CN110070363B - Account management method and verification method in block chain network and terminal equipment - Google Patents
Account management method and verification method in block chain network and terminal equipment Download PDFInfo
- Publication number
- CN110070363B CN110070363B CN201910191172.4A CN201910191172A CN110070363B CN 110070363 B CN110070363 B CN 110070363B CN 201910191172 A CN201910191172 A CN 201910191172A CN 110070363 B CN110070363 B CN 110070363B
- Authority
- CN
- China
- Prior art keywords
- transaction
- account
- information
- verification
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 176
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000007726 management method Methods 0.000 title claims abstract description 31
- 230000000977 initiatory effect Effects 0.000 claims abstract description 22
- 238000012546 transfer Methods 0.000 claims description 19
- 238000011084 recovery Methods 0.000 claims description 6
- 238000010200 validation analysis Methods 0.000 claims 7
- 238000004364 calculation method Methods 0.000 claims 1
- 238000004891 communication Methods 0.000 abstract description 2
- 239000003999 initiator Substances 0.000 description 17
- 230000006872 improvement Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 239000011324 bead Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention relates to the technical field of communication, and discloses an account management method, an account verification method and terminal equipment in a block chain network. The account management method in the block chain network comprises the following steps: when a transaction is initiated to a transaction receiver through a first account, carrying an encrypted secret generated based on a secret password in transaction information; after the secret key of the first account is lost, initiating a verification transaction for verifying the second account to the transaction receiver through the second account, wherein the verification transaction comprises historical transaction information and a secret password, and the transaction receiver executes verification operation on the second account according to the secret password and an encrypted secret in the historical transaction information; after the verification is passed, the second account acquires the control right of the first account; the embodiment of the invention also provides a verification method and terminal equipment in the block chain network; the method and the device can retrieve the account related information in the lost account after the account private key of the user is lost, and avoid asset loss of the user caused by the loss of the account private key.
Description
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to an account management method, an account verification method and terminal equipment in a blockchain network.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The system is essentially a decentralized database, and simultaneously serves as the bottom technology of digital currency, the system is a series of data blocks which are generated by correlation through a cryptographic method, and each data block contains information of a batch of digital currency network transactions, and the information is used for verifying the validity of the information and generating the next block.
Currently, blockchain based transactions are typically conducted on a wallet basis, each wallet having a unique address through which transactions between users are conducted. With the rapid development of the blockchain technology, the application related to the blockchain is more and more extensive, business transactions between enterprises and individuals through the blockchain are increasingly increased, transaction transfer is more and more frequent, and the blockchain wallet is used as a carrier of transactions, so that the safety of the blockchain wallet is more important.
However, the inventors found that at least the following problems exist in the prior art: in the prior art, in a transaction based on a block chain, once an account private key of a user is lost, the account and account related information such as data assets in the account cannot be retrieved, so that the assets of the user are lost.
Disclosure of Invention
An object of an embodiment of the present invention is to provide an account management method and a terminal device in a blockchain network, which can retrieve account related information in a lost account after an account private key of a user is lost, so as to avoid asset loss of the user due to the loss of the account private key.
In order to solve the above technical problem, an embodiment of the present invention provides an account management method in a blockchain network, including: when a transaction is initiated to a transaction receiver through a first account, carrying an encrypted secret generated based on a secret password in transaction information; after the secret key of the first account is lost, initiating a verification transaction for verifying the second account to the transaction receiver through the second account, wherein the verification transaction comprises historical transaction information and a secret password, and the transaction receiver executes verification operation on the second account according to the secret password and an encrypted secret in the historical transaction information; after the verification is passed, the second account acquires control of the first account.
The embodiment of the invention also provides an account verification method in the block chain network, which comprises the following steps: receiving a verification transaction for verifying an account to be verified; the verification transaction comprises historical transaction information and a secret password; acquiring an encryption secret phrase in the historical transaction according to the historical transaction information; wherein the encrypted secret is generated based on the secret password; according to the encrypted secret words and the secret word password in the verification transaction, performing verification operation on the account to be verified; and the account to be verified is used for acquiring the control right of the first account using the secret password after the verification is passed.
An embodiment of the present invention further provides a terminal device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of account management in a blockchain network as described above or to perform a method of account verification in a blockchain network as described above.
Compared with the prior art, the embodiment of the invention discloses an account management method in a blockchain network, when a user initiates a transaction to a transaction receiver through a first account, encrypted secret words generated based on secret word passwords are carried in transaction information; after the secret key of the first account is lost, initiating a verification transaction for verifying the second account to the transaction receiver through the second account, wherein the verification transaction comprises historical transaction information and a secret password, and the transaction receiver executes verification operation on the second account according to the secret password and an encrypted secret in the historical transaction information; after the verification is passed, the second account acquires control of the first account. The encrypted secret words are generated by carrying the secret word password known by only the transaction initiator in the transaction information, and the verification transaction based on the secret word password and the historical transaction information is initiated in the second account newly applied after the secret key of the first account is lost, so that whether the user using the second account is the same as the user using the first account or not can be effectively and safely verified; after the verification is passed, the second account acquires the control right of the first account, so that the user can retrieve the account related information in the lost account, and the asset loss caused by the loss of the account private key of the user can be avoided.
