Nothing Special   »   [go: up one dir, main page]

CN107920052A - A kind of encryption method and intelligent apparatus - Google Patents

A kind of encryption method and intelligent apparatus Download PDF

Info

Publication number
CN107920052A
CN107920052A CN201710655465.4A CN201710655465A CN107920052A CN 107920052 A CN107920052 A CN 107920052A CN 201710655465 A CN201710655465 A CN 201710655465A CN 107920052 A CN107920052 A CN 107920052A
Authority
CN
China
Prior art keywords
terminal
server
private key
identification code
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710655465.4A
Other languages
Chinese (zh)
Other versions
CN107920052B (en
Inventor
解旻
孙文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tang Sheng (beijing) Technology Co Ltd
Original Assignee
Tang Sheng (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tang Sheng (beijing) Technology Co Ltd filed Critical Tang Sheng (beijing) Technology Co Ltd
Priority to CN201710655465.4A priority Critical patent/CN107920052B/en
Publication of CN107920052A publication Critical patent/CN107920052A/en
Application granted granted Critical
Publication of CN107920052B publication Critical patent/CN107920052B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0658Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention is a kind of encryption method and intelligent terminal.The described method includes;User, which can click on, obtains identifying code button, the local remaining half private key generated after last time operation can be submitted to submit to server, half private key in server splicing last time presence server obtains complete private key, the last information acquisition identifying code submitted of decrypted user, by short message sending on user mobile phone;The mobile phone identifying code of acquisition is spliced on the half password generated before by user, obtain complete wallet password, unlock wallet, backup wallet, wallet needs to arrive first server service business acquisition cloud storage upload voucher and wallet file encryption public key when backing up, wallet file encryption is uploaded, the key that cloud storage returns, notice tap backup wallet cloud storage address are obtained after success;Solve and while can ensure user local wallet file security, solve the problems, such as the backup of wallet file, recover.

