CN106909852B - Intelligent contract encryption method and device based on triple md5 encryption algorithms - Google Patents

Intelligent contract encryption method and device based on triple md5 encryption algorithms Download PDF

Info

Publication number
CN106909852B
CN106909852B CN201710129301.8A CN201710129301A CN106909852B CN 106909852 B CN106909852 B CN 106909852B CN 201710129301 A CN201710129301 A CN 201710129301A CN 106909852 B CN106909852 B CN 106909852B
Authority
CN
China
Prior art keywords
character
character string
password
encryption
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710129301.8A
Other languages
Chinese (zh)
Other versions
CN106909852A (en
Inventor
毛明扬
肖红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201710129301.8A priority Critical patent/CN106909852B/en
Publication of CN106909852A publication Critical patent/CN106909852A/en
Application granted granted Critical
Publication of CN106909852B publication Critical patent/CN106909852B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/188Electronic negotiation

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a kind of intelligent contract encryption methods and device based on triple md5 encryption algorithms, the embodiment of the present invention is used for the encryption of electronic contract, transaction cost can be reduced, making the encryption of signer and electronic contract is one-to-one relationship, stranger can not distort, I can not break the promise, and can apply in block chain technology in future, and can be used in many transaction Internet-based.Specifically, md5 encryption algorithm have preferable safety, apply in electronic contract, it can be achieved that digital signature, file integrality verifying and in terms of.