In addition, the encryption surreptitious language specifically includes: the encrypted secret words are obtained by encrypting the hash value of the first information through the public key of the transaction receiver; the first information specifically includes: a hash value for uniquely identifying a transaction pipeline of the transaction, the first account information, the transaction recipient account information, the asset transfer information, and the cryptic password; the secret password included in the verification transaction is specifically: hash value of the passphrase password. A specific data structure for the encryption lingo is provided. The encrypted secret language comprises a hash value of the secret language password, so that users except the transaction initiator cannot know the specific content of the secret language password, and the secret language password of the transaction initiator cannot be leaked.
In addition, before initiating a verification transaction for verifying the second account to the transaction receiver through the second account, the method further includes: selecting a transaction receiver meeting preset conditions as a target transaction receiver; initiating a verification transaction for verifying the second account to the transaction receiver through the second account, specifically: and initiating a verification transaction for verifying the second account to the target transaction receiver through the second account. By selecting the target transaction receiver and performing the verification operation on the second account, different requirements of the user in practical application can be better met.
In addition, the number of transaction receivers is multiple; initiating a verification transaction for verifying the second account to the transaction receiver through the second account, specifically: respectively initiating verification transactions for verifying the second account to a plurality of transaction receivers through the second account; the verification is passed, specifically: the sum of the number of the verification passing of the verification transaction by the transaction receivers reaches a preset threshold. After the preset number of verification transactions pass, the user can acquire the control right of the first account from the second account, and the security is higher.
Drawings
Fig. 1 is a flowchart of an account management method in a blockchain network according to a first embodiment of the present invention;
fig. 2 is a flowchart of an account management method in a blockchain network according to a second embodiment of the present invention;
fig. 3 is a flowchart of an account management method in a blockchain network according to a third embodiment of the present invention;
fig. 4 is a flowchart of an account verification method in a blockchain network according to a fourth embodiment of the present invention;
fig. 5 is a flowchart of substeps of step 403 of a method for verifying an account in a blockchain network according to a fourth embodiment of the present invention;
fig. 6 is a schematic structural connection diagram of a terminal device according to a fifth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present invention, and the embodiments may be mutually incorporated and referred to without contradiction.
A first embodiment of the invention relates to a method of account management in a blockchain network. In the embodiment, when a transaction is initiated to a transaction receiver through a first account, an encrypted secret generated based on a secret password is carried in transaction information; after the secret key of the first account is lost, initiating a verification transaction for verifying the second account to the transaction receiver through the second account, wherein the verification transaction comprises historical transaction information and a secret password, and the transaction receiver executes verification operation on the second account according to the secret password and an encrypted secret in the historical transaction information; after the verification is passed, the second account acquires control of the first account.
In the embodiment, the encrypted secret language is generated by carrying the secret language password known by only the transaction initiator in the transaction information, and the verification transaction based on the secret language password and the historical transaction information is initiated in the second account newly applied after the secret key of the first account is lost, so that whether the user using the second account is the same user as the user using the first account or not can be effectively and safely verified; after the verification is passed, the second account acquires the control right of the first account, so that the user can retrieve the account related information in the lost account, and the asset loss caused by the loss of the account private key of the user can be avoided.
The following describes implementation details of the account management method in the blockchain network according to the embodiment in detail, and the following description is only provided for facilitating understanding of the implementation details and is not necessary for implementing the present solution.
A flowchart of an account management method in a block chain network in the present embodiment is shown in fig. 1, and includes:
Specifically, the encryption lingo in this embodiment may be: and the encrypted secret words are obtained by encrypting the hash value of the first information through the public key of the transaction receiver. The first information may include: a hash value that uniquely identifies a transaction pipeline of transactions, first account information, transaction recipient account information, asset transfer information, and a passphrase password. In this embodiment, the specific content of the secret password may be related to the transaction or unrelated to the transaction, and is similar to the password hint information, which is equivalent to generating a transaction token that cannot be known by a third party other than the transaction initiator.
It should be noted that the transaction flow in this embodiment is to uniquely identify a transaction, and through the identification, related transaction information under the identification can be found.
For example, the password of the first account is: "the oriental pearl," the data structure of the encrypted secret generated by the terminal device of the user based on the secret password may be: based on the public key of the transaction receiver (SHA256 (transaction flow + first account information + transaction receiver account information + asset transfer information + SHA256 (the oriental pearl)), it is easy to find out that anyone can verify whether the transaction information initiated by the transaction initiator carries the encrypted secret words, but the specific content of the secret word password is hardly known by anyone except the transaction initiator, so that the privacy of the secret word password is ensured.