Description

A kind of encryption method and intelligent apparatus
Technical field
The present invention relates to the technical field of block chain, refers in particular to a kind of encryption method and intelligent apparatus.
Background technology
At present, in conventional center system, it is excessive to trust cost all in presence server for user security information.Then go out In existing block chain wallet technology, user's wallet is stored in user local, server only preserves the use for being able to verify that user identity Family public key, although solve trust crisis, and the opaque problem of data, once user's wallet file loses or password Pass into silence, user can not just prove the identity of oneself, and the money in account, which can only just look at, not to be taken not come out again.Conventional centerization is used Family system has the disadvantages that:
Threatened 1. user information safety and privacy exist.Due to all data all on a centralized server, its pole is caused It is vulnerable to hacking, and cause fund theft and privacy of user leakage.
2. trust is of high cost, in centralized system, user, which will give tacit consent to, believes that system is believable, if system operator Do evil, user data may the person of being managed distort, or even theft.
3. data are opaque, in centralized system, data are opaque.
Traditional decentralization block chain wallet technology has the disadvantages that:
1. user needs to undertake backup wallet task.User's wallet file needs user oneself to preserve, once wallet file Lose, user can not just access to your account, and let alone bring back the money in account.
2. user needs to undertake to forget password risk, user needs to remember wallet password, once user forgets password, user Just take less than the secret key for proving its identity, the money of user account, which can only just look at, not to be taken not come out.
3. user password is dangerous there are Brute Force, user password is verified as local verification, and is limited without number, Hei Keke Try out password by force in a manner of by Brute Force, the block chain assets of user may suffer a loss.
So it is badly in need of a kind of encryption method and intelligent apparatus, to solve to ensure user local wallet file security While, solve the problems, such as the backup of wallet file, recover.
The content of the invention
The technical problem to be solved in the present invention is while can ensure user local wallet file security, solve The backup of wallet file, recover problem.
Above-mentioned technical problem is solved, the present invention provides encryption method and is;
When terminal, which receives, terminates programmed instruction, generation user cipher, public key and private key, the user cipher include first Password and the second password;
Private key fission is the first private key and the second private key by the terminal;
The terminal is encrypted the first password by the public key to obtain the first ciphertext, together with described first Private key is sent to server;
The terminal receive log in next time trading instruction when, the home identity of the terminal and second private key are sent out Send to the server, so as to confirm after the server reception home identity to the identity of the terminal, confirm After correct, the private key is obtained after the first private key of reception and the second private key are recombinated, and by the private key to first Ciphertext is decrypted to obtain the first password and sends back the terminal;
The terminal receives the first password that the server is sent, by the first password and local described the Two passwords recombinate to obtain the user cipher;
The terminal performed by the user cipher after restructuring log in transactional operation.
Present invention also offers another encryption method, including,
Server receives the first ciphertext, the first private key, the second private key and the home identity of terminal transmission, and described first is private After key, the second private key receive END instruction for the terminal, generation private key fission forms, and first ciphertext connects for the terminal Generation public key is encrypted the first password in terminal generation user cipher and obtains after receiving END instruction, and the user is close Code further includes the second password;
The server confirms the identity of the terminal by the home identity, if it is confirmed that correctly, it is described Server will recombinate first private key and the second private key to obtain the private key, and by the private key to described first Ciphertext, which is decrypted to obtain the first password, sends back the terminal so that the terminal by the first password with it is local Second password recombinates to obtain the user cipher, and by the user cipher perform login next time transactional operation.
Present invention also offers another encryption method, including,
High in the clouds identification code is generated after the encrypted encryption wallet file of high in the clouds receiving terminal, and the high in the clouds identification code is sent out The terminal is given, so that the terminal receives the high in the clouds identification code and is sent to server, the server receives described Verification matching is carried out with the local server identification code after the identification code of high in the clouds, if successful match updates the wallet file Path.
The application also provides a kind of intelligent apparatus, including:
One Transmit-Receive Unit, terminates programmed instruction for receiving;
One generation unit, for generating user cipher, public key and private key, the user cipher includes first password and second Password;
One fission recomposition unit, for being the first private key, the second private key by private key fission;
One encryption unit, for the first password to be encrypted by public key to obtain the first ciphertext;
The Transmit-Receive Unit, is additionally operable to together with first private key send first ciphertext to server, also uses In receive log in trading instruction the identity of the terminal is confirmed after the home identity so that the server receives, After confirming correctly, the private key is obtained after the first private key of reception and the second private key are recombinated, and pass through the private key pair First ciphertext is decrypted to obtain the first password and sends back the terminal;
The Transmit-Receive Unit, is additionally operable to the first password that the server is sent;
The fission recomposition unit, is additionally operable to recombinate to obtain with local second password by the first password described User cipher;
It is further included,
One execution unit, transactional operations are logged in for being performed by user cipher.
Present invention also provides another intelligent apparatus, including:
One Transmit-Receive Unit, for receiving the first ciphertext, the first private key, the second private key and home identity, first private key, After second private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal The first password that public key generates in user cipher the terminal is generated after END instruction to be encrypted and obtain, the user cipher Further include the second password;
One confirmation unit, confirms the identity of the terminal by the home identity for server;
One fission recomposition unit, for if it is confirmed that correctly, to first private key and the second private key will recombinate To the private key,;
One decryption unit, is decrypted to obtain the first password by the private key to first ciphertext;
The Transmit-Receive Unit, is additionally operable to send first password to the terminal, so that the terminal is by the first password Recombinate to obtain the user cipher with the second local password, and by the user cipher perform login next time transaction Operation.
Present invention also provides another intelligent apparatus, including:
One Transmit-Receive Unit, the encryption wallet file encrypted for receiving terminal;
One generation unit, for generating high in the clouds identification code;
The Transmit-Receive Unit, is additionally operable to the high in the clouds identification code being sent to the terminal, so that the terminal receives institute State high in the clouds identification code and be sent to server, the server is known after receiving the high in the clouds identification code with the local server Other code carries out verification matching, if successful match updates the path of the wallet file.
Beneficial effects of the present invention:
1. user's entry password is designed using one-time pad, user need not remember password, will not produce the wind to forget Password Danger.
2. automated back-up wallet, the risk lost without wallet.
3. asymmetric encryption, one-time pad design are taken in wallet backup.Eliminate the risk that wallet is decrypted by violence.
4. server-side user mobile phone number and the separation storage of wallet file backup information, with server end onrelevant, it is ensured that Information security.
Brief description of the drawings
Fig. 1 is the flow chart to encryption method of one embodiment of the application;
Fig. 2 is the flow chart to encryption method of another embodiment of the application;
Fig. 3 is the flow chart to encryption method of another embodiment of the application;
