proving its identity, the money of user account, which can only just look at, not to be taken not come out.
3. user password is dangerous there are Brute Force, user password is verified as local verification, and is limited without number, Hei Keke
Try out password by force in a manner of by Brute Force, the block chain assets of user may suffer a loss.
So it is badly in need of a kind of encryption method and intelligent apparatus, to solve to ensure user local wallet file security
While, solve the problems, such as the backup of wallet file, recover.
The content of the invention
The technical problem to be solved in the present invention is while can ensure user local wallet file security, solve
The backup of wallet file, recover problem.
Above-mentioned technical problem is solved, the present invention provides encryption method and is;
When terminal, which receives, terminates programmed instruction, generation user cipher, public key and private key, the user cipher include first
Password and the second password;
Private key fission is the first private key and the second private key by the terminal;
The terminal is encrypted the first password by the public key to obtain the first ciphertext, together with described first
Private key is sent to server;
The terminal receive log in next time trading instruction when, the home identity of the terminal and second private key are sent out
Send to the server, so as to confirm after the server reception home identity to the identity of the terminal, confirm
After correct, the private key is obtained after the first private key of reception and the second private key are recombinated, and by the private key to first
Ciphertext is decrypted to obtain the first password and sends back the terminal;
The terminal receives the first password that the server is sent, by the first password and local described the
Two passwords recombinate to obtain the user cipher;
The terminal performed by the user cipher after restructuring log in transactional operation.
Present invention also offers another encryption method, including,
Server receives the first ciphertext, the first private key, the second private key and the home identity of terminal transmission, and described first is private
After key, the second private key receive END instruction for the terminal, generation private key fission forms, and first ciphertext connects for the terminal
Generation public key is encrypted the first password in terminal generation user cipher and obtains after receiving END instruction, and the user is close
Code further includes the second password;
The server confirms the identity of the terminal by the home identity, if it is confirmed that correctly, it is described
Server will recombinate first private key and the second private key to obtain the private key, and by the private key to described first
Ciphertext, which is decrypted to obtain the first password, sends back the terminal so that the terminal by the first password with it is local
Second password recombinates to obtain the user cipher, and by the user cipher perform login next time transactional operation.
Present invention also offers another encryption method, including,
High in the clouds identification code is generated after the encrypted encryption wallet file of high in the clouds receiving terminal, and the high in the clouds identification code is sent out
The terminal is given, so that the terminal receives the high in the clouds identification code and is sent to server, the server receives described
Verification matching is carried out with the local server identification code after the identification code of high in the clouds, if successful match updates the wallet file
Path.
The application also provides a kind of intelligent apparatus, including:
One Transmit-Receive Unit, terminates programmed instruction for receiving;
One generation unit, for generating user cipher, public key and private key, the user cipher includes first password and second
Password;
One fission recomposition unit, for being the first private key, the second private key by private key fission;
One encryption unit, for the first password to be encrypted by public key to obtain the first ciphertext;
The Transmit-Receive Unit, is additionally operable to together with first private key send first ciphertext to server, also uses
In receive log in trading instruction the identity of the terminal is confirmed after the home identity so that the server receives,
After confirming correctly, the private key is obtained after the first private key of reception and the second private key are recombinated, and pass through the private key pair
First ciphertext is decrypted to obtain the first password and sends back the terminal;
The Transmit-Receive Unit, is additionally operable to the first password that the server is sent;
The fission recomposition unit, is additionally operable to recombinate to obtain with local second password by the first password described
User cipher;
It is further included,
One execution unit, transactional operations are logged in for being performed by user cipher.
Present invention also provides another intelligent apparatus, including:
One Transmit-Receive Unit, for receiving the first ciphertext, the first private key, the second private key and home identity, first private key,
After second private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal
The first password that public key generates in user cipher the terminal is generated after END instruction to be encrypted and obtain, the user cipher
Further include the second password;
One confirmation unit, confirms the identity of the terminal by the home identity for server;
One fission recomposition unit, for if it is confirmed that correctly, to first private key and the second private key will recombinate
To the private key,;
One decryption unit, is decrypted to obtain the first password by the private key to first ciphertext;
The Transmit-Receive Unit, is additionally operable to send first password to the terminal, so that the terminal is by the first password
Recombinate to obtain the user cipher with the second local password, and by the user cipher perform login next time transaction
Operation.
Present invention also provides another intelligent apparatus, including:
One Transmit-Receive Unit, the encryption wallet file encrypted for receiving terminal;
One generation unit, for generating high in the clouds identification code;
The Transmit-Receive Unit, is additionally operable to the high in the clouds identification code being sent to the terminal, so that the terminal receives institute
State high in the clouds identification code and be sent to server, the server is known after receiving the high in the clouds identification code with the local server
Other code carries out verification matching, if successful match updates the path of the wallet file.
Beneficial effects of the present invention:
1. user's entry password is designed using one-time pad, user need not remember password, will not produce the wind to forget Password
Danger.
2. automated back-up wallet, the risk lost without wallet.
3. asymmetric encryption, one-time pad design are taken in wallet backup.Eliminate the risk that wallet is decrypted by violence.
4. server-side user mobile phone number and the separation storage of wallet file backup information, with server end onrelevant, it is ensured that
Information security.