In the above example, the hash value of the whisper password and the hash value of the first information are both: the 256-bit hash value is used to represent the unique value of the secret password and the unique value of the first information, respectively, and has uniqueness. Of course, the specific hash value algorithm in the present embodiment is not particularly limited.
In addition, the transaction information when the transaction is initiated to the transaction receiver through the first account may further include, but is not limited to, the following information: the transaction pipeline for uniquely identifying the transaction, the first account information, the transaction recipient account information, the asset transfer information, and a private key signature of the first account. The transaction information comprises the private key signature of the first account, so that the security and the legality of the transaction can be ensured.
Specifically, if the secret key of the first account is lost, the user can newly apply for the second account, and the terminal device of the user acquires the transaction flow of the first account from the block chain through the second account, acquires the transaction including the secret language password, and generates the verification transaction. The verification transaction comprises historical transaction information and a secret password, and a transaction receiver executes verification operation on the second account according to the secret password and the encrypted secret in the historical transaction information. The historical transaction information is the transaction information in step 101.
It can be understood that the reason why the terminal device of the transaction receiver can perform the verification operation on the second account according to the secret password and the encrypted secret in the historical transaction information is that: the terminal equipment of the transaction receiver can decrypt the encrypted secret words in the historical transaction information to obtain the information based on the secret word password carried in the transaction information of the transaction between the user and the transaction receiver through the first account before the secret key of the first account is lost; and the information of the secret password is also included in the verification transaction sent by the user through the second account, and because the secret password is only known by the transaction initiator, if the information based on the secret password carried in the transaction information of the user for performing transaction with the transaction receiver through the first account is consistent with the information of the secret password also included in the verification transaction sent by the user through the second account, the verification can be carried out: the user who is currently initiating the verification transaction through the second account is the user of the first account.
Further, the secret language password included in the verification transaction may be a hash value of the secret language password, specifically, the verification transaction may include second information obtained by encrypting the hash value of the secret language password with a public key of a transaction receiver, and a data structure of the second information may be: the transaction recipient public key (SHA256 (passphrase password)). The verification transaction may include, but is not limited to: the first asset retrieval transaction flow, the historical transaction signature, the first account information, the transaction receiver account information, the second account information and the private key signature of the second account are used for uniquely identifying the verification transaction. The encrypted secret language comprises a hash value of the secret language password, so that users except the transaction initiator cannot know the specific content of the secret language password, and the secret language password of the transaction initiator cannot be leaked.
In this embodiment, after the key of the first account is lost, the number of recovery transactions for recovering the first account by initiating the verification transaction to the transaction receiver through the second account may be limited to N, where N is a natural number greater than or equal to 1. Wherein the specific value of N is determined by the protocol set in the blockchain. Under the limit of the number of the transaction recovery strokes, the method can play a role in limiting abnormal users who frequently initiate verification transactions to the transaction receiver through the second account to recover the first account.
And 103, after the verification is passed, the second account acquires the control right of the first account.
Specifically, the transaction receiver enters a waiting period after performing verification operation on the second account according to the secret password and the encrypted secret in the historical transaction information. If the verification result is obtained, the second account obtains the control right of the first account after the verification is passed, and asset loss caused by loss of the account private key of the user can be avoided.
It is easy to find that, in the account management method in the blockchain network provided by this embodiment, the encrypted secret is generated by carrying the secret password known only by the transaction initiator in the transaction information, and the verification transaction based on the secret password and the historical transaction information is initiated by the second account newly applied after the secret key of the first account is lost, so that it is possible to effectively and safely verify whether the user using the second account is the same user as the user using the first account; after the verification is passed, the second account acquires the control right of the first account, so that the user can retrieve the account related information in the lost account, and the asset loss caused by the loss of the account private key of the user can be avoided.
A second embodiment of the invention relates to a method of account management in a blockchain network. The second embodiment is an improvement on the first embodiment, and the specific improvements are as follows: in this embodiment, before initiating a verification transaction for verifying the second account to the transaction receiver through the second account, the transaction receiver meeting the preset condition is further selected as a target transaction receiver, and a verification transaction for verifying the second account is initiated to the target transaction receiver through the second account. In this embodiment, it is disclosed that the verification operation can be performed on the second account by selecting the target transaction receiver, which can better meet different requirements of the user in practical application.
A flowchart of an account management method in a block chain network in the present embodiment is shown in fig. 2, and includes:
Since this step is substantially the same as step 101 in the first embodiment, it is not repeated here to avoid repetition.
Specifically, through the blockchain network, a specific transaction receiver can be selected as a target transaction receiver according to a certain algorithm according to the transaction information of the first account of the user. For example, the earliest transaction information may be selected from the transaction information of the first account, information of the transaction recipient may be obtained based on the earliest transaction information, and the transaction recipient may be set as the target transaction recipient. For another example, the transaction information that is the latest from the current time may be selected from the transaction information of the first account, information of the transaction receiver may be obtained according to the latest transaction information, and the transaction receiver may be used as the target transaction receiver. In addition, according to a certain algorithm, the transaction recipient may be randomly selected from the transaction information of the first account as the target transaction recipient, which is not specifically limited in this embodiment.