Fig. 4 is the flow chart to encryption method of another embodiment of the application;
Fig. 5 is the flow chart to encryption method of another embodiment of the application;
Fig. 6 is the flow chart to encryption method of another embodiment of the application;
Fig. 7 is the flow chart to encryption method of another embodiment of the application;
Fig. 8 is the flow chart to encryption method of another embodiment of the application;
Fig. 9 is the flow chart to encryption method of another embodiment of the application;
Figure 10 is the framework map to encryption method intelligent apparatus of another embodiment of the application;
Figure 11 is the framework map to encryption method intelligent apparatus of another embodiment of the application;
Figure 12 is the framework map to encryption method intelligent apparatus of another embodiment of the application;
Embodiment:
Following embodiments are only the restrictions for clear example of the present invention, and not to embodiment of the present invention.It is right For those of ordinary skill in the art, can also make on the basis of the following description other it is various forms of change or Change, and these belong to obvious changes or variations that spirit of the invention drawn still in protection scope of the present invention it In.
A kind of encryption method, the described method includes;
As shown in Figure 1, the encrypted method of the application, including:
Step 101:When terminal, which receives, terminates programmed instruction, generation user cipher, public key and private key, the user cipher Including first password and the second password;
Step 102:Private key fission is the first private key and the second private key by the terminal;
Step 103:The terminal is encrypted the first password by the public key to obtain the first ciphertext, together with institute The first private key stated is sent to server;
Step 104:The terminal receive log in next time trading instruction when, by the home identity of the terminal and described the Two private keys are sent to the server, so as to be carried out really to the identity of the terminal after the server reception home identity Recognize, after confirming correctly, the private key is obtained after the first private key of reception and the second private key are recombinated, and pass through the private key First ciphertext is decrypted to obtain the first password and sends back the terminal;
Step 105:The terminal receives the first password that the server is sent, by the first password and local Second password recombinate to obtain the user cipher;
Step 106:The terminal performed by the user cipher after restructuring log in transactional operation.
First, when terminal, which receives, terminates programmed instruction, end programmed instruction herein is cancellation or exit instruction, is generated User cipher, public key and private key, the user cipher include first password and the second password;The first password and the second password For two string random strings, the terminal is encrypted the first password by the public key to obtain the first ciphertext, together with First private key is sent to server;When terminal receive log in trading instruction when, the home identity of the terminal and described the Two private keys are sent to the server, so as to be carried out really to the identity of the terminal after the server reception home identity Recognize, home identity herein generally refers to the cell-phone number of mobile phone, confirm it is correct after, by the first private key of reception and the second private key into The private key is obtained after row restructuring, and the first ciphertext is decrypted to obtain the first password and sent back by the private key The terminal;Encrypting and decrypting process above using salt encryption is added, generates decrypted password and salt after decryption.It is later all Encrypting and decrypting operation using adding salt to encrypt, is no longer repeated.
Secondly, the terminal receives the first password that the server is sent, by the first password and local Second password recombinates to obtain the user cipher.
Finally, the terminal performed by the user cipher after restructuring log in transactional operation.Due to user cipher Generation is instantaneous process, and in the case of other, user cipher does not store in same equipment.So Brute Force can not be into OK.
As shown in fig. 7, in the alternative embodiment of the application, it further includes its backup method, and the backup method is such as Under:
After it be the first private key and the second private key that the terminal is by private key fission, terminal transmission terminal iidentification to The server, so that the server is identified registration by the terminal iidentification, after identifier register success, the service Device generation server path, upload voucher, server identification code, storage of public keys and storage private key, and the server will be therein The server path, upload voucher and storage of public keys are sent to the terminal;
The terminal receives the server path, upload voucher and the storage of public keys that the server is sent;
The terminal by wallet file encryption and is sent to high in the clouds by the storage of public keys, adds so that the high in the clouds receives High in the clouds identification code is generated after the close wallet file, and the high in the clouds identification code is sent back into the terminal;
The terminal receives the high in the clouds identification code and is sent to the server, so that the server receives the cloud Verification matching is carried out with the local server identification code after the identification code of end, if successful match updates the wallet file Path, so far completes all backup procedures.
As shown in figure 8, in the alternative embodiment of the application, it further includes its restoration methods, and the restoration methods are such as Under:
The terminal receives reduction instruction, and the terminal iidentification is sent to the server, so that the server The identity of the terminal is confirmed by the terminal iidentification, after confirming successfully, the server downloads the encryption in high in the clouds Wallet file, and being decrypted by local storage private key, the server by the wallet file after decryption send to The terminal;
Recovery operation is performed after the wallet file after the terminal receiving and deciphering.This recovery operation is based on above-mentioned standby Used after part operation.
As shown in Fig. 2, the encrypted method of row that another embodiment of the application provides, including:
Step 201:Server receives the first ciphertext, the first private key, the second private key and the home identity of terminal transmission, institute After the first private key, the second private key are stated as terminal reception END instruction, generation private key fission forms, and first ciphertext is institute Generation public key after terminal receives END instruction is stated the first password in terminal generation user cipher is encrypted and obtains, institute State user cipher and further include the second password;
Step 202:The server confirms the identity of the terminal by the home identity,
Step 203:If it is confirmed that correct, the server will be recombinated to obtain to first private key with the second private key The private key, and first ciphertext is decrypted to obtain the first password by the private key and sends back the terminal, So that the first password and the second local password are recombinated to obtain the user cipher by the terminal, and pass through the user Password perform login next time transactional operation.
First, the server is received has sent the first ciphertext, the first private key, the second private key and ownership mark by terminal Know;
Secondly, the server confirms the identity of the terminal by the home identity;Ownership described herein Mark refers to cell-phone number.
Finally, if it is confirmed that correctly, the server will be recombinated to obtain institute to first private key and the second private key State private key, and first ciphertext is decrypted to obtain the first password by the private key and sends back the terminal, with The terminal is set to recombinate to obtain the user cipher by the first password and the second local password, and it is close by the user Code perform login next time transactional operation.
As shown in fig. 7, in the alternative embodiment of the application, its backup method can be included, the backup method is such as Under:
When private key fission is sent the terminal iidentification to the clothes by the terminal for the first private key and the second private key During business device, the server receives the terminal iidentification that the terminal is sent, and is identified registration by the terminal iidentification;
After succeeding in registration, server generation server identification code, storage of public keys, storage private key, server path and Upload voucher;
The server with uploading voucher, sends the server path to the end together with the storage of public keys End, so that wallet file encryption is uploaded to high in the clouds by the terminal by the storage of public keys, the high in the clouds receives encrypted institute The high in the clouds identification code is generated after stating wallet file, and the high in the clouds identification code is sent to the terminal, the terminal receives After the high in the clouds identification code, the high in the clouds identification code is sent back into the server;