Brief description of the drawings
Fig. 1 is the flow chart to encryption method of one embodiment of the application;
Fig. 2 is the flow chart to encryption method of another embodiment of the application;
Fig. 3 is the flow chart to encryption method of another embodiment of the application;
Fig. 4 is the flow chart to encryption method of another embodiment of the application;
Fig. 5 is the flow chart to encryption method of another embodiment of the application;
Fig. 6 is the flow chart to encryption method of another embodiment of the application;
Fig. 7 is the flow chart to encryption method of another embodiment of the application;
Fig. 8 is the flow chart to encryption method of another embodiment of the application;
Fig. 9 is the flow chart to encryption method of another embodiment of the application;
Figure 10 is the framework map to encryption method intelligent apparatus of another embodiment of the application;
Figure 11 is the framework map to encryption method intelligent apparatus of another embodiment of the application;
Figure 12 is the framework map to encryption method intelligent apparatus of another embodiment of the application;
Embodiment:
Following embodiments are only the restrictions for clear example of the present invention, and not to embodiment of the present invention.It is right
For those of ordinary skill in the art, can also make on the basis of the following description other it is various forms of change or
Change, and these belong to obvious changes or variations that spirit of the invention drawn still in protection scope of the present invention it
In.
A kind of encryption method, the described method includes;
As shown in Figure 1, the encrypted method of the application, including:
Step 101:When terminal, which receives, terminates programmed instruction, generation user cipher, public key and private key, the user cipher
Including first password and the second password;
Step 102:Private key fission is the first private key and the second private key by the terminal;
Step 103:The terminal is encrypted the first password by the public key to obtain the first ciphertext, together with institute
The first private key stated is sent to server;
Step 104:The terminal receive log in next time trading instruction when, by the home identity of the terminal and described the
Two private keys are sent to the server, so as to be carried out really to the identity of the terminal after the server reception home identity
Recognize, after confirming correctly, the private key is obtained after the first private key of reception and the second private key are recombinated, and pass through the private key
First ciphertext is decrypted to obtain the first password and sends back the terminal;
Step 105:The terminal receives the first password that the server is sent, by the first password and local
Second password recombinate to obtain the user cipher;
Step 106:The terminal performed by the user cipher after restructuring log in transactional operation.
First, when terminal, which receives, terminates programmed instruction, end programmed instruction herein is cancellation or exit instruction, is generated
User cipher, public key and private key, the user cipher include first password and the second password;The first password and the second password
For two string random strings, the terminal is encrypted the first password by the public key to obtain the first ciphertext, together with
First private key is sent to server;When terminal receive log in trading instruction when, the home identity of the terminal and described the
Two private keys are sent to the server, so as to be carried out really to the identity of the terminal after the server reception home identity
Recognize, home identity herein generally refers to the cell-phone number of mobile phone, confirm it is correct after, by the first private key of reception and the second private key into
The private key is obtained after row restructuring, and the first ciphertext is decrypted to obtain the first password and sent back by the private key
The terminal;Encrypting and decrypting process above using salt encryption is added, generates decrypted password and salt after decryption.It is later all
Encrypting and decrypting operation using adding salt to encrypt, is no longer repeated.
Secondly, the terminal receives the first password that the server is sent, by the first password and local
Second password recombinates to obtain the user cipher.
Finally, the terminal performed by the user cipher after restructuring log in transactional operation.Due to user cipher
Generation is instantaneous process, and in the case of other, user cipher does not store in same equipment.So Brute Force can not be into
OK.
As shown in fig. 7, in the alternative embodiment of the application, it further includes its backup method, and the backup method is such as
Under:
After it be the first private key and the second private key that the terminal is by private key fission, terminal transmission terminal iidentification to
The server, so that the server is identified registration by the terminal iidentification, after identifier register success, the service
Device generation server path, upload voucher, server identification code, storage of public keys and storage private key, and the server will be therein
The server path, upload voucher and storage of public keys are sent to the terminal;
The terminal receives the server path, upload voucher and the storage of public keys that the server is sent;
The terminal by wallet file encryption and is sent to high in the clouds by the storage of public keys, adds so that the high in the clouds receives
High in the clouds identification code is generated after the close wallet file, and the high in the clouds identification code is sent back into the terminal;
The terminal receives the high in the clouds identification code and is sent to the server, so that the server receives the cloud
Verification matching is carried out with the local server identification code after the identification code of end, if successful match updates the wallet file
Path, so far completes all backup procedures.
As shown in figure 8, in the alternative embodiment of the application, it further includes its restoration methods, and the restoration methods are such as
Under:
The terminal receives reduction instruction, and the terminal iidentification is sent to the server, so that the server
The identity of the terminal is confirmed by the terminal iidentification, after confirming successfully, the server downloads the encryption in high in the clouds
Wallet file, and being decrypted by local storage private key, the server by the wallet file after decryption send to
The terminal;
Recovery operation is performed after the wallet file after the terminal receiving and deciphering.This recovery operation is based on above-mentioned standby
Used after part operation.
As shown in Fig. 2, the encrypted method of row that another embodiment of the application provides, including:
Step 201:Server receives the first ciphertext, the first private key, the second private key and the home identity of terminal transmission, institute
After the first private key, the second private key are stated as terminal reception END instruction, generation private key fission forms, and first ciphertext is institute
Generation public key after terminal receives END instruction is stated the first password in terminal generation user cipher is encrypted and obtains, institute
State user cipher and further include the second password;
Step 202:The server confirms the identity of the terminal by the home identity,
Step 203:If it is confirmed that correct, the server will be recombinated to obtain to first private key with the second private key
The private key, and first ciphertext is decrypted to obtain the first password by the private key and sends back the terminal,
So that the first password and the second local password are recombinated to obtain the user cipher by the terminal, and pass through the user
Password perform login next time transactional operation.