In this embodiment, a specific transaction recipient may be selected as the target transaction recipient according to the specification of the intelligent contract. The intelligent contract is a digital network version of a traditional contract, is a computer program running on a block chain, and can be executed by itself when the condition written in the source code is met. Since the intelligent contracts, once written, can be trusted by the user, the contract terms are not changed. That is, anyone cannot modify the smart contract, with no further modifications. This makes it impossible to select a transaction recipient satisfying the B-condition as a target transaction recipient instead if the written intelligent contract specifies that the transaction recipient satisfying the a-condition is selected as the target transaction recipient.
The verification transaction comprises historical transaction information and a secret password, and a transaction receiver executes verification operation on the second account according to the secret password and the encrypted secret in the historical transaction information.
In this embodiment, a verification transaction for verifying the second account is initiated only to the target transaction recipient via the second account.
And step 204, after the verification is passed, the second account acquires the control right of the first account.
Since this step is substantially the same as step 103 in the first embodiment, it is not repeated here to avoid repetition.
It is easy to find that, in the account management method in the blockchain network provided by the embodiment, before the verification transaction for verifying the second account is initiated to the transaction receiver through the second account, the transaction receiver meeting the preset condition is further selected as the target transaction receiver, and the verification transaction for verifying the second account is initiated to the target transaction receiver through the second account. In this embodiment, it is disclosed that the verification operation can be performed on the second account by selecting the target transaction receiver, which can better meet different requirements of the user in practical application.
A third embodiment of the present invention relates to a method of account management in a blockchain network. The third embodiment is an improvement made on the basis of the first embodiment, and the specific improvements are as follows: in the present embodiment, the number of transaction recipients is plural; respectively initiating verification transactions for verifying the second account to a plurality of transaction receivers through the second account; and when the sum of the number of the verification passes of the transaction receivers to the verification transaction reaches a preset threshold, the verification passes. In this embodiment, after the preset number of verification transactions pass, the user may acquire the control right of the first account in the second account, so that the security is higher.
A flowchart of an account management method in a block chain network in the present embodiment is shown in fig. 3, and includes:
Since this step is substantially the same as step 101 in the first embodiment, it is not repeated here to avoid repetition.
In this embodiment, the number of transaction recipients is plural.
Generally, transactions are conducted with a plurality of transaction recipients through a first account from the time when the first account is registered until a key of the first account is lost. Therefore, when a verification transaction for verifying the second account is initiated to the transaction receiver through the second account, the verification transactions for verifying the second account can be respectively initiated to the plurality of transaction receivers through the second account. The verification transaction comprises historical transaction information and a secret password, and a plurality of transaction receivers execute verification operation on the second account according to the secret password and the encrypted secret in the historical transaction information.
For example, 5 transaction recipients may be randomly selected from the 20 transaction recipients, and verification transactions for verifying the second account are respectively initiated to the 5 transaction recipients through the second account, so that the 5 transaction recipients respectively perform a verification operation on the second account according to the encrypted secret words and the secret password of the historical transaction information included in the verification transactions. Of course, the above description is only exemplary, and the practical application should not be limited to the above description. For example, 10 transaction recipients or 20 transaction recipients may be selected to perform the verification operation on the second account respectively.
In one embodiment, if the verification transactions for verifying the second account are initiated to 20 transaction recipients through the second account, respectively, the preset threshold is set to 80% of the total number of transaction recipients, i.e., 16. If the total number of the verification passes of the 20 transaction receivers to the verification transaction is 5 and the preset threshold 16 is not reached, the verification fails and the process is ended; if the total number of the 20 transaction receivers passing the verification of the verification transaction is 19, and the preset threshold is reached to 16, the verification is passed. The preset threshold may be a fixed value, or may be set according to the total number of transaction recipients executing the verification operation on the second account, which is not limited herein.
The present embodiment may be a modification of the second embodiment.
It is easy to find that, in the account management method in the blockchain network provided by the embodiment, the number of transaction receivers is multiple; respectively initiating verification transactions for verifying the second account to a plurality of transaction receivers through the second account; and when the sum of the number of the verification passes of the transaction receivers to the verification transaction reaches a preset threshold, the verification passes. In this embodiment, after the preset number of verification transactions pass, the user may acquire the control right of the first account in the second account, so that the security is higher.
A fourth embodiment of the invention relates to a method of account verification in a blockchain network. In this embodiment, a verification transaction for verifying an account to be verified is received; the verification transaction comprises historical transaction information and a secret password; acquiring an encryption secret phrase in the historical transaction according to the historical transaction information; wherein the encrypted secret is generated based on the secret password; according to the encrypted secret words and the secret word password in the verification transaction, performing verification operation on the account to be verified; and the account to be verified is used for acquiring the control right of the first account using the secret password after the verification is passed.