The server receives and carries out verification matching with the local server identification code after the high in the clouds identification code, If successful match updates the path of the wallet file.
As shown in figure 8, in the alternative embodiment of the application, its restoration methods can be included, the restoration methods are such as Under:
After the server receives the terminal iidentification that the terminal is sent, the terminal is confirmed by the terminal iidentification Identity;
When identity validation is correct, the server downloads the encryption wallet file for being stored in the high in the clouds;
The server is decrypted by the wallet file of the storage private key pair encryption, and by the institute after decryption State wallet file to send to the terminal, so that the terminal performs recovery operation.
First, after the server receives the terminal iidentification that the terminal is sent, by described in terminal iidentification confirmation The identity of terminal;
Secondly, when identity validation is correct, the server downloads the encryption wallet file for being stored in the high in the clouds;
Finally, the server is decrypted by the wallet file of the storage private key pair encryption, and will decryption The wallet file afterwards is sent to the terminal, so that the terminal performs recovery operation.General again will decryption wallet hair It is actual often first to preset a rescue mailbox during giving the terminal.First it is sent to the rescue mailbox.The end End is gone to download the decryption wallet file in rescue mailbox again, imports in terminal program.
The encrypted method of row that another embodiment of the application provides, including:
As shown in fig. 7, generate high in the clouds identification code after the encrypted encryption wallet file of high in the clouds receiving terminal, and by the cloud End identification code is sent to the terminal, so that the terminal receives the high in the clouds identification code and is sent to server, the server Receive and carry out verification matching with the local server identification code after the high in the clouds identification code, if successful match updates institute State the path of wallet file.
High in the clouds mainly occurs with the identity of a memory in the process, and the password that passed through is placed on the server In terminal, prevent from being stolen.
Using example:
Below completely encrypting, decrypting, backing up, is according to its course of work, its specific work is described in detail in recovery process It is as follows to make process:
As shown in figure 3, when user is being registered in terminal first, user cipher first can be sent by server, Because this operation also without triggering fission log in transactional operation condition because having not been entered into program at this time, can not also Carry out log in transactional operation.Operation is unregistered when the initial user by first time is finally exited into program.Note herein Pin operation for described in step 101 terminate programmed instruction or log in a triggering node behaviour after transactional operation Make.
Step a:When the terminal performs END instruction, then the user cipher, public key, private key, Yong Humi are generated First password, the second password that code includes are two string random characters, and public key, private key are then the public private key pairs of rsa.Its is public and private The algorithm of key passes through ECC (elliptic curve) using the public and private key of user.Afterwards,
Step b:The private key can carry out fission generation first private key, the second private key;
Step c:The terminal is encrypted the first password by the public key to obtain the first ciphertext, herein plus Close is to add salt encryption, and ciphering process hereafter is plus salt is encrypted, and password and salt are similarly generated after decryption, is no longer specially gone to live in the household of one's in-laws on getting married State, encrypted first ciphertext, sends to server together with first private key.
Step d:When terminal receive log in next time trading instruction when, the terminal sends out cell-phone number and the second private key Send to the server;Cell-phone number at this time is above-mentioned home identity.
Step e:After the server receives the first private key, the second private key and the first ciphertext, pass through the first private key and institute The second private key is stated to be reassembled as the private key and the first ciphertext is decrypted.First password is reduced to short message verification code Form passes terminal back.
Step f:The terminal and the second local password be combined be reduced to the user cipher perform log in hand over It is easy to operate.The server at this time takes out the private key of this operation.
For user in data on operational chain in the terminal, after identifying code and input validation is received, terminal is automatic Wallet password is replaced, and backs up and replace cryptoAPI to server calls wallet, transmits the line for logging in short message verification code next time Rope, on subsequent operation chain during data short message verification code acquisition, this is one-time pad.
Its backup procedure is as follows:
When private key fission is sent the terminal iidentification to the clothes by the terminal for the first private key and the second private key During business device, its backup procedure starts:
The terminal sends terminal iidentification to the server, and terminal iidentification at this time is user name, the server life Into server identification code for one with the associated key of path.Also create at the same time and upload voucher, the storage of public keys, storage Private key, and key, upload voucher, storage of public keys are sent to terminal;
Wallet file is encrypted with the storage of public keys in the terminal and is uploaded to high in the clouds.Described in the generation of high in the clouds High in the clouds identification code, the high in the clouds identification code are a key of oneself of high in the clouds generation, are carried out with the key of above-mentioned server generation Matching, successful match then update user's wallet path.
As shown in figure 4, the terminal receives the reduction instruction that user sends, reduction instruction be in program give for change wallet by Button, the terminal send user name to the server.The server, which receives to start after user name to download high in the clouds, to be added Wallet file after close, and the storage private key by locally generating is decrypted, finally, the server is by after decryption Wallet file is sent to the memory module.The memory module is default one rescue mailbox.
The wallet file after the terminal downloads decryption completes restoring operation after voluntarily importing.
Authentication process as described in Figure 9, the terminal send URI, http method, user name to the server, Ticket is obtained by server to send to terminal.The terminal signs Ticket by private key, together with business datum Send the Ticket to sign to the server, the server inspection and whether current interface matches, by inspection result industry Result of being engaged in or authentification failure return to the terminal.
Explanation of nouns:
The definition of block chain:
Narrow sense:Using cryptographic algorithm and chain type relational structure tissue data block, safeguarded jointly by participation node to ensure The hardly possible final consistency distributed data storing technology changed of data.
Broad sense:In the incredible peer-to-peer network of all nodes, by knowing together algorithm and game theory establishes faith mechanism, And finally realize the communication system of node data storage uniformity.
The characteristics of block chain:
Block chain technology makes it because of the four characteristics with " decentralization, distributed keep accounts, can not distort, go to trust " The Floor layer Technology of all kinds of financial scenarios is highly suitable as, help promotes assets circulation, reduces transaction cost, standard operation stream Journey, improve business efficiency, finance is become more safety transparent.
Block chain technology realizes " decentralization " by distributed node, is realized by the common recognition mechanism between distributed node Distribution book keeping operation, can not be distorted by cryptography chain structure and electronic signature realization, it is achieved thereby that going the equity of trustization Book keeping operation network.
Block chain wallet technology:
Block chain wallet is designed using decentralization, and the public and private key of user is generated by ECC (elliptic curve), and private key is used In information signature, public key is used to verifying and indicating address, private key for user of user's wallet storage for information signature, user password Private key for user, protection private key safety are encrypted using AES enciphering and deciphering algorithms.
The public and private key of user:
The public and private key of user is generated by ECC (elliptic curve), and private key is used for information signature, and public key is used to verify and mark Show address, server will not store user password and private key for user, only store client public key, password and private key and voluntarily protected by user Pipe.
Wallet password:
Encryption for private key stores, using AES enciphering and deciphering algorithms protection private key safety.
The public and private keys of Rsa:
A kind of asymmetric cryptographic algorithm, RSA can generate two keys, any one can be used for public key, then another A is exactly the private key that you must protect;Using one of encryption, then need to be decrypted with another.
Cloud storage uploads voucher:Cloud storage client needs first to obtain from server-side before uploading uploads voucher, and is uploading A part of the voucher as request content will be uploaded during resource.Request without voucher or with illegal voucher will be rejected.
Salt is added to encrypt:It is a kind of cipher mode to password system log to add salt encryption, and the mode that it is realized is will be each A password is same to be called " " the n positions random number of (salt) is associated salt.
Wallet backup table:
One-time pad:
Field name Description Remarks
phone Major key
encode_pass_b Have been subjected to and add the encrypted close-B of salt
private_x The half RSA private keys X that client transmits
old_pass_b Old have been subjected to adds the encrypted password B of salt Verification-use
As shown in Figure 10, present invention also provides a kind of intelligent terminal, including:
One Transmit-Receive Unit, terminates programmed instruction for receiving;
One generation unit, for generating user cipher, public key and private key, the user cipher includes first password and second Password;
One fission recomposition unit, for being the first private key, the second private key by private key fission;
One encryption unit, for the first password to be encrypted by public key to obtain the first ciphertext;
The Transmit-Receive Unit, is additionally operable to together with first private key send first ciphertext to server, also uses In receive log in trading instruction the identity of the terminal is confirmed after the home identity so that the server receives, After confirming correctly, the private key is obtained after the first private key of reception and the second private key are recombinated, and pass through the private key pair First ciphertext is decrypted to obtain the first password and sends back the terminal;
The Transmit-Receive Unit, is additionally operable to the first password that the server is sent;
The fission recomposition unit, is additionally operable to recombinate to obtain with local second password by the first password described User cipher;
It is further included,
One execution unit, transactional operations are logged in for being performed by user cipher.
Further,
The Transmit-Receive Unit, is additionally operable to send terminal iidentification to the server, so that the server passes through the end End mark is identified registration, and after identifier register success, the server generation server path, upload voucher, server knowledge Other code, storage of public keys and storage private key, the server send out the server path therein, upload voucher and storage of public keys Give the terminal;
The Transmit-Receive Unit, is additionally operable to receive the server path, upload voucher and storage that the server is sent Public key;
The encryption unit, for the terminal by the storage of public keys by wallet file encryption;
The Transmit-Receive Unit, is additionally operable to the wallet file after the terminal encryption and is sent to high in the clouds, so that the high in the clouds connects High in the clouds identification code is generated after receiving the encrypted wallet file, and the high in the clouds identification code is sent back into the terminal.
The Transmit-Receive Unit, is additionally operable to receive the high in the clouds identification code and is sent to the server, so that the server Receive and carry out verification matching with the local server identification code after the high in the clouds identification code, if successful match updates institute State the path of wallet file.
Further,
The Transmit-Receive Unit, is additionally operable to receive reduction instruction, sends the terminal iidentification and send to the server, so that The server confirms the identity of the terminal by the terminal iidentification, and after confirming successfully, the server is downloaded The encryption wallet file in high in the clouds, and being decrypted by local storage private key, the server is by the wallet after decryption File is sent to the terminal;
The Transmit-Receive Unit, is additionally operable to the wallet file after receiving and deciphering;
The execution unit, is additionally operable to the terminal and performs recovery operation.
As shown in figure 11, another intelligent apparatus that the application provides, including:
One Transmit-Receive Unit, for receiving the first ciphertext, the first private key, the second private key and home identity, first private key, After second private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal The first password that public key generates in user cipher the terminal is generated after END instruction to be encrypted and obtain, the user cipher Further include the second password;
One confirmation unit, confirms the identity of the terminal by the home identity for server;
One fission recomposition unit, for if it is confirmed that correctly, to first private key and the second private key will recombinate To the private key,;
One decryption unit, is decrypted to obtain the first password by the private key to first ciphertext;
The Transmit-Receive Unit, is additionally operable to send first password to the terminal, so that the terminal is by the first password Recombinate to obtain the user cipher with the second local password, and by the user cipher perform login next time transaction Operation.
Further,
The Transmit-Receive Unit, be additionally operable to that the private key is fissioned when the terminal sends institute for the first private key and the second private key When stating terminal iidentification to the server, the server receives the terminal iidentification that the terminal is sent;
It is further included,
One registering unit, for being identified registration by the terminal iidentification;
One generation unit, after succeeding in registration, the server generation server identification code, storage of public keys, storage are private Key, server path and upload voucher;
The Transmit-Receive Unit, is additionally operable to the server by the server path with uploading voucher, is deposited together with described Storage public key is sent to the terminal, so that wallet file encryption is uploaded to high in the clouds by the terminal by the storage of public keys, institute State after high in the clouds receives the encrypted wallet file and generate the high in the clouds identification code, and the high in the clouds identification code is sent to described Terminal, after the terminal receives the high in the clouds identification code, the server is sent back by the high in the clouds identification code;
The Transmit-Receive Unit, is additionally operable to the server and receives the server after the high in the clouds identification code and local Identification code carries out verification matching, if successful match updates the path of the wallet file.
Further,
The Transmit-Receive Unit, is additionally operable to receive the terminal iidentification that the terminal is sent, and sends the wallet text after decryption Part is to the memory module;
It is further included,
One confirmation unit, the identity of the terminal is confirmed for the server by the terminal iidentification;
One download unit, for when identity validation is correct, the server to download the encryption money for being stored in the high in the clouds APMB package;
One decryption unit, for being decrypted by the wallet file of the storage private key pair encryption;
The Transmit-Receive Unit, for sending the wallet file after decryption to the terminal, so that the terminal is held Row recovery operation.
As shown in figure 12, another intelligent apparatus that the application provides, including:
One Transmit-Receive Unit, the encryption wallet file encrypted for receiving terminal;
One generation unit, for generating high in the clouds identification code;
The Transmit-Receive Unit, is additionally operable to the high in the clouds identification code being sent to the terminal, so that the terminal receives institute State high in the clouds identification code and be sent to server, the server is known after receiving the high in the clouds identification code with the local server Other code carries out verification matching, if successful match updates the path of the wallet file.
Although disclosed herein embodiment as above, the content be only readily appreciate the present invention and use Embodiment, is not limited to the present invention.Technical staff in any fields of the present invention, is taken off not departing from the present invention On the premise of the spirit and scope of dew, any modification and change, but the present invention can be carried out in the form and details of implementation Scope of patent protection, still should be subject to the scope of the claims as defined in the appended claims.