First, the server is received has sent the first ciphertext, the first private key, the second private key and ownership mark by terminal
Know;
Secondly, the server confirms the identity of the terminal by the home identity;Ownership described herein
Mark refers to cell-phone number.
Finally, if it is confirmed that correctly, the server will be recombinated to obtain institute to first private key and the second private key
State private key, and first ciphertext is decrypted to obtain the first password by the private key and sends back the terminal, with
The terminal is set to recombinate to obtain the user cipher by the first password and the second local password, and it is close by the user
Code perform login next time transactional operation.
As shown in fig. 7, in the alternative embodiment of the application, its backup method can be included, the backup method is such as
Under:
When private key fission is sent the terminal iidentification to the clothes by the terminal for the first private key and the second private key
During business device, the server receives the terminal iidentification that the terminal is sent, and is identified registration by the terminal iidentification;
After succeeding in registration, server generation server identification code, storage of public keys, storage private key, server path and
Upload voucher;
The server with uploading voucher, sends the server path to the end together with the storage of public keys
End, so that wallet file encryption is uploaded to high in the clouds by the terminal by the storage of public keys, the high in the clouds receives encrypted institute
The high in the clouds identification code is generated after stating wallet file, and the high in the clouds identification code is sent to the terminal, the terminal receives
After the high in the clouds identification code, the high in the clouds identification code is sent back into the server;
The server receives and carries out verification matching with the local server identification code after the high in the clouds identification code,
If successful match updates the path of the wallet file.
As shown in figure 8, in the alternative embodiment of the application, its restoration methods can be included, the restoration methods are such as
Under:
After the server receives the terminal iidentification that the terminal is sent, the terminal is confirmed by the terminal iidentification
Identity;
When identity validation is correct, the server downloads the encryption wallet file for being stored in the high in the clouds;
The server is decrypted by the wallet file of the storage private key pair encryption, and by the institute after decryption
State wallet file to send to the terminal, so that the terminal performs recovery operation.
First, after the server receives the terminal iidentification that the terminal is sent, by described in terminal iidentification confirmation
The identity of terminal;
Secondly, when identity validation is correct, the server downloads the encryption wallet file for being stored in the high in the clouds;
Finally, the server is decrypted by the wallet file of the storage private key pair encryption, and will decryption
The wallet file afterwards is sent to the terminal, so that the terminal performs recovery operation.General again will decryption wallet hair
It is actual often first to preset a rescue mailbox during giving the terminal.First it is sent to the rescue mailbox.The end
End is gone to download the decryption wallet file in rescue mailbox again, imports in terminal program.
The encrypted method of row that another embodiment of the application provides, including:
As shown in fig. 7, generate high in the clouds identification code after the encrypted encryption wallet file of high in the clouds receiving terminal, and by the cloud
End identification code is sent to the terminal, so that the terminal receives the high in the clouds identification code and is sent to server, the server
Receive and carry out verification matching with the local server identification code after the high in the clouds identification code, if successful match updates institute
State the path of wallet file.
High in the clouds mainly occurs with the identity of a memory in the process, and the password that passed through is placed on the server
In terminal, prevent from being stolen.
Using example:
Below completely encrypting, decrypting, backing up, is according to its course of work, its specific work is described in detail in recovery process
It is as follows to make process:
As shown in figure 3, when user is being registered in terminal first, user cipher first can be sent by server,
Because this operation also without triggering fission log in transactional operation condition because having not been entered into program at this time, can not also
Carry out log in transactional operation.Operation is unregistered when the initial user by first time is finally exited into program.Note herein
Pin operation for described in step 101 terminate programmed instruction or log in a triggering node behaviour after transactional operation
Make.
Step a:When the terminal performs END instruction, then the user cipher, public key, private key, Yong Humi are generated
First password, the second password that code includes are two string random characters, and public key, private key are then the public private key pairs of rsa.Its is public and private
The algorithm of key passes through ECC (elliptic curve) using the public and private key of user.Afterwards,
Step b:The private key can carry out fission generation first private key, the second private key;
Step c:The terminal is encrypted the first password by the public key to obtain the first ciphertext, herein plus
Close is to add salt encryption, and ciphering process hereafter is plus salt is encrypted, and password and salt are similarly generated after decryption, is no longer specially gone to live in the household of one's in-laws on getting married
State, encrypted first ciphertext, sends to server together with first private key.
Step d:When terminal receive log in next time trading instruction when, the terminal sends out cell-phone number and the second private key
Send to the server;Cell-phone number at this time is above-mentioned home identity.
Step e:After the server receives the first private key, the second private key and the first ciphertext, pass through the first private key and institute
The second private key is stated to be reassembled as the private key and the first ciphertext is decrypted.First password is reduced to short message verification code
Form passes terminal back.
Step f:The terminal and the second local password be combined be reduced to the user cipher perform log in hand over
It is easy to operate.The server at this time takes out the private key of this operation.
For user in data on operational chain in the terminal, after identifying code and input validation is received, terminal is automatic
Wallet password is replaced, and backs up and replace cryptoAPI to server calls wallet, transmits the line for logging in short message verification code next time
Rope, on subsequent operation chain during data short message verification code acquisition, this is one-time pad.
Its backup procedure is as follows:
When private key fission is sent the terminal iidentification to the clothes by the terminal for the first private key and the second private key
During business device, its backup procedure starts:
The terminal sends terminal iidentification to the server, and terminal iidentification at this time is user name, the server life
Into server identification code for one with the associated key of path.Also create at the same time and upload voucher, the storage of public keys, storage
Private key, and key, upload voucher, storage of public keys are sent to terminal;
Wallet file is encrypted with the storage of public keys in the terminal and is uploaded to high in the clouds.Described in the generation of high in the clouds
High in the clouds identification code, the high in the clouds identification code are a key of oneself of high in the clouds generation, are carried out with the key of above-mentioned server generation
Matching, successful match then update user's wallet path.