In the embodiment, after receiving a verification transaction for verifying an account to be verified, the encryption whisper in the historical transaction is obtained according to historical transaction information included in the verification transaction; and then, according to the secret language password included in the verification transaction and the obtained encrypted secret language, performing verification operation on the account to be verified. If the verification is passed, the fact that the account to be verified and the first account using the secret password are the same in the used secret password is shown, and the secret password is only known by the transaction initiator, so that after the verification is passed, the account to be verified can acquire the control right of the first account using the secret password, the user can find back the related information of the account in the lost account, and the asset loss of the user caused by the loss of the account private key can be avoided.
The following describes implementation details of the account verification method in the blockchain network according to this embodiment in detail, and the following description is only provided for facilitating understanding of the implementation details and is not necessary to implement the present solution.
A flowchart of an account verification method in a blockchain network in the present embodiment is shown in fig. 4, and includes:
The verification transaction comprises historical transaction information and a secret password. The account to be authenticated is specifically an account newly applied after the private key of the first account of the user is lost.
Specifically, the secret language password included in the verification transaction may be a hash value of the secret language password, specifically, the verification transaction may include second information obtained by encrypting the hash value of the secret language password with a public key of a transaction receiver, and a data structure of the second information may be: the transaction recipient public key (SHA256 (passphrase password)). The verification transaction may include, but is not limited to: the first asset retrieval transaction flow, the historical transaction signature, the first account information, the transaction receiver account information, the second account information and the private key signature of the second account are used for uniquely identifying the verification transaction; the second account referred to herein is the account to be authenticated. The encrypted secret language comprises a hash value of the secret language password, so that users except the transaction initiator cannot know the specific content of the secret language password, and the secret language password of the transaction initiator cannot be leaked.
And step 402, acquiring an encryption secret word in the historical transaction according to the historical transaction information. Wherein the encrypted secret is generated based on the secret password.
Specifically, the encryption lingo in this embodiment may be: and the encrypted secret words are obtained by encrypting the hash value of the first information through the public key of the transaction receiver. The first information may include: a hash value that uniquely identifies a transaction pipeline of transactions, first account information, transaction recipient account information, asset transfer information, and a passphrase password. In this embodiment, the specific content of the secret password may be related to the transaction or unrelated to the transaction, and is similar to the password hint information, which is equivalent to generating a transaction token that cannot be known by a third party other than the transaction initiator.
In addition, the historical transaction information in the present embodiment may include, but is not limited to, the following information: a transaction pipeline for uniquely identifying a transaction, the first account information, transaction recipient account information, asset transfer information, and a private key signature of the first account. The historical transaction information comprises the private key signature of the first account, so that the security and the legality of the transaction can be ensured.
And 403, executing verification operation on the account to be verified according to the encrypted secret words and the secret word password in the verification transaction.
And the account to be verified is used for acquiring the control right of the first account using the secret password after the verification is passed.
Specifically, this step 403 may include the following sub-steps, and its specific flowchart is shown in fig. 5:
and a substep 4031, decrypting the encrypted secret words in the historical transaction information by using the private key of the transaction receiver, and obtaining the hash value of the first information after decryption.
Specifically, if the encryption linguistics in the historical transaction information are: and a public key of the transaction receiver (SHA256 (transaction flow + first account information + transaction receiver account information + asset transfer information + SHA256 (eastern bright pearl))), decrypting the encrypted secret words by using the private key of the transaction receiver to obtain a hash value of first information, wherein the hash value is as follows: SHA256 (transaction flow + first account information + transaction recipient account information + asset transfer information + SHA256 (pearl eastern).
Wherein the first information may include: a hash value that uniquely identifies a transaction pipeline of transactions, first account information, transaction recipient account information, asset transfer information, and a passphrase password.
And a substep 4032, decrypting the second information with the private key of the transaction receiver to obtain the hash value of the secret password.
If the hash value of the secret password is encrypted by the public key of the transaction receiver to obtain second information, the data structure of the second information is as follows: the transaction recipient public key (SHA256 (passphrase password)). Then, the second information is decrypted by using the private key of the transaction receiver, and the obtained hash value of the secret password is as follows: (SHA256 (secret password)).
Note that the order of execution of sub-step 4031 and sub-step 4032 is not limited in this embodiment.
And a substep 4033 for obtaining third information in the historical transaction information.
Wherein the third information may include: historical transaction flow, first account information, transaction recipient account information, and asset transfer information.
Sub-step 4034, a hash value of a combination of the third information and the hash value of the password is calculated.
Through the third information obtained in sub-step 4033 and the secret password obtained in sub-step 4032, a hash value of a combination of hash values of the third information and the secret password in this step can be obtained, and the calculated hash value can be represented as: SHA256 (historical transaction flow + first account information + transaction recipient account information + asset transfer information + (SHA256 (whisper password)).
And a substep 4035, determining that the verification is passed if the calculated hash value is consistent with the hash value of the decrypted first information.