Claims (14)

  1. A kind of 1. encryption method, it is characterised in that the described method includes:
    When terminal, which receives, terminates programmed instruction, generation user cipher, public key and private key, the user cipher include first password With the second password;
    Private key fission is the first private key and the second private key by the terminal;
    The terminal is encrypted the first password by the public key to obtain the first ciphertext, together with first private key Send to server;
    The terminal receive log in next time trading instruction when, by the home identity of the terminal and second private key send to The server, so as to confirm after the server reception home identity to the identity of the terminal, confirms correct Afterwards, the private key is obtained after the first private key of reception and the second private key being recombinated, and by the private key to the first ciphertext It is decrypted to obtain the first password and sends back the terminal;
    The terminal receives the first password that the server is sent, and the first password and local described second is close Code restructuring obtains the user cipher;
    The terminal performed by the user cipher after restructuring log in transactional operation.
  2. 2. encryption method according to claim 1, it is characterised in that it further includes its backup method,
    The backup method is as follows:
    After it is the first private key and the second private key that the terminal is by private key fission, the terminal sends terminal iidentification to described Server, so that the server is identified registration by the terminal iidentification, after identifier register success, the server life Into server path, voucher, server identification code, storage of public keys and storage private key are uploaded, the server will be therein described Server path, upload voucher and storage of public keys are sent to the terminal;
    The terminal receives the server path, upload voucher and the storage of public keys that the server is sent;
    The terminal by wallet file encryption and is sent to high in the clouds by the storage of public keys, so that high in the clouds reception is encrypted High in the clouds identification code is generated after the wallet file, and the high in the clouds identification code is sent back into the terminal;
    The terminal receives the high in the clouds identification code and is sent to the server, so that the server receives the high in the clouds and knows Verification matching is carried out with the local server identification code after other code, if successful match updates the road of the wallet file Footpath.
  3. 3. encryption method according to claim 2, it is characterised in that it further includes its restoration methods,
    The restoration methods are as follows:
    The terminal receives reduction instruction, and the terminal iidentification is sent to the server, so that the server passes through The terminal iidentification confirms the identity of the terminal, and after confirming successfully, the server downloads the encryption wallet in high in the clouds File, and be decrypted by local storage private key, the server sends the wallet file after decryption to described Terminal;
    Recovery operation is performed after the wallet file after the terminal receiving and deciphering.
  4. A kind of 4. encryption method, it is characterised in that the described method includes:
    Server receive terminal transmission the first ciphertext, the first private key, the second private key and home identity, first private key, After second private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal The first password that public key generates in user cipher the terminal is generated after END instruction to be encrypted and obtain, the user cipher Further include the second password;
    The server confirms the identity of the terminal by the home identity;
    If it is confirmed that correct, the server will recombinate first private key and the second private key to obtain the private key, and First ciphertext is decrypted to obtain the first password by the private key and sends back the terminal, so that the terminal Second password of the first password and local is recombinated to obtain the user cipher, and it is next by user cipher execution Secondary login transactional operation.
  5. 5. encryption method according to claim 4, it is characterised in that it further includes its backup method:
    The backup method is as follows:
    When private key fission is sent the terminal iidentification to the server by the terminal for the first private key and the second private key When, the server receives the terminal iidentification that the terminal is sent, and is identified registration by the terminal iidentification;
    After succeeding in registration, server generation server identification code, storage of public keys, storage private key, server path and the upload Voucher;
    The server is by the server path and uploads voucher, is sent together with the storage of public keys to the terminal, with Make the terminal that wallet file encryption are uploaded to high in the clouds by the storage of public keys, the high in the clouds receives the encrypted wallet The high in the clouds identification code is generated after file, and the high in the clouds identification code is sent to the terminal, the terminal receives the cloud After holding identification code, the high in the clouds identification code is sent back into the server;
    The server receives and carries out verification matching with the local server identification code after the high in the clouds identification code, if Successful match updates the path of the wallet file.
  6. 6. encryption method according to claim 5, it is characterised in that it further includes its restoration methods,
    The restoration methods are as follows:
    After the server receives the terminal iidentification that the terminal is sent, the body of the terminal is confirmed by the terminal iidentification Part;
    When identity validation is correct, the server downloads the encryption wallet file for being stored in the high in the clouds;
    The server is decrypted by the wallet file of the storage private key pair encryption, and by the money after decryption APMB package is sent to the terminal, so that the terminal performs recovery operation.
  7. A kind of 7. encryption method, it is characterised in that the described method includes:
    High in the clouds identification code is generated after the encrypted encryption wallet file of high in the clouds receiving terminal, and the high in the clouds identification code is sent to The terminal, so that the terminal receives the high in the clouds identification code and is sent to server, the server receives the high in the clouds Verification matching is carried out with the local server identification code after identification code, if successful match updates the road of the wallet file Footpath.
  8. A kind of 8. intelligent apparatus, it is characterised in that including:
    One Transmit-Receive Unit, terminates programmed instruction for receiving;
    One generation unit, for generating user cipher, public key and private key, the user cipher is close including first password and second Code;
    One fission recomposition unit, for being the first private key, the second private key by private key fission;
    One encryption unit, for the first password to be encrypted by public key to obtain the first ciphertext;