As shown in figure 4, the terminal receives the reduction instruction that user sends, reduction instruction be in program give for change wallet by
Button, the terminal send user name to the server.The server, which receives to start after user name to download high in the clouds, to be added
Wallet file after close, and the storage private key by locally generating is decrypted, finally, the server is by after decryption
Wallet file is sent to the memory module.The memory module is default one rescue mailbox.
The wallet file after the terminal downloads decryption completes restoring operation after voluntarily importing.
Authentication process as described in Figure 9, the terminal send URI, http method, user name to the server,
Ticket is obtained by server to send to terminal.The terminal signs Ticket by private key, together with business datum
Send the Ticket to sign to the server, the server inspection and whether current interface matches, by inspection result industry
Result of being engaged in or authentification failure return to the terminal.
Explanation of nouns:
The definition of block chain:
Narrow sense:Using cryptographic algorithm and chain type relational structure tissue data block, safeguarded jointly by participation node to ensure
The hardly possible final consistency distributed data storing technology changed of data.
Broad sense:In the incredible peer-to-peer network of all nodes, by knowing together algorithm and game theory establishes faith mechanism,
And finally realize the communication system of node data storage uniformity.
The characteristics of block chain:
Block chain technology makes it because of the four characteristics with " decentralization, distributed keep accounts, can not distort, go to trust "
The Floor layer Technology of all kinds of financial scenarios is highly suitable as, help promotes assets circulation, reduces transaction cost, standard operation stream
Journey, improve business efficiency, finance is become more safety transparent.
Block chain technology realizes " decentralization " by distributed node, is realized by the common recognition mechanism between distributed node
Distribution book keeping operation, can not be distorted by cryptography chain structure and electronic signature realization, it is achieved thereby that going the equity of trustization
Book keeping operation network.
Block chain wallet technology:
Block chain wallet is designed using decentralization, and the public and private key of user is generated by ECC (elliptic curve), and private key is used
In information signature, public key is used to verifying and indicating address, private key for user of user's wallet storage for information signature, user password
Private key for user, protection private key safety are encrypted using AES enciphering and deciphering algorithms.
The public and private key of user:
The public and private key of user is generated by ECC (elliptic curve), and private key is used for information signature, and public key is used to verify and mark
Show address, server will not store user password and private key for user, only store client public key, password and private key and voluntarily protected by user
Pipe.
Wallet password:
Encryption for private key stores, using AES enciphering and deciphering algorithms protection private key safety.
The public and private keys of Rsa:
A kind of asymmetric cryptographic algorithm, RSA can generate two keys, any one can be used for public key, then another
A is exactly the private key that you must protect;Using one of encryption, then need to be decrypted with another.
Cloud storage uploads voucher:Cloud storage client needs first to obtain from server-side before uploading uploads voucher, and is uploading
A part of the voucher as request content will be uploaded during resource.Request without voucher or with illegal voucher will be rejected.
Salt is added to encrypt:It is a kind of cipher mode to password system log to add salt encryption, and the mode that it is realized is will be each
A password is same to be called " " the n positions random number of (salt) is associated salt.
Wallet backup table:
One-time pad:
Field name | Description | Remarks |
phone | Major key | |
encode_pass_b | Have been subjected to and add the encrypted close-B of salt | |
private_x | The half RSA private keys X that client transmits | |
old_pass_b | Old have been subjected to adds the encrypted password B of salt | Verification-use |
As shown in Figure 10, present invention also provides a kind of intelligent terminal, including:
One Transmit-Receive Unit, terminates programmed instruction for receiving;
One generation unit, for generating user cipher, public key and private key, the user cipher includes first password and second
Password;
One fission recomposition unit, for being the first private key, the second private key by private key fission;
One encryption unit, for the first password to be encrypted by public key to obtain the first ciphertext;
The Transmit-Receive Unit, is additionally operable to together with first private key send first ciphertext to server, also uses
In receive log in trading instruction the identity of the terminal is confirmed after the home identity so that the server receives,
After confirming correctly, the private key is obtained after the first private key of reception and the second private key are recombinated, and pass through the private key pair
First ciphertext is decrypted to obtain the first password and sends back the terminal;
The Transmit-Receive Unit, is additionally operable to the first password that the server is sent;
The fission recomposition unit, is additionally operable to recombinate to obtain with local second password by the first password described
User cipher;
It is further included,
One execution unit, transactional operations are logged in for being performed by user cipher.
Further,
The Transmit-Receive Unit, is additionally operable to send terminal iidentification to the server, so that the server passes through the end
End mark is identified registration, and after identifier register success, the server generation server path, upload voucher, server knowledge
Other code, storage of public keys and storage private key, the server send out the server path therein, upload voucher and storage of public keys
Give the terminal;
The Transmit-Receive Unit, is additionally operable to receive the server path, upload voucher and storage that the server is sent
Public key;
The encryption unit, for the terminal by the storage of public keys by wallet file encryption;
The Transmit-Receive Unit, is additionally operable to the wallet file after the terminal encryption and is sent to high in the clouds, so that the high in the clouds connects
High in the clouds identification code is generated after receiving the encrypted wallet file, and the high in the clouds identification code is sent back into the terminal.
The Transmit-Receive Unit, is additionally operable to receive the high in the clouds identification code and is sent to the server, so that the server
Receive and carry out verification matching with the local server identification code after the high in the clouds identification code, if successful match updates institute
State the path of wallet file.