Specifically, the hash value of the first information obtained in sub-step 4031 is: SHA256 (trade pipelining + first account information + transaction recipient account information + asset transfer information + SHA256 (pearl eastern)); the hash value calculated in sub-step 4034 is: the method comprises the steps of carrying out encryption and decryption on a secret language password, carrying out encryption and decryption on the secret language password, carrying out SHA256 (historical transaction flow + first account information + transaction receiver account information + asset transfer information + (SHA256 (secret language password)), if the calculated hash value is consistent with the hash value of the first information obtained after decryption, indicating that the secret language password in the verification transaction is also 'eastern bright bead', judging that the first account belongs to the user and the verification is passed because the specific content of the secret language password is only known by a transaction initiator, and finishing the process if the verification fails.
In a specific embodiment, after the verification is determined to pass, the result of passing the verification can be issued to the blockchain network, so that when the total number of the passed verification reaches the preset threshold, the blockchain network determines that the account to be verified passes the verification. Wherein the result of the verification may specifically be a second asset recovery transaction. The second asset recovery transaction referred to herein may include, but is not limited to: the second asset retrieval transaction pipeline, the first account information, the second account information, the transaction asset information, the transaction weight, and the transaction receiver signature. And sending the data packet of the second asset recovery transaction to the second account, so that the second account acquires the control right of the first account.
Compared with the prior art, the account verification method in the blockchain network provided by the embodiment obtains the encrypted secret words in the historical transactions according to the historical transaction information included in the verification transactions after the verification transactions for verifying the accounts to be verified are received; and then, according to the secret language password included in the verification transaction and the obtained encrypted secret language, performing verification operation on the account to be verified. If the verification is passed, the fact that the account to be verified and the first account using the secret password are the same in the used secret password is shown, and the secret password is only known by the transaction initiator, so that after the verification is passed, the account to be verified can acquire the control right of the first account using the secret password, the user can find back the related information of the account in the lost account, and the asset loss of the user caused by the loss of the account private key can be avoided.
It should be noted that this embodiment is a method example corresponding to any one of the first to third embodiments, and may be implemented in cooperation with any one of the first to third embodiments. The related technical details mentioned in the first embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first embodiment.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A fifth embodiment of the present invention is directed to a terminal device, as shown in fig. 6, including: at least one processor 501; and a memory 502 communicatively coupled to the at least one processor 501; wherein the memory 502 stores instructions executable by the at least one processor 501, the instructions being executable by the at least one processor 501 to enable the at least one processor 501 to perform a method of account management in a blockchain network as in any of the first to third embodiments, or to perform a method of account verification in a blockchain network as in the fourth embodiment.
The memory 502 and the processor 501 are coupled by a bus, which may include any number of interconnected buses and bridges that couple one or more of the various circuits of the processor 501 and the memory 502 together. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 501 is transmitted over a wireless medium through an antenna, which further receives the data and transmits the data to the processor 501.
The processor 501 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 502 may be used to store data used by processor 501 in performing operations.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.
Claims (16)
1. A method for account management in a blockchain network, comprising:
when a transaction is initiated to a transaction receiver through a first account, carrying an encrypted secret generated based on a secret password in transaction information;
after the secret key of the first account is lost, initiating a verification transaction for verifying the second account to the transaction receiver through the second account, wherein the verification transaction comprises historical transaction information and the secret language password, and the transaction receiver executes verification operation on the second account according to the secret language password and the encrypted secret language in the historical transaction information;
and after the verification is passed, the second account acquires the control right of the first account.
2. The method of claim 1, wherein the encryption linger is specifically: the encrypted secret words are obtained by encrypting the hash value of the first information through the public key of the transaction receiver;
the first information specifically includes:
a hash value of the transaction pipeline, the first account information, transaction recipient account information, asset transfer information, and the secret password for uniquely identifying a transaction;
the secret password included in the verification transaction is specifically: a hash value of the lingo password.
3. The method of claim 2, wherein the hash value of the whisper password included in the validation transaction is specifically: and the second information is obtained by encrypting the hash value of the secret password by the public key of the transaction receiver.
4. The account management method in a blockchain network according to claim 3, wherein the verifying the transaction specifically includes:
the first asset retrieval transaction flow, the historical transaction signature, the first account information, the transaction receiver account information, the second account information and the private key signature of the second account are used for uniquely identifying the verification transaction.
5. The method of account management in a blockchain network of claim 1, wherein the transaction information further comprises:
a transaction pipeline for uniquely identifying a transaction, the first account information, transaction recipient account information, asset transfer information, and a private key signature of the first account.
6. The method for account management in a blockchain network according to any one of claims 1 to 5, wherein before the initiating a verification transaction for verifying the second account to the transaction receiver through the second account, the method further comprises:
selecting a transaction receiver meeting preset conditions as a target transaction receiver;
the initiating a verification transaction for verifying the second account to the transaction receiver through the second account specifically includes: and initiating a verification transaction for verifying the second account to the target transaction receiver through the second account.