    The Transmit-Receive Unit, is additionally operable to together with first private key send first ciphertext to server, is additionally operable to connect Receive log in trading instruction the identity of the terminal is confirmed after the home identity so that the server receives, confirmed After correct, the private key is obtained after the first private key of reception and the second private key are recombinated, and by the private key to first Ciphertext is decrypted to obtain the first password and sends back the terminal;
    The Transmit-Receive Unit, is additionally operable to receive the first password that the server is sent;
    The fission recomposition unit, is additionally operable to recombinate to obtain the user by the first password and local second password Password;
    It is further included,
    One execution unit, transactional operations are logged in for being performed by user cipher.
  9. 9. intelligent apparatus according to claim 8, it is characterised in that:
    The Transmit-Receive Unit, is additionally operable to send terminal iidentification to the server, so that the server passes through the terminal mark Knowledge is identified registration, after identifier register success, the server generation server path, upload voucher, server identification code, The server path therein, upload voucher and storage of public keys are sent to by storage of public keys and storage private key, the server The terminal;
    The Transmit-Receive Unit, is additionally operable to receive the server path, upload voucher and storage of public keys that the server is sent;
    The encryption unit, for the terminal by the storage of public keys by wallet file encryption;
    The Transmit-Receive Unit, is additionally operable to the wallet file after the terminal encryption and is sent to high in the clouds, add so that the high in the clouds receives High in the clouds identification code is generated after the close wallet file, and the high in the clouds identification code is sent back into the terminal.
    The Transmit-Receive Unit, is additionally operable to receive the high in the clouds identification code and is sent to the server, so that the server receives Verification matching is carried out with the local server identification code after to the high in the clouds identification code, if successful match updates the money The path of APMB package.
  10. 10. intelligent apparatus according to claim 9, it is characterised in that:
    The Transmit-Receive Unit, is additionally operable to receive reduction instruction, sends the terminal iidentification and send to the server, so that described Server confirms the identity of the terminal by the terminal iidentification, and after confirming successfully, the server downloads high in the clouds Encryption wallet file, and be decrypted by local storage private key, the server is by the wallet file after decryption Send to the terminal;
    The Transmit-Receive Unit, is additionally operable to the wallet file after receiving and deciphering;
    The execution unit, is additionally operable to the terminal and performs recovery operation.
  11. A kind of 11. intelligent apparatus, it is characterised in that:It includes,
    One Transmit-Receive Unit, for receiving the first ciphertext, the first private key, the second private key and home identity, first private key, second After private key receives END instruction for the terminal, generation private key fission forms, and first ciphertext receives for the terminal to be terminated Generate the first password that public key generates in user cipher the terminal after instruction to be encrypted and obtain, the user cipher also wraps Include the second password;
    One confirmation unit, confirms the identity of the terminal by the home identity for server;
    One fission recomposition unit, for if it is confirmed that correctly, will be recombinated to obtain institute to first private key and the second private key State private key,;
    One decryption unit, is decrypted to obtain the first password by the private key to first ciphertext;
    The Transmit-Receive Unit, is additionally operable to send first password to the terminal, so that the terminal is by the first password and originally Second password on ground recombinates to obtain the user cipher, and by the user cipher perform login next time transactional operation.
  12. 12. intelligent apparatus according to claim 11, it is characterised in that:
    The Transmit-Receive Unit, is additionally operable to when private key fission is sent the end by the terminal for the first private key and the second private key When end mark is to the server, the server receives the terminal iidentification that the terminal is sent;
    It is further included,
    One registering unit, for being identified registration by the terminal iidentification;
    One generation unit, after succeeding in registration, the server generation server identification code, storage of public keys, storage private key, clothes Business device path and upload voucher;
    The Transmit-Receive Unit, is additionally operable to the server by the server path with uploading voucher, public together with the storage Key is sent to the terminal, so that wallet file encryption is uploaded to high in the clouds, the cloud by the terminal by the storage of public keys End generates the high in the clouds identification code after receiving the encrypted wallet file, and the high in the clouds identification code is sent to the end End, after the terminal receives the high in the clouds identification code, the server is sent back by the high in the clouds identification code;
    The Transmit-Receive Unit, is additionally operable to identify with the local server after the server receives the high in the clouds identification code Code carries out verification matching, if successful match updates the path of the wallet file.
  13. 13. intelligent apparatus according to claim 12, it is characterised in that:
    The Transmit-Receive Unit, is additionally operable to receive the terminal iidentification that the terminal is sent, and sends the wallet file after decryption extremely The memory module;
    The confirmation unit, the identity of the terminal is confirmed for the server by the terminal iidentification;
    It is further included,
    One download unit, for when identity validation is correct, the server to download the encryption wallet text for being stored in the high in the clouds Part;
    One decryption unit, for being decrypted by the wallet file of the storage private key pair encryption;
    The Transmit-Receive Unit, for sending the wallet file after decryption to the terminal, so that terminal execution is extensive Multiple operation.
  14. A kind of 14. intelligent apparatus, it is characterised in that including:
    One Transmit-Receive Unit, the encryption wallet file encrypted for receiving terminal;
    One generation unit, for generating high in the clouds identification code;
    The Transmit-Receive Unit, is additionally operable to the high in the clouds identification code being sent to the terminal, so that the terminal receives the cloud End identification code is sent to server, the server receive after the high in the clouds identification code with the local server identification code Verification matching is carried out, if successful match updates the path of the wallet file.
CN201710655465.4A 2017-08-02 2017-08-02 Encryption method and intelligent device Expired - Fee Related CN107920052B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710655465.4A CN107920052B (en) 2017-08-02 2017-08-02 Encryption method and intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710655465.4A CN107920052B (en) 2017-08-02 2017-08-02 Encryption method and intelligent device