Further,
The Transmit-Receive Unit, is additionally operable to receive reduction instruction, sends the terminal iidentification and send to the server, so that
The server confirms the identity of the terminal by the terminal iidentification, and after confirming successfully, the server is downloaded
The encryption wallet file in high in the clouds, and being decrypted by local storage private key, the server is by the wallet after decryption
File is sent to the terminal;
The Transmit-Receive Unit, is additionally operable to the wallet file after receiving and deciphering;
The execution unit, is additionally operable to the terminal and performs recovery operation.
As shown in figure 11, another intelligent apparatus that the application provides, including:
One Transmit-Receive Unit, for receiving the first ciphertext, the first private key, the second private key and home identity, first private key,
After second private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal
The first password that public key generates in user cipher the terminal is generated after END instruction to be encrypted and obtain, the user cipher
Further include the second password;
One confirmation unit, confirms the identity of the terminal by the home identity for server;
One fission recomposition unit, for if it is confirmed that correctly, to first private key and the second private key will recombinate
To the private key,;
One decryption unit, is decrypted to obtain the first password by the private key to first ciphertext;
The Transmit-Receive Unit, is additionally operable to send first password to the terminal, so that the terminal is by the first password
Recombinate to obtain the user cipher with the second local password, and by the user cipher perform login next time transaction
Operation.
Further,
The Transmit-Receive Unit, be additionally operable to that the private key is fissioned when the terminal sends institute for the first private key and the second private key
When stating terminal iidentification to the server, the server receives the terminal iidentification that the terminal is sent;
It is further included,
One registering unit, for being identified registration by the terminal iidentification;
One generation unit, after succeeding in registration, the server generation server identification code, storage of public keys, storage are private
Key, server path and upload voucher;
The Transmit-Receive Unit, is additionally operable to the server by the server path with uploading voucher, is deposited together with described
Storage public key is sent to the terminal, so that wallet file encryption is uploaded to high in the clouds by the terminal by the storage of public keys, institute
State after high in the clouds receives the encrypted wallet file and generate the high in the clouds identification code, and the high in the clouds identification code is sent to described
Terminal, after the terminal receives the high in the clouds identification code, the server is sent back by the high in the clouds identification code;
The Transmit-Receive Unit, is additionally operable to the server and receives the server after the high in the clouds identification code and local
Identification code carries out verification matching, if successful match updates the path of the wallet file.
Further,
The Transmit-Receive Unit, is additionally operable to receive the terminal iidentification that the terminal is sent, and sends the wallet text after decryption
Part is to the memory module;
It is further included,
One confirmation unit, the identity of the terminal is confirmed for the server by the terminal iidentification;
One download unit, for when identity validation is correct, the server to download the encryption money for being stored in the high in the clouds
APMB package;
One decryption unit, for being decrypted by the wallet file of the storage private key pair encryption;
The Transmit-Receive Unit, for sending the wallet file after decryption to the terminal, so that the terminal is held
Row recovery operation.
As shown in figure 12, another intelligent apparatus that the application provides, including:
One Transmit-Receive Unit, the encryption wallet file encrypted for receiving terminal;
One generation unit, for generating high in the clouds identification code;
The Transmit-Receive Unit, is additionally operable to the high in the clouds identification code being sent to the terminal, so that the terminal receives institute
State high in the clouds identification code and be sent to server, the server is known after receiving the high in the clouds identification code with the local server
Other code carries out verification matching, if successful match updates the path of the wallet file.
Although disclosed herein embodiment as above, the content be only readily appreciate the present invention and use
Embodiment, is not limited to the present invention.Technical staff in any fields of the present invention, is taken off not departing from the present invention
On the premise of the spirit and scope of dew, any modification and change, but the present invention can be carried out in the form and details of implementation
Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.
Claims (14)
- A kind of 1. encryption method, it is characterised in that the described method includes:When terminal, which receives, terminates programmed instruction, generation user cipher, public key and private key, the user cipher include first password With the second password;Private key fission is the first private key and the second private key by the terminal;The terminal is encrypted the first password by the public key to obtain the first ciphertext, together with first private key Send to server;The terminal receive log in next time trading instruction when, by the home identity of the terminal and second private key send to The server, so as to confirm after the server reception home identity to the identity of the terminal, confirms correct Afterwards, the private key is obtained after the first private key of reception and the second private key being recombinated, and by the private key to the first ciphertext It is decrypted to obtain the first password and sends back the terminal;The terminal receives the first password that the server is sent, and the first password and local described second is close Code restructuring obtains the user cipher;The terminal performed by the user cipher after restructuring log in transactional operation.
- 2. encryption method according to claim 1, it is characterised in that it further includes its backup method,The backup method is as follows:After it is the first private key and the second private key that the terminal is by private key fission, the terminal sends terminal iidentification to described Server, so that the server is identified registration by the terminal iidentification, after identifier register success, the server life Into server path, voucher, server identification code, storage of public keys and storage private key are uploaded, the server will be therein described Server path, upload voucher and storage of public keys are sent to the terminal;The terminal receives the server path, upload voucher and the storage of public keys that the server is sent;The terminal by wallet file encryption and is sent to high in the clouds by the storage of public keys, so that high in the clouds reception is encrypted High in the clouds identification code is generated after the wallet file, and the high in the clouds identification code is sent back into the terminal;The terminal receives the high in the clouds identification code and is sent to the server, so that the server receives the high in the clouds and knows Verification matching is carried out with the local server identification code after other code, if successful match updates the road of the wallet file Footpath.
- 3. encryption method according to claim 2, it is characterised in that it further includes its restoration methods,The restoration methods are as follows:The terminal receives reduction instruction, and the terminal iidentification is sent to the server, so that the server passes through The terminal iidentification confirms the identity of the terminal, and after confirming successfully, the server downloads the encryption wallet in high in the clouds File, and be decrypted by local storage private key, the server sends the wallet file after decryption to described Terminal;Recovery operation is performed after the wallet file after the terminal receiving and deciphering.
- A kind of 4. encryption method, it is characterised in that the described method includes:Server receive terminal transmission the first ciphertext, the first private key, the second private key and home identity, first private key, After second private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal The first password that public key generates in user cipher the terminal is generated after END instruction to be encrypted and obtain, the user cipher Further include the second password;The server confirms the identity of the terminal by the home identity;If it is confirmed that correct, the server will recombinate first private key and the second private key to obtain the private key, and First ciphertext is decrypted to obtain the first password by the private key and sends back the terminal, so that the terminal Second password of the first password and local is recombinated to obtain the user cipher, and it is next by user cipher execution Secondary login transactional operation.
- 5. encryption method according to claim 4, it is characterised in that it further includes its backup method:The backup method is as follows:When private key fission is sent the terminal iidentification to the server by the terminal for the first private key and the second private key When, the server receives the terminal iidentification that the terminal is sent, and is identified registration by the terminal iidentification;After succeeding in registration, server generation server identification code, storage of public keys, storage private key, server path and the upload Voucher;The server is by the server path and uploads voucher, is sent together with the storage of public keys to the terminal, with Make the terminal that wallet file encryption are uploaded to high in the clouds by the storage of public keys, the high in the clouds receives the encrypted wallet The high in the clouds identification code is generated after file, and the high in the clouds identification code is sent to the terminal, the terminal receives the cloud After holding identification code, the high in the clouds identification code is sent back into the server;The server receives and carries out verification matching with the local server identification code after the high in the clouds identification code, if Successful match updates the path of the wallet file.
- 6. encryption method according to claim 5, it is characterised in that it further includes its restoration methods,The restoration methods are as follows:After the server receives the terminal iidentification that the terminal is sent, the body of the terminal is confirmed by the terminal iidentification Part;When identity validation is correct, the server downloads the encryption wallet file for being stored in the high in the clouds;The server is decrypted by the wallet file of the storage private key pair encryption, and by the money after decryption APMB package is sent to the terminal, so that the terminal performs recovery operation.
- A kind of 7. encryption method, it is characterised in that the described method includes:High in the clouds identification code is generated after the encrypted encryption wallet file of high in the clouds receiving terminal, and the high in the clouds identification code is sent to The terminal, so that the terminal receives the high in the clouds identification code and is sent to server, the server receives the high in the clouds Verification matching is carried out with the local server identification code after identification code, if successful match updates the road of the wallet file Footpath.
- A kind of 8. intelligent apparatus, it is characterised in that including:One Transmit-Receive Unit, terminates programmed instruction for receiving;One generation unit, for generating user cipher, public key and private key, the user cipher is close including first password and second Code;One fission recomposition unit, for being the first private key, the second private key by private key fission;One encryption unit, for the first password to be encrypted by public key to obtain the first ciphertext;The Transmit-Receive Unit, is additionally operable to together with first private key send first ciphertext to server, is additionally operable to connect Receive log in trading instruction the identity of the terminal is confirmed after the home identity so that the server receives, confirmed After correct, the private key is obtained after the first private key of reception and the second private key are recombinated, and by the private key to first Ciphertext is decrypted to obtain the first password and sends back the terminal;The Transmit-Receive Unit, is additionally operable to receive the first password that the server is sent;The fission recomposition unit, is additionally operable to recombinate to obtain the user by the first password and local second password Password;It is further included,One execution unit, transactional operations are logged in for being performed by user cipher.
- 9. intelligent apparatus according to claim 8, it is characterised in that:The Transmit-Receive Unit, is additionally operable to send terminal iidentification to the server, so that the server passes through the terminal mark Knowledge is identified registration, after identifier register success, the server generation server path, upload voucher, server identification code, The server path therein, upload voucher and storage of public keys are sent to by storage of public keys and storage private key, the server The terminal;The Transmit-Receive Unit, is additionally operable to receive the server path, upload voucher and storage of public keys that the server is sent;The encryption unit, for the terminal by the storage of public keys by wallet file encryption;The Transmit-Receive Unit, is additionally operable to the wallet file after the terminal encryption and is sent to high in the clouds, add so that the high in the clouds receives High in the clouds identification code is generated after the close wallet file, and the high in the clouds identification code is sent back into the terminal.The Transmit-Receive Unit, is additionally operable to receive the high in the clouds identification code and is sent to the server, so that the server receives Verification matching is carried out with the local server identification code after to the high in the clouds identification code, if successful match updates the money The path of APMB package.
- 10. intelligent apparatus according to claim 9, it is characterised in that:The Transmit-Receive Unit, is additionally operable to receive reduction instruction, sends the terminal iidentification and send to the server, so that described Server confirms the identity of the terminal by the terminal iidentification, and after confirming successfully, the server downloads high in the clouds Encryption wallet file, and be decrypted by local storage private key, the server is by the wallet file after decryption Send to the terminal;The Transmit-Receive Unit, is additionally operable to the wallet file after receiving and deciphering;The execution unit, is additionally operable to the terminal and performs recovery operation.