7. The account management method in a blockchain network according to any one of claims 1 to 5, wherein the number of the transaction recipients is plural;
the initiating a verification transaction for verifying the second account to the transaction receiver through the second account specifically includes:
respectively initiating verification transactions for verifying the second account to the plurality of transaction receivers through the second account;
the verification is passed, and specifically comprises the following steps: the sum of the number of the transaction receivers passing the verification of the verification transaction reaches a preset threshold.
8. A method of account verification in a blockchain network, comprising:
receiving a verification transaction for verifying an account to be verified; the verification transaction comprises historical transaction information and a secret password;
acquiring an encryption secret phrase in the historical transaction according to the historical transaction information; wherein the encrypted secret is generated based on a secret password;
according to the encrypted secret words and the secret word password in the verification transaction, performing verification operation on the account to be verified; and the account to be verified is used for acquiring the control right of the first account using the secret password after verification passes.
9. The account verification method in a blockchain network according to claim 8, wherein the encryption lingo is specifically: the encrypted secret words are obtained by encrypting the hash value of the first information through the public key of the transaction receiver;
the first information specifically includes:
a hash value of the transaction pipeline, the first account information, transaction recipient account information, asset transfer information, and the secret password for uniquely identifying a transaction;
the secret password included in the verification transaction is specifically: a hash value of the lingo password.
10. The method of claim 9, wherein the hash value of the whisper password included in the validation transaction is specifically: and the second information is obtained by encrypting the hash value of the secret password by the public key of the transaction receiver.
11. The method of claim 10, wherein the validating the transaction comprises:
a first asset retrieval transaction pipeline, a historical transaction signature, the first account information, transaction receiver account information, the second information, second account information, a private key signature of the second account for uniquely identifying the verification transaction; and the second account is the account to be verified.
12. The method of account validation in a blockchain network of claim 8, wherein the historical transaction information further includes: a transaction pipeline for uniquely identifying a transaction, the first account information, transaction recipient account information, asset transfer information, and a private key signature of the first account.
13. The method according to claim 10, wherein the performing a verification operation on the account to be verified according to the encrypted secret and the secret password in the verification transaction comprises:
decrypting the encrypted secret words in the historical transaction information by using a private key of a transaction receiver to obtain a hash value of the first information after decryption; decrypting the second information by using a private key of a transaction receiver to obtain a hash value of the secret language password;
acquiring third information in the historical transaction information; the third information specifically includes: historical transaction pipelining, the first account information, transaction receiver account information and asset transfer information;
calculating a hash value of a combination of the third information and the hash value of the whisper password;
and if the hash value obtained by calculation is consistent with the hash value of the first information obtained after decryption, judging that the verification is passed.
14. The method of account validation in a blockchain network of claim 13, further comprising, after said determining that validation passed:
and issuing the verification passing result to the block chain network, so that the block chain network judges that the account to be verified passes the verification when the sum of the verification passing numbers reaches a preset threshold.
15. The method of account validation in a blockchain network of claim 14, wherein the result of the validation is specifically a second asset retrieval transaction; the second asset recovery transaction specifically comprises:
the second asset retrieval transaction pipeline, the first account information, the second account information, the transaction asset information, the transaction weight and the transaction receiver signature; and the second account information is to-be-verified account information.
16. A terminal device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of account management in a blockchain network as claimed in any one of claims 1 to 7 or to perform a method of account verification in a blockchain network as claimed in any one of claims 8 to 15.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910191172.4A CN110070363B (en) | 2019-03-13 | 2019-03-13 | Account management method and verification method in block chain network and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910191172.4A CN110070363B (en) | 2019-03-13 | 2019-03-13 | Account management method and verification method in block chain network and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110070363A CN110070363A (en) | 2019-07-30 |
CN110070363B true CN110070363B (en) | 2021-08-06 |
Family
ID=67366307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910191172.4A Active CN110070363B (en) | 2019-03-13 | 2019-03-13 | Account management method and verification method in block chain network and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110070363B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110912702B (en) * | 2019-10-25 | 2022-05-10 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on hidden social relationship |