Publications (2)

Publication Number Publication Date
CN107920052A true CN107920052A (en) 2018-04-17
CN107920052B CN107920052B (en) 2020-11-17

Family

ID=61898542

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710655465.4A Expired - Fee Related CN107920052B (en) 2017-08-02 2017-08-02 Encryption method and intelligent device

Country Status (1)

Country Link
CN (1) CN107920052B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109118187A (en) * 2018-08-30 2019-01-01 杭州链汇通区块链科技有限公司 Restoration methods, device and the computer readable storage medium of block chain wallet
CN109389397A (en) * 2018-09-28 2019-02-26 北京金山安全软件有限公司 Hardware wallet
CN110492990A (en) * 2018-05-15 2019-11-22 华为技术有限公司 Private key management method, apparatus and system under block chain scene
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN110912701A (en) * 2018-09-14 2020-03-24 宏达国际电子股份有限公司 Social key recovery method and related device
CN111242613A (en) * 2020-01-09 2020-06-05 中信银行股份有限公司 Wallet information management method and device based on online banking system and electronic equipment
CN114257387A (en) * 2020-09-11 2022-03-29 中移物联网有限公司 Login authentication method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
CN101719205A (en) * 2009-12-25 2010-06-02 国家广播电影电视总局电影数字节目管理中心 Digital copyright management method and system
CN104468627A (en) * 2014-12-30 2015-03-25 成都三零瑞通移动通信有限公司 Data encryption method and system conducting terminal data backup through server
CN104615691A (en) * 2015-01-24 2015-05-13 刘勇 Mobile terminal and data storage method
WO2015142765A1 (en) * 2014-03-17 2015-09-24 Coinbase, Inc Bitcoin host computer system
US20150363777A1 (en) * 2014-06-16 2015-12-17 Bank Of America Corporation Cryptocurrency suspicious user alert system
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
CN106533675A (en) * 2016-12-19 2017-03-22 北京洋浦伟业科技发展有限公司 Digital signature method and system
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106788989A (en) * 2016-11-30 2017-05-31 华为技术有限公司 A kind of method and apparatus for setting up safe encryption channel

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
CN101719205A (en) * 2009-12-25 2010-06-02 国家广播电影电视总局电影数字节目管理中心 Digital copyright management method and system
WO2015142765A1 (en) * 2014-03-17 2015-09-24 Coinbase, Inc Bitcoin host computer system
US20150363777A1 (en) * 2014-06-16 2015-12-17 Bank Of America Corporation Cryptocurrency suspicious user alert system
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
CN104468627A (en) * 2014-12-30 2015-03-25 成都三零瑞通移动通信有限公司 Data encryption method and system conducting terminal data backup through server
CN104615691A (en) * 2015-01-24 2015-05-13 刘勇 Mobile terminal and data storage method
CN106788989A (en) * 2016-11-30 2017-05-31 华为技术有限公司 A kind of method and apparatus for setting up safe encryption channel
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106533675A (en) * 2016-12-19 2017-03-22 北京洋浦伟业科技发展有限公司 Digital signature method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何蒲,于戈,张岩峰,鲍玉斌: "区块链技术与应用前瞻综述", 《计算机科学》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110492990A (en) * 2018-05-15 2019-11-22 华为技术有限公司 Private key management method, apparatus and system under block chain scene
CN110492990B (en) * 2018-05-15 2021-10-15 华为技术有限公司 Private key management method, device and system under block chain scene
CN109118187A (en) * 2018-08-30 2019-01-01 杭州链汇通区块链科技有限公司 Restoration methods, device and the computer readable storage medium of block chain wallet
CN109118187B (en) * 2018-08-30 2021-07-23 神州数码融信软件有限公司 Block chain wallet recovery method and device and computer readable storage medium
CN110912701A (en) * 2018-09-14 2020-03-24 宏达国际电子股份有限公司 Social key recovery method and related device
CN110912701B (en) * 2018-09-14 2022-09-02 宏达国际电子股份有限公司 Social key recovery method and related device
CN109389397A (en) * 2018-09-28 2019-02-26 北京金山安全软件有限公司 Hardware wallet
CN109389397B (en) * 2018-09-28 2021-11-26 北京金山安全软件有限公司 Hardware wallet
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN111242613A (en) * 2020-01-09 2020-06-05 中信银行股份有限公司 Wallet information management method and device based on online banking system and electronic equipment
CN114257387A (en) * 2020-09-11 2022-03-29 中移物联网有限公司 Login authentication method and device

Also Published As

Publication number Publication date
CN107920052B (en) 2020-11-17

Similar Documents

Publication Publication Date Title
US20210258162A1 (en) Methods for secure cryptogram generation
CN107920052A (en) A kind of encryption method and intelligent apparatus
JP6514218B2 (en) Client authentication using social data
US8833648B1 (en) Dynamic credit card security code via mobile device
CN103297403B (en) A kind of method and system for realizing dynamic cipher verification
US9160732B2 (en) System and methods for online authentication
CN100432889C (en) System and method providing disconnected authentication
WO2022037596A1 (en) Combined signature and signature verification method and system, and storage medium
US20090187980A1 (en) Method of authenticating, authorizing, encrypting and decrypting via mobile service
CN111275419B (en) Block chain wallet signature right confirming method, device and system
CN108647964A (en) A kind of block chain data processing method, device and computer readable storage medium
US10044684B2 (en) Server for authenticating smart chip and method thereof
US10147092B2 (en) System and method for signing and authenticating secure transactions through a communications network
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN105871553A (en) Identity-free three-factor remote user authentication method
CN109981255A (en) The update method and system of pool of keys
CN104125230B (en) A kind of short message certification service system and authentication method
CN109728896A (en) A kind of incoming call certification and source tracing method and process based on block chain
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
US20200244457A1 (en) Blockchain intelligent security implementation
CN108537537A (en) A kind of safe and reliable digital cash Wallet System
CN111355591A (en) Block chain account safety management method based on real-name authentication technology
CN109754241A (en) A kind of hard money packet and the verification method based on hard money packet
CN109510820A (en) A kind of block chain cryptographic methods that decentralization can customize

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201117

Termination date: 20210802

CF01 Termination of patent right due to non-payment of annual fee