- A kind of 11. intelligent apparatus, it is characterised in that:It includes,One Transmit-Receive Unit, for receiving the first ciphertext, the first private key, the second private key and home identity, first private key, second After private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal to be terminated Generate the first password that public key generates in user cipher the terminal after instruction to be encrypted and obtain, the user cipher also wraps Include the second password;One confirmation unit, confirms the identity of the terminal by the home identity for server;One fission recomposition unit, for if it is confirmed that correctly, will be recombinated to obtain institute to first private key and the second private key State private key,;One decryption unit, is decrypted to obtain the first password by the private key to first ciphertext;The Transmit-Receive Unit, is additionally operable to send first password to the terminal, so that the terminal is by the first password and originally Second password on ground recombinates to obtain the user cipher, and by the user cipher perform login next time transactional operation.
- 12. intelligent apparatus according to claim 11, it is characterised in that:The Transmit-Receive Unit, is additionally operable to when private key fission is sent the end by the terminal for the first private key and the second private key When end mark is to the server, the server receives the terminal iidentification that the terminal is sent;It is further included,One registering unit, for being identified registration by the terminal iidentification;One generation unit, after succeeding in registration, the server generation server identification code, storage of public keys, storage private key, clothes Business device path and upload voucher;The Transmit-Receive Unit, is additionally operable to the server by the server path with uploading voucher, public together with the storage Key is sent to the terminal, so that wallet file encryption is uploaded to high in the clouds, the cloud by the terminal by the storage of public keys End generates the high in the clouds identification code after receiving the encrypted wallet file, and the high in the clouds identification code is sent to the end End, after the terminal receives the high in the clouds identification code, the server is sent back by the high in the clouds identification code;The Transmit-Receive Unit, is additionally operable to identify with the local server after the server receives the high in the clouds identification code Code carries out verification matching, if successful match updates the path of the wallet file.
- 13. intelligent apparatus according to claim 12, it is characterised in that:The Transmit-Receive Unit, is additionally operable to receive the terminal iidentification that the terminal is sent, and sends the wallet file after decryption extremely The memory module;The confirmation unit, the identity of the terminal is confirmed for the server by the terminal iidentification;It is further included,One download unit, for when identity validation is correct, the server to download the encryption wallet text for being stored in the high in the clouds Part;One decryption unit, for being decrypted by the wallet file of the storage private key pair encryption;The Transmit-Receive Unit, for sending the wallet file after decryption to the terminal, so that terminal execution is extensive Multiple operation.
- A kind of 14. intelligent apparatus, it is characterised in that including:One Transmit-Receive Unit, the encryption wallet file encrypted for receiving terminal;One generation unit, for generating high in the clouds identification code;The Transmit-Receive Unit, is additionally operable to the high in the clouds identification code being sent to the terminal, so that the terminal receives the cloud End identification code is sent to server, the server receive after the high in the clouds identification code with the local server identification code Verification matching is carried out, if successful match updates the path of the wallet file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710655465.4A CN107920052B (en) | 2017-08-02 | 2017-08-02 | Encryption method and intelligent device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710655465.4A CN107920052B (en) | 2017-08-02 | 2017-08-02 | Encryption method and intelligent device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107920052A true CN107920052A (en) | 2018-04-17 |
CN107920052B CN107920052B (en) | 2020-11-17 |
Family
ID=61898542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710655465.4A Expired - Fee Related CN107920052B (en) | 2017-08-02 | 2017-08-02 | Encryption method and intelligent device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107920052B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109118187A (en) * | 2018-08-30 | 2019-01-01 | 杭州链汇通区块链科技有限公司 | Restoration methods, device and the computer readable storage medium of block chain wallet |
CN109389397A (en) * | 2018-09-28 | 2019-02-26 | 北京金山安全软件有限公司 | Hardware wallet |
CN110492990A (en) * | 2018-05-15 | 2019-11-22 | 华为技术有限公司 | Private key management method, apparatus and system under block chain scene |
CN110493261A (en) * | 2019-09-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Identifying code acquisition methods, client, server and storage medium based on block chain |
CN110912701A (en) * | 2018-09-14 | 2020-03-24 | 宏达国际电子股份有限公司 | Social key recovery method and related device |
CN111242613A (en) * | 2020-01-09 | 2020-06-05 | 中信银行股份有限公司 | Wallet information management method and device based on online banking system and electronic equipment |
CN114257387A (en) * | 2020-09-11 | 2022-03-29 | 中移物联网有限公司 | Login authentication method and device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101123495A (en) * | 2007-09-07 | 2008-02-13 | 农革 | A data encryption, decryption system and method |
CN101719205A (en) * | 2009-12-25 | 2010-06-02 | 国家广播电影电视总局电影数字节目管理中心 | Digital copyright management method and system |
CN104468627A (en) * | 2014-12-30 | 2015-03-25 | 成都三零瑞通移动通信有限公司 | Data encryption method and system conducting terminal data backup through server |
CN104615691A (en) * | 2015-01-24 | 2015-05-13 | 刘勇 | Mobile terminal and data storage method |
WO2015142765A1 (en) * | 2014-03-17 | 2015-09-24 | Coinbase, Inc | Bitcoin host computer system |
US20150363777A1 (en) * | 2014-06-16 | 2015-12-17 | Bank Of America Corporation | Cryptocurrency suspicious user alert system |
US20160098723A1 (en) * | 2014-10-01 | 2016-04-07 | The Filing Cabinet, LLC | System and method for block-chain verification of goods |
CN106533675A (en) * | 2016-12-19 | 2017-03-22 | 北京洋浦伟业科技发展有限公司 | Digital signature method and system |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN106548345A (en) * | 2016-12-07 | 2017-03-29 | 北京信任度科技有限公司 | The method and system of block chain private key protection are realized based on Secret splitting |
CN106788989A (en) * | 2016-11-30 | 2017-05-31 | 华为技术有限公司 | A kind of method and apparatus for setting up safe encryption channel |
-
2017
- 2017-08-02 CN CN201710655465.4A patent/CN107920052B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101123495A (en) * | 2007-09-07 | 2008-02-13 | 农革 | A data encryption, decryption system and method |
CN101719205A (en) * | 2009-12-25 | 2010-06-02 | 国家广播电影电视总局电影数字节目管理中心 | Digital copyright management method and system |
WO2015142765A1 (en) * | 2014-03-17 | 2015-09-24 | Coinbase, Inc | Bitcoin host computer system |
US20150363777A1 (en) * | 2014-06-16 | 2015-12-17 | Bank Of America Corporation | Cryptocurrency suspicious user alert system |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
US20160098723A1 (en) * | 2014-10-01 | 2016-04-07 | The Filing Cabinet, LLC | System and method for block-chain verification of goods |
CN104468627A (en) * | 2014-12-30 | 2015-03-25 | 成都三零瑞通移动通信有限公司 | Data encryption method and system conducting terminal data backup through server |
CN104615691A (en) * | 2015-01-24 | 2015-05-13 | 刘勇 | Mobile terminal and data storage method |
CN106788989A (en) * | 2016-11-30 | 2017-05-31 | 华为技术有限公司 | A kind of method and apparatus for setting up safe encryption channel |
CN106548345A (en) * | 2016-12-07 | 2017-03-29 | 北京信任度科技有限公司 | The method and system of block chain private key protection are realized based on Secret splitting |
CN106533675A (en) * | 2016-12-19 | 2017-03-22 | 北京洋浦伟业科技发展有限公司 | Digital signature method and system |
Non-Patent Citations (1)
Title |
---|
何蒲,于戈,张岩峰,鲍玉斌: "区块链技术与应用前瞻综述", 《计算机科学》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110492990A (en) * | 2018-05-15 | 2019-11-22 | 华为技术有限公司 | Private key management method, apparatus and system under block chain scene |
CN110492990B (en) * | 2018-05-15 | 2021-10-15 | 华为技术有限公司 | Private key management method, device and system under block chain scene |
CN109118187A (en) * | 2018-08-30 | 2019-01-01 | 杭州链汇通区块链科技有限公司 | Restoration methods, device and the computer readable storage medium of block chain wallet |
CN109118187B (en) * | 2018-08-30 | 2021-07-23 | 神州数码融信软件有限公司 | Block chain wallet recovery method and device and computer readable storage medium |
CN110912701A (en) * | 2018-09-14 | 2020-03-24 | 宏达国际电子股份有限公司 | Social key recovery method and related device |
CN110912701B (en) * | 2018-09-14 | 2022-09-02 | 宏达国际电子股份有限公司 | Social key recovery method and related device |
CN109389397A (en) * | 2018-09-28 | 2019-02-26 | 北京金山安全软件有限公司 | Hardware wallet |
CN109389397B (en) * | 2018-09-28 | 2021-11-26 | 北京金山安全软件有限公司 | Hardware wallet |
CN110493261A (en) * | 2019-09-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Identifying code acquisition methods, client, server and storage medium based on block chain |
CN111242613A (en) * | 2020-01-09 | 2020-06-05 | 中信银行股份有限公司 | Wallet information management method and device based on online banking system and electronic equipment |
CN114257387A (en) * | 2020-09-11 | 2022-03-29 | 中移物联网有限公司 | Login authentication method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107920052B (en) | 2020-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210258162A1 (en) | Methods for secure cryptogram generation | |
CN107920052A (en) | A kind of encryption method and intelligent apparatus | |
JP6514218B2 (en) | Client authentication using social data | |
US8833648B1 (en) | Dynamic credit card security code via mobile device | |
CN103297403B (en) | A kind of method and system for realizing dynamic cipher verification | |
US9160732B2 (en) | System and methods for online authentication | |
CN100432889C (en) | System and method providing disconnected authentication | |
WO2022037596A1 (en) | Combined signature and signature verification method and system, and storage medium | |
US20090187980A1 (en) | Method of authenticating, authorizing, encrypting and decrypting via mobile service | |
CN111275419B (en) | Block chain wallet signature right confirming method, device and system | |
CN108647964A (en) | A kind of block chain data processing method, device and computer readable storage medium | |
US10044684B2 (en) | Server for authenticating smart chip and method thereof | |
US10147092B2 (en) | System and method for signing and authenticating secure transactions through a communications network | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
CN105871553A (en) | Identity-free three-factor remote user authentication method | |
CN109981255A (en) | The update method and system of pool of keys | |
CN104125230B (en) | A kind of short message certification service system and authentication method | |
CN109728896A (en) | A kind of incoming call certification and source tracing method and process based on block chain | |
US20230259899A1 (en) | Method, participant unit, transaction register and payment system for managing transaction data sets | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
US20200244457A1 (en) | Blockchain intelligent security implementation | |
CN108537537A (en) | A kind of safe and reliable digital cash Wallet System | |
CN111355591A (en) | Block chain account safety management method based on real-name authentication technology | |
CN109754241A (en) | A kind of hard money packet and the verification method based on hard money packet | |
CN109510820A (en) | A kind of block chain cryptographic methods that decentralization can customize |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201117 Termination date: 20210802 |
|
CF01 | Termination of patent right due to non-payment of annual fee |