Description

Intelligent contract encryption method and device based on triple md5 encryption algorithms
Technical field
The present invention relates to intelligent contract field of encryption more particularly to a kind of intelligent contracts based on triple md5 encryption algorithms Encryption method and device.
Background technique
Into after 21 century, Internet technology is propagated its belief on a large scale, and is established on internet and digital-scrambling techniques basis Digital cash rises, associated some Floor layer Technologies, as block chain technology and distributed bookkeeping methods come one after the other.Number Word currency not only has public credibility as bank note, but also can further decrease operating cost, and behind, which all runs, to be gone Heart mechanism, it is main that trust systems are established by distributed bookkeeping methods.One complete block chain application, contains super account Originally, intelligent contract, secret protection and common recognition this four key technologies of algorithm, it is ensured that the safe transfer of commercial assets, ensures Enterprise core business properly stores contract, and has high secret protection technology, can guarantee that any data are not blocked halfway It cuts, the potential security risk of reduction hacker attacks to system failure.
Block chain is a kind of digital account book, and for recording transaction or other data on internet, it has unusual The characteristics of: firstly, Encryption Design eliminate the record in block chain can not;Secondly, block chain can be by one group of company or a People carries out sharing operation together, this controls certain significant datas no longer by single entity or system.Many governments and grand duke Block chain technology is currently explored by department, this is not the data conjunction because wanting using bit coin, but excellent because of block chain Make mode.Block chain can make financial transaction, digital health record and manufacturing supply chain become more efficient and powerful.
Block chain can make the cooperation between company highly efficient and safe, data safely can be placed on one and shared Neutral Systems on, rather than be locked in some private system.
The rise of mobile Internet, greatly facilitates people's lives, from e-commerce, mobile social activity, then into life Clothing, food, lodging and transportion -- basic necessities of life, internet is overturned and is impacted to traditional industries further progress.In Internet world, people can be mutual Trade oneself extra thing or exhaustless thing are carried out, such as in energy internet, everyone produces renewable If the energy cannots be used up, it can trade with others, the process of transaction is stored in block chain node.Since there is transaction, just Contract is had, and the bargain transaction in reality also has contract.In order to reduce the cost of Contract Signing, the electricity based on intelligent contract Sub- contract is expected in popularization and application in future.
Intelligent contract is a kind of contract that record clause is removed with computer language substitution legal language.Intelligent contract can be by One computing system executes automatically.If block chain is a database, intelligent contract is to make block chain technical application Application layer in reality.Traditional contract does not join directly with the computer code for executing treaty content generally System.Papery contract is in most cases archived, and software understands the contract item that execution computer code form is write Money.The potential benefit of intelligent contract includes reducing the cost for signing contract, execution and supervision aspect;Therefore, to many low values It trades for relevant contract, this can greatly reduce human cost.
It therefore it provides a kind of can make contractor that can not deny contracted electronic contract, and pretend to be other people can not I signs, so that electronic contract and contractor are one-to-one relationships, the encryption method for making intelligent contract come into force is this Field technical staff's technical issues that need to address.
Summary of the invention
The embodiment of the invention provides a kind of intelligent contract encryption methods and device based on triple md5 encryption algorithms, can So that contractor can not deny contracted electronic contract, and make other people that me can not be pretended to be to sign, therefore electronic contract It is one-to-one relationship with contractor, so that intelligent contract be made to come into force.
The embodiment of the invention provides a kind of intelligent contract encryption methods based on triple md5 encryption algorithms, comprising:
S1: getting user account, user password and contract number, by md5 encryption algorithm according to the user account, institute It states user password and the contract number generates the first character string, the second character string and third character string;
S2: first character string, second character string and the third character string are merged into the 4th character string;
S3: the difference L between presetting cipher length and preset character types quantity is calculated, is taken in the 4th character string The character string of preceding L character obtains the 5th as password initial value, and in the character string that the 4th character string intercepted length is L Character string;
S4: judging whether the character types that the password initial value includes meet preset character types condition, if not satisfied, time It goes through the 5th character string, chooses in the 5th character string first and meet the character of preset character types condition, will meet The character of preset character types condition is put into the password initial value, and re-executes S4, if satisfied, by the beginning of the password Value is used as password, and executes S5;
S5: judging whether the length of the password is equal to the presetting cipher length and terminates if being equal to, if being not equal to, It then chooses in the 5th character string first and meets the character of preset character types condition, preset character types condition will be met The character be put into the password, and S5 is re-executed, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user password, the contract number.
Preferably, the third character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
Preferably, the embodiment of the invention also provides a kind of intelligent contract encryption device based on triple md5 encryption algorithms, Include:
Generation unit, for getting user account, user password and contract number, through md5 encryption algorithm according to User account, the user password and the contract number generate the first character string, the second character string and third character string;
Combining unit, for first character string, second character string and the third character string to be merged into Four character strings;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, the described 4th The character string of L character is the character of L as password initial value, and in the 4th character string intercepted length before taking in character string String, obtains the 5th character string;
First judging unit, for judging whether the character types that the password initial value includes meet preset character type profile bar Part, if not satisfied, traversing the 5th character string, first meets preset character types condition in selection the 5th character string Character, the character for meeting preset character types condition is put into the password initial value, and retriggered first judge Unit, if satisfied, using the password initial value as password, and trigger second judgment unit;
Second judgment unit, for judging whether the length of the password is equal to the presetting cipher length, if being equal to, Terminate, if being not equal to, choose in the 5th character string first and meet the character of preset character types condition, will meet pre- The character for setting character types condition is put into the password, and retriggered second judgment unit, until the password Length is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user password, the contract number.
Preferably, the third character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
The embodiment of the invention provides a kind of intelligent contract encryption method and device based on triple md5 encryption algorithms, In, being somebody's turn to do the intelligent contract encryption method based on triple md5 encryption algorithms includes: S1: getting user account, user password and conjunction Jack per line, by md5 encryption algorithm according to the user account, the user password and the contract number generate the first character string, Second character string and third character string;S2: first character string, second character string and the third character string are merged At the 4th character string;S3: the difference L between presetting cipher length and preset character types quantity is calculated, in the 4th character The character string of L character is obtained as password initial value, and in the character string that the 4th character string intercepted length is L before taking in string To the 5th character string;S4: judging whether the character types that the password initial value includes meet preset character types condition, if discontented Foot traverses the 5th character string, chooses in the 5th character string first and meets the character of preset character types condition, will The character for meeting preset character types condition is put into the password initial value, and re-executes S4, if satisfied, by described close Code initial value executes S5 as password;S5: judging whether the length of the password is equal to the presetting cipher length, if being equal to, Then terminate, if being not equal to, chooses in the 5th character string first and meet the character of preset character types condition, will meet The character of preset character types condition is put into the password, and re-executes S5, until the length of the password is equal to The presetting cipher length;Wherein, L=1,2,3 ... n.
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms provided in an embodiment of the present invention is used for The encryption of electronic contract can reduce transaction cost, and making the encryption of signer and electronic contract is one-to-one relationship, Wai Renwu Method is distorted, I can not break the promise, and can apply in block chain technology in future, and can be used in and be much based on internet Transaction in.Specifically, md5 encryption algorithm have preferable safety, apply in electronic contract, it can be achieved that digital signature, File integrality verifying and password encryption etc..
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of stream of the intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention Journey schematic diagram;
Fig. 2 is a kind of knot of the intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention Structure schematic diagram.
Specific embodiment
The embodiment of the invention provides a kind of intelligent contract encryption methods and device based on triple md5 encryption algorithms, can So that contractor can not deny contracted electronic contract, and make other people that me can not be pretended to be to sign, therefore electronic contract It is one-to-one relationship with contractor, so that intelligent contract be made to come into force.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention Range.
Referring to Fig. 1, a kind of intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention One embodiment, comprising:
101, user account, user password and contract number are got, by md5 encryption algorithm according to user account, user Password and contract number generate the first character string, the second character string and third character string;
Get user account, user password and contract number, by call three times md5 encryption algorithm according to user account, User password and contract number generate the first character string, the second character string and third character string.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user password, contract number.
Further, third character string is corresponding with contract number.
102, the first character string, the second character string and third character string are merged into the 4th character string;
After obtaining the first character string, the second character string and third character string, by the first character string, the second character string and Three character strings are merged into the 4th character string.
103, the difference L, L before taking in the 4th character string between presetting cipher length and preset character types quantity are calculated The character string of a character obtains the 5th character string as password initial value, and in the character string that the 4th character string intercepted length is L;
After obtaining the 4th character string, the difference L between presetting cipher length and preset character types quantity is calculated, the The character string of L character is the character string of L as password initial value, and in the 4th character string intercepted length before taking in four character strings, Obtain the 5th character string, wherein L=1,2,3 ... n.
In the present embodiment, presetting cipher length is 6 or 8 or 10 or 16, herein without limitation.
104, judge whether the character types that password initial value includes meet preset character types condition, if not satisfied, traversal 5th character string chooses first character for meeting preset character types condition in the 5th character string, will meet preset character type The character of profile bar part is put into password initial value, and re-executes 104, if satisfied, using password initial value as password, and execute 105;
After obtaining the 5th character string, judge whether the character types that password initial value includes meet preset character types condition, If not satisfied, traversing the 5th character string, first meets the character of preset character types condition in the 5th character string of selection, will expire The character of the preset character types condition of foot is put into password initial value, and re-execute the steps 104, if satisfied, password initial value is made For password, and execute step 105.
105, judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, choose First meets the character of preset character types condition in 5th character string, and the character for meeting preset character types condition is put into In password, and 105 are re-executed, until the length of password is equal to presetting cipher length.
Judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, chooses the 5th First meets the character of preset character types condition in character string, and the character for meeting preset character types condition is put into password In, and 105 are re-execute the steps, until the length of password is equal to presetting cipher length.
The above is the detailed description that the intelligent contract encryption method to a kind of based on triple md5 encryption algorithms carries out, for just In understanding, below by the answering to a kind of intelligent contract encryption method based on triple md5 encryption algorithms with a concrete application scene With being illustrated, application examples includes:
(1) account and password that input user uses.
(2) user inputs contract number to his each contract for needing to generate Crypted password.
(3) Crypted password that selection generates, digit N in need, usually 6,8,10,16 length.
The requirement of password is generated, generally in need to capitalize, need small letter, need number, needs special, we are for selecting It selects and needs to generate number of types and be denoted as n.
(4) algorithm:
X=md5 (account+contract number);
X1=md5 (password+contract number);
X2=md5 (contract number).
Generate one section of character string s=x [0,1], x1 [0,1], x2 [0,1], x [2,3] ....
(5) L=N-n is enabled, L indicates length, and N is exactly the length for needing to generate password, and n is exactly Selective type number, using must There need be type, if the character taken out does not have type to select, finally add type.
(6) it takes password k=s [0, L], k=s [0, L] indicates the substring for taking L character before character string S as password initial value. If k has the type not comprising selection, continuation is looked in s [L], is found the type of first selection, is put into k, Zhi Daosuo There is type to be all found, S [L] indicates the character string that interception character string S length is L.
Wherein, the character in password string need to finally have n seed type, but initial value K may not include n seed type, So the character for the type for not including is added at end, so traversal finds first and different types of character in S [L] It is added to the end of k character string, is mainly found with the method for traversal.
(7) if at this moment the length of password is less than N, the character of s [L] is taken down, until Password Length is N.
The position the N character string password of password and account and contract number of the embodiment of the present invention based on contractor, generation has Uniqueness, and have one-to-one relationship with the account of contractor and password and contract number.Contractor, which generally uses, oneself to be remembered Account firmly and password sign to electronic contract, are encrypted in this way using the intelligent contract based on triple md5 encryption algorithms Technology N character string generated encrypts contract, and the encryption of the first contract is high;Second contractor can not deny and be signed Contract about, to prevent fraud.
The application example is carried out by following core code:
Referring to Fig. 2, a kind of intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention One embodiment, comprising:
Generation unit 201, for getting user account, user password and contract number, by md5 encryption algorithm according to Family account, user password and contract number generate the first character string, the second character string and third character string;
Combining unit 202, for the first character string, the second character string and third character string to be merged into the 4th character string;
Computing unit 203, for calculating the difference L between presetting cipher length and preset character types quantity, the 4th The character string of L character is obtained as password initial value, and in the character string that the 4th character string intercepted length is L before taking in character string To the 5th character string;
First judging unit 204, for judging whether the character types that password initial value includes meet preset character type profile bar Part, if not satisfied, traversing the 5th character string, first meets the character of preset character types condition in the 5th character string of selection, The character for meeting preset character types condition is put into password initial value, and the first judging unit of retriggered 204, if satisfied, Using password initial value as password, and trigger second judgment unit 205;
Second judgment unit 205 if being equal to, terminates for judging whether the length of password is equal to presetting cipher length, If being not equal to, first meets the character of preset character types condition in the 5th character string of selection, will meet preset character type The character of profile bar part is put into password, and retriggered second judgment unit 205, until the length of password is long equal to presetting cipher Degree;
Wherein, L=1,2,3 ... n.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user password, contract number.
Further, third character string is corresponding with contract number.
Further, presetting cipher length is 6 or 8 or 10 or 16, herein without limitation.
The design cycle of the embodiment of the present invention is as follows:
User's account, password, contract number for inputting oneself first;Then md5 encryption algorithm is called three times, and parameter is respectively Account+contract number, password+contract number, contract number, obtaining three character strings is X, X1, X2, i.e. X=MD5 (account+contract respectively Number), X1=MD5 (password+contract number), X2=MD5 (contract number);Then one section of character string S=X [0,1] X1 [0,1] X2 is synthesized [0,1] X [2,3] X1 [2,3] X2 [2,3] ..., takes L=N-n, and wherein N is final digit, and n is character types;Remember K=S [0, L], if K has the type not comprising selection, continuation is looked in S [L], and the type for finding first selection is put into K In, until all types are all found.If at this moment the length of password is less than N, the character of S [L], Zhi Daomi are taken down Code length is N.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read- OnlyMemory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various to deposit Store up the medium of program code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of intelligent contract encryption method based on triple md5 encryption algorithms characterized by comprising
S1: getting user account, user password and contract number, by md5 encryption algorithm according to the user account, the use Family password and the contract number generate the first character string, the second character string and third character string;
S2: first character string, second character string and the third character string are merged into the 4th character string;
S3: the difference L, L before taking in the 4th character string between presetting cipher length and preset character types quantity are calculated The character string of a character obtains the 5th character as password initial value, and in the character string that the 4th character string intercepted length is L String;
S4: judging whether the character types that the password initial value includes meet preset character types condition, if not satisfied, traversal institute It states the 5th character string, chooses in the 5th character string first and meet the character of preset character types condition, will meet preset The character of character types condition is put into the password initial value, and re-executes S4, if satisfied, the password initial value is made For password, and execute S5;
S5: judging whether the length of the password is equal to the presetting cipher length and terminates if being equal to, if being not equal to, selects It takes in the 5th character string first to meet the character of preset character types condition, the institute of preset character types condition will be met It states character to be put into the password, and re-executes S5, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
2. the intelligent contract encryption method according to claim 1 based on triple md5 encryption algorithms, which is characterized in that institute It is corresponding with the user account, the contract number to state the first character string.
3. the intelligent contract encryption method according to claim 2 based on triple md5 encryption algorithms, which is characterized in that institute It is corresponding with the user password, the contract number to state the second character string.
4. the intelligent contract encryption method according to claim 3 based on triple md5 encryption algorithms, which is characterized in that institute It is corresponding with the contract number to state third character string.
5. the intelligent contract encryption method according to claim 1 based on triple md5 encryption algorithms, which is characterized in that institute Stating presetting cipher length is 6 or 8 or 10 or 16.
6. a kind of intelligent contract encryption device based on triple md5 encryption algorithms characterized by comprising
Generation unit, for getting user account, user password and contract number, by md5 encryption algorithm according to the user Account, the user password and the contract number generate the first character string, the second character string and third character string;
Combining unit, for first character string, second character string and the third character string to be merged into the 4th word Symbol string;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, in the 4th character The character string of L character is obtained as password initial value, and in the character string that the 4th character string intercepted length is L before taking in string To the 5th character string;
First judging unit, for judging whether the character types that the password initial value includes meet preset character types condition, If not satisfied, traversing the 5th character string, first meets preset character types condition in selection the 5th character string The character for meeting preset character types condition is put into the password initial value by character, and retriggered first judges list Member, if satisfied, using the password initial value as password, and trigger second judgment unit;
Second judgment unit is tied for judging whether the length of the password is equal to the presetting cipher length if being equal to Beam chooses in the 5th character string first and meets the character of preset character types condition, will meet preset if being not equal to The character of character types condition is put into the password, and retriggered second judgment unit, until the length of the password Degree is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
7. the intelligent contract encryption device according to claim 6 based on triple md5 encryption algorithms, which is characterized in that institute It is corresponding with the user account, the contract number to state the first character string.
8. the intelligent contract encryption device according to claim 7 based on triple md5 encryption algorithms, which is characterized in that institute It is corresponding with the user password, the contract number to state the second character string.
9. the intelligent contract encryption device according to claim 8 based on triple md5 encryption algorithms, which is characterized in that institute It is corresponding with the contract number to state third character string.
10. the intelligent contract encryption device according to claim 6 based on triple md5 encryption algorithms, which is characterized in that institute Stating presetting cipher length is 6 or 8 or 10 or 16.
CN201710129301.8A 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms Expired - Fee Related CN106909852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710129301.8A CN106909852B (en) 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710129301.8A CN106909852B (en) 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms

Publications (2)

Publication Number Publication Date
CN106909852A CN106909852A (en) 2017-06-30
CN106909852B true CN106909852B (en) 2019-11-08

Family

ID=59187018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710129301.8A Expired - Fee Related CN106909852B (en) 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms

Country Status (1)

Country Link
CN (1) CN106909852B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342858B (en) * 2017-07-05 2019-09-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
CN110020855B (en) * 2019-01-31 2020-05-29 阿里巴巴集团控股有限公司 Method, node and storage medium for realizing privacy protection in block chain
CN110096901B (en) * 2019-05-08 2021-04-02 北京智签科技有限公司 Electronic contract data encryption storage method and signing client
CN110264194B (en) * 2019-05-20 2021-05-28 创新先进技术有限公司 Receipt storage method and node based on event function type

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593332A (en) * 2008-05-28 2009-12-02 北京邮电大学 A kind of electronic contract management system and its implementation
CN103326991A (en) * 2012-03-20 2013-09-25 北京聚宝网络科技有限公司 Method for password encrypted storage and password authentication
CN103684758A (en) * 2013-11-05 2014-03-26 广东全通教育股份有限公司 User password mixing encryption method and system
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006003675A2 (en) * 2004-07-12 2006-01-12 Syed Ibrahim Abdul Hameed Khan System, method of generation and use of bilaterally generated variable instant passwords
US20070031009A1 (en) * 2005-04-15 2007-02-08 Julius Mwale Method and system for string-based biometric authentication
CN102983967B (en) * 2012-12-06 2015-09-02 厦门市美亚柏科信息股份有限公司 The complicated quick ergodic algorithm of password and device
US9237015B2 (en) * 2013-07-24 2016-01-12 Cisco Technology, Inc. Compact and efficient communication security through combining anti-replay with encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593332A (en) * 2008-05-28 2009-12-02 北京邮电大学 A kind of electronic contract management system and its implementation
CN103326991A (en) * 2012-03-20 2013-09-25 北京聚宝网络科技有限公司 Method for password encrypted storage and password authentication
CN103684758A (en) * 2013-11-05 2014-03-26 广东全通教育股份有限公司 User password mixing encryption method and system
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method

Also Published As

Publication number Publication date
CN106909852A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
CN106909852B (en) Intelligent contract encryption method and device based on triple md5 encryption algorithms
US11316696B2 (en) Hash subtrees for grouping components by component type
Singh et al. Blockchain: Future of financial and cyber security
US10560451B2 (en) Table-connected tokenization
CN106899698B (en) Cross-chain interoperation method between block chains
JP2023089207A (en) Consolidated blockchain-based data transfer control method and system
CN110709871A (en) Parameterizable intelligent contracts
CN109919756A (en) Fund transfer system, checking method and method of commerce based on Merkle tree backtracking location technology
JP2021532466A (en) Computer-enhanced methods, computer systems, and cryptocurrency depository to enable secure escrowing and storage of cryptocurrencies.
US20160092698A1 (en) Tokenization Column Replacement
CN112769567A (en) Block chain HD private key retrieving method
Homoliak et al. An air-gapped 2-factor authentication for smart-contract wallets
CN112970227A (en) Computer-implemented system and method including public key combination verification
KR102181098B1 (en) System and method for distributed database using block chain
Chaum et al. W-OTS+ up my sleeve! a hidden secure fallback for cryptocurrency wallets
RU2686818C1 (en) Method for scaling distributed information system
Chhabra et al. An overview of blockchain technology and comparison between various cryptocurrencies
Sharma et al. Blockchain Revolution: Adaptability in Business World and Challenges in Implementation
Maram Bitcoin generation using Blockchain technology
Bèatrix-May et al. Integrating blockchain technology in a cyber physical system to secure data
Nath et al. Impact of Blockchain to Secure E-Banking Transaction
CN109949036A (en) Secret protection endorsement method and device, verification method and device
Gupta et al. 5 Emergence of Big
Ravi et al. A Framework For Securing Online Transaction Through Block Chain
Soulaimani et al. Blockchain and hashing algorithms: A review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191108

Termination date: 20200306

CF01 Termination of patent right due to non-payment of annual fee