CN111476571B (en) | 2020-04-02 | 2023-09-15 | 百度国际科技(深圳)有限公司 | Asset processing method, device, equipment and storage medium based on blockchain |
CN111476572B (en) * | 2020-04-09 | 2024-03-19 | 财付通支付科技有限公司 | Block chain-based data processing method, device, storage medium and equipment |
CN111461721A (en) * | 2020-04-16 | 2020-07-28 | 北京俩撇科技有限公司 | Block chain-based method and device for protecting account and verifying transaction |
CN111639923B (en) * | 2020-05-07 | 2023-09-29 | 杭州云象网络技术有限公司 | Digital currency transaction accounting method and system based on zero knowledge proof |
CN111861475B (en) * | 2020-08-04 | 2024-09-24 | 上海信联信息发展股份有限公司 | Transaction recovery method and device for digital asset and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286256A (en) * | 2008-05-01 | 2008-10-15 | 包国文 | Self-help bank card theftproof system and its data processing method |
CN101299254A (en) * | 2008-06-16 | 2008-11-05 | 李丽丽 | Payment system and payment method thereof |
CN101651675A (en) * | 2009-08-27 | 2010-02-17 | 北京飞天诚信科技有限公司 | Method and system for enhancing security of network transactions |
CN101777158A (en) * | 2010-01-13 | 2010-07-14 | 北京飞天诚信科技有限公司 | Method and system for secure transaction |
CN102096880A (en) * | 2011-01-27 | 2011-06-15 | 深圳市农产品股份有限公司 | Electronic settlement transaction background management system and settlement methods |
CN109345259A (en) * | 2018-09-29 | 2019-02-15 | 腾讯科技(深圳)有限公司 | Virtual resource transfer method, device, medium and electronic equipment based on block chain |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AUPS087602A0 (en) * | 2002-03-04 | 2002-03-28 | Ong, Yong Kin (Michael) | Electronic fund transfer system |
CN101000673A (en) * | 2006-01-13 | 2007-07-18 | 蒋利 | Confirmation system and method for user transaction password |
CN103944730A (en) * | 2014-04-25 | 2014-07-23 | 天地融科技股份有限公司 | Data security interactive system |
US11113687B2 (en) * | 2015-12-15 | 2021-09-07 | Mastercard International Incorporated | System for performing cross card authentication using wallet transaction authentication history |
CN107066893B (en) * | 2017-02-28 | 2018-11-09 | 腾讯科技(深圳)有限公司 | The treating method and apparatus of account information in block chain |
CN107609876A (en) * | 2017-08-18 | 2018-01-19 | 北京云知科技有限公司 | A kind of method and system for recovering block chain assets |
CN108512661A (en) * | 2018-04-02 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of safety protecting method of block chain private key for user |
CN108764907B (en) * | 2018-05-30 | 2022-03-01 | 招商银行股份有限公司 | Asset retrieving method, system and computer readable storage medium |
CN108876332B (en) * | 2018-06-04 | 2020-09-22 | 清华大学 | Block chain safe transaction method and device based on biometric feature mark authentication |
CN109246208B (en) * | 2018-08-29 | 2020-12-29 | 杭州秘猿科技有限公司 | Decentralized application account recovery method, device and system |
-
2019
- 2019-03-13 CN CN201910191172.4A patent/CN110070363B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286256A (en) * | 2008-05-01 | 2008-10-15 | 包国文 | Self-help bank card theftproof system and its data processing method |
CN101299254A (en) * | 2008-06-16 | 2008-11-05 | 李丽丽 | Payment system and payment method thereof |
CN101651675A (en) * | 2009-08-27 | 2010-02-17 | 北京飞天诚信科技有限公司 | Method and system for enhancing security of network transactions |
CN101777158A (en) * | 2010-01-13 | 2010-07-14 | 北京飞天诚信科技有限公司 | Method and system for secure transaction |
CN102096880A (en) * | 2011-01-27 | 2011-06-15 | 深圳市农产品股份有限公司 | Electronic settlement transaction background management system and settlement methods |
CN109345259A (en) * | 2018-09-29 | 2019-02-15 | 腾讯科技(深圳)有限公司 | Virtual resource transfer method, device, medium and electronic equipment based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110070363A (en) | 2019-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110070363B (en) | Account management method and verification method in block chain network and terminal equipment | |
US11877213B2 (en) | Methods and systems for asset obfuscation | |
CN110519260B (en) | Information processing method and information processing device | |
JP6882254B2 (en) | Safety verification methods based on biological characteristics, client terminals, and servers | |
CN111756533B (en) | System, method and storage medium for secure password generation | |
CN111034120B (en) | Encryption key management based on identity information | |
US9864983B2 (en) | Payment method, payment server performing the same and payment system performing the same | |
EP3255832B1 (en) | Dynamic encryption method, terminal and server | |
AU2013101034A4 (en) | Registration and authentication of computing devices using a digital skeleton key | |
US8086868B2 (en) | Data communication method and system | |
EP3257194A1 (en) | Systems and methods for securely managing biometric data | |
KR20220117211A (en) | Contactless Card Personal Identification System | |
JP2017175244A (en) | 1:n biometric authentication, encryption, and signature system | |
CN110381055B (en) | RFID system privacy protection authentication protocol method in medical supply chain | |
CN112653556B (en) | TOKEN-based micro-service security authentication method, device and storage medium | |
CN103546289A (en) | USB (universal serial bus) Key based secure data transmission method and system | |
CN111130798B (en) | Request authentication method and related equipment | |
CN1322431C (en) | Encryption retention and data retrieve based on symmetric cipher key | |
US20170076285A1 (en) | Payment Method and Apparatus and Payment Factor Processing Method and Apparatus | |
CN111242611A (en) | Method and system for recovering digital wallet key | |
CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
CN110999254A (en) | Securely performing cryptographic operations | |
US20190349198A1 (en) | Automated authentication of a new network element | |
CN110431803B (en) | Managing encryption keys based on identity information | |
CN112769789B (en) | Encryption communication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |