CN106909852B - Intelligent contract encryption method and device based on triple md5 encryption algorithms - Google Patents
Intelligent contract encryption method and device based on triple md5 encryption algorithms Download PDFInfo
- Publication number
- CN106909852B CN106909852B CN201710129301.8A CN201710129301A CN106909852B CN 106909852 B CN106909852 B CN 106909852B CN 201710129301 A CN201710129301 A CN 201710129301A CN 106909852 B CN106909852 B CN 106909852B
- Authority
- CN
- China
- Prior art keywords
- character
- character string
- password
- encryption
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000005516 engineering process Methods 0.000 abstract description 11
- 230000008901 benefit Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
- G06Q50/188—Electronic negotiation
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention discloses a kind of intelligent contract encryption methods and device based on triple md5 encryption algorithms, the embodiment of the present invention is used for the encryption of electronic contract, transaction cost can be reduced, making the encryption of signer and electronic contract is one-to-one relationship, stranger can not distort, I can not break the promise, and can apply in block chain technology in future, and can be used in many transaction Internet-based.Specifically, md5 encryption algorithm have preferable safety, apply in electronic contract, it can be achieved that digital signature, file integrality verifying and in terms of.
Description
Technical field
The present invention relates to intelligent contract field of encryption more particularly to a kind of intelligent contracts based on triple md5 encryption algorithms
Encryption method and device.
Background technique
Into after 21 century, Internet technology is propagated its belief on a large scale, and is established on internet and digital-scrambling techniques basis
Digital cash rises, associated some Floor layer Technologies, as block chain technology and distributed bookkeeping methods come one after the other.Number
Word currency not only has public credibility as bank note, but also can further decrease operating cost, and behind, which all runs, to be gone
Heart mechanism, it is main that trust systems are established by distributed bookkeeping methods.One complete block chain application, contains super account
Originally, intelligent contract, secret protection and common recognition this four key technologies of algorithm, it is ensured that the safe transfer of commercial assets, ensures
Enterprise core business properly stores contract, and has high secret protection technology, can guarantee that any data are not blocked halfway
It cuts, the potential security risk of reduction hacker attacks to system failure.
Block chain is a kind of digital account book, and for recording transaction or other data on internet, it has unusual
The characteristics of: firstly, Encryption Design eliminate the record in block chain can not;Secondly, block chain can be by one group of company or a
People carries out sharing operation together, this controls certain significant datas no longer by single entity or system.Many governments and grand duke
Block chain technology is currently explored by department, this is not the data conjunction because wanting using bit coin, but excellent because of block chain
Make mode.Block chain can make financial transaction, digital health record and manufacturing supply chain become more efficient and powerful.
Block chain can make the cooperation between company highly efficient and safe, data safely can be placed on one and shared
Neutral Systems on, rather than be locked in some private system.
The rise of mobile Internet, greatly facilitates people's lives, from e-commerce, mobile social activity, then into life
Clothing, food, lodging and transportion -- basic necessities of life, internet is overturned and is impacted to traditional industries further progress.In Internet world, people can be mutual
Trade oneself extra thing or exhaustless thing are carried out, such as in energy internet, everyone produces renewable
If the energy cannots be used up, it can trade with others, the process of transaction is stored in block chain node.Since there is transaction, just
Contract is had, and the bargain transaction in reality also has contract.In order to reduce the cost of Contract Signing, the electricity based on intelligent contract
Sub- contract is expected in popularization and application in future.
Intelligent contract is a kind of contract that record clause is removed with computer language substitution legal language.Intelligent contract can be by
One computing system executes automatically.If block chain is a database, intelligent contract is to make block chain technical application
Application layer in reality.Traditional contract does not join directly with the computer code for executing treaty content generally
System.Papery contract is in most cases archived, and software understands the contract item that execution computer code form is write
Money.The potential benefit of intelligent contract includes reducing the cost for signing contract, execution and supervision aspect;Therefore, to many low values
It trades for relevant contract, this can greatly reduce human cost.
It therefore it provides a kind of can make contractor that can not deny contracted electronic contract, and pretend to be other people can not
I signs, so that electronic contract and contractor are one-to-one relationships, the encryption method for making intelligent contract come into force is this
Field technical staff's technical issues that need to address.
Summary of the invention
The embodiment of the invention provides a kind of intelligent contract encryption methods and device based on triple md5 encryption algorithms, can
So that contractor can not deny contracted electronic contract, and make other people that me can not be pretended to be to sign, therefore electronic contract
It is one-to-one relationship with contractor, so that intelligent contract be made to come into force.
The embodiment of the invention provides a kind of intelligent contract encryption methods based on triple md5 encryption algorithms, comprising:
S1: getting user account, user password and contract number, by md5 encryption algorithm according to the user account, institute
It states user password and the contract number generates the first character string, the second character string and third character string;
S2: first character string, second character string and the third character string are merged into the 4th character string;
S3: the difference L between presetting cipher length and preset character types quantity is calculated, is taken in the 4th character string
The character string of preceding L character obtains the 5th as password initial value, and in the character string that the 4th character string intercepted length is L
Character string;
S4: judging whether the character types that the password initial value includes meet preset character types condition, if not satisfied, time
It goes through the 5th character string, chooses in the 5th character string first and meet the character of preset character types condition, will meet
The character of preset character types condition is put into the password initial value, and re-executes S4, if satisfied, by the beginning of the password
Value is used as password, and executes S5;
S5: judging whether the length of the password is equal to the presetting cipher length and terminates if being equal to, if being not equal to,
It then chooses in the 5th character string first and meets the character of preset character types condition, preset character types condition will be met
The character be put into the password, and S5 is re-executed, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user password, the contract number.
Preferably, the third character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
Preferably, the embodiment of the invention also provides a kind of intelligent contract encryption device based on triple md5 encryption algorithms,
Include:
Generation unit, for getting user account, user password and contract number, through md5 encryption algorithm according to
User account, the user password and the contract number generate the first character string, the second character string and third character string;
Combining unit, for first character string, second character string and the third character string to be merged into
Four character strings;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, the described 4th
The character string of L character is the character of L as password initial value, and in the 4th character string intercepted length before taking in character string
String, obtains the 5th character string;
First judging unit, for judging whether the character types that the password initial value includes meet preset character type profile bar
Part, if not satisfied, traversing the 5th character string, first meets preset character types condition in selection the 5th character string
Character, the character for meeting preset character types condition is put into the password initial value, and retriggered first judge
Unit, if satisfied, using the password initial value as password, and trigger second judgment unit;
Second judgment unit, for judging whether the length of the password is equal to the presetting cipher length, if being equal to,
Terminate, if being not equal to, choose in the 5th character string first and meet the character of preset character types condition, will meet pre-
The character for setting character types condition is put into the password, and retriggered second judgment unit, until the password
Length is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user password, the contract number.
Preferably, the third character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
The embodiment of the invention provides a kind of intelligent contract encryption method and device based on triple md5 encryption algorithms,
In, being somebody's turn to do the intelligent contract encryption method based on triple md5 encryption algorithms includes: S1: getting user account, user password and conjunction
Jack per line, by md5 encryption algorithm according to the user account, the user password and the contract number generate the first character string,
Second character string and third character string;S2: first character string, second character string and the third character string are merged
At the 4th character string;S3: the difference L between presetting cipher length and preset character types quantity is calculated, in the 4th character
The character string of L character is obtained as password initial value, and in the character string that the 4th character string intercepted length is L before taking in string
To the 5th character string;S4: judging whether the character types that the password initial value includes meet preset character types condition, if discontented
Foot traverses the 5th character string, chooses in the 5th character string first and meets the character of preset character types condition, will
The character for meeting preset character types condition is put into the password initial value, and re-executes S4, if satisfied, by described close
Code initial value executes S5 as password;S5: judging whether the length of the password is equal to the presetting cipher length, if being equal to,
Then terminate, if being not equal to, chooses in the 5th character string first and meet the character of preset character types condition, will meet
The character of preset character types condition is put into the password, and re-executes S5, until the length of the password is equal to
The presetting cipher length;Wherein, L=1,2,3 ... n.
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms provided in an embodiment of the present invention is used for
The encryption of electronic contract can reduce transaction cost, and making the encryption of signer and electronic contract is one-to-one relationship, Wai Renwu
Method is distorted, I can not break the promise, and can apply in block chain technology in future, and can be used in and be much based on internet
Transaction in.Specifically, md5 encryption algorithm have preferable safety, apply in electronic contract, it can be achieved that digital signature,
File integrality verifying and password encryption etc..
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of stream of the intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention
Journey schematic diagram;
Fig. 2 is a kind of knot of the intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention
Structure schematic diagram.
Specific embodiment
The embodiment of the invention provides a kind of intelligent contract encryption methods and device based on triple md5 encryption algorithms, can
So that contractor can not deny contracted electronic contract, and make other people that me can not be pretended to be to sign, therefore electronic contract
It is one-to-one relationship with contractor, so that intelligent contract be made to come into force.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below
Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field
Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention
Range.
Referring to Fig. 1, a kind of intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention
One embodiment, comprising:
101, user account, user password and contract number are got, by md5 encryption algorithm according to user account, user
Password and contract number generate the first character string, the second character string and third character string;
Get user account, user password and contract number, by call three times md5 encryption algorithm according to user account,
User password and contract number generate the first character string, the second character string and third character string.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user password, contract number.
Further, third character string is corresponding with contract number.
102, the first character string, the second character string and third character string are merged into the 4th character string;
After obtaining the first character string, the second character string and third character string, by the first character string, the second character string and
Three character strings are merged into the 4th character string.
103, the difference L, L before taking in the 4th character string between presetting cipher length and preset character types quantity are calculated
The character string of a character obtains the 5th character string as password initial value, and in the character string that the 4th character string intercepted length is L;
After obtaining the 4th character string, the difference L between presetting cipher length and preset character types quantity is calculated, the
The character string of L character is the character string of L as password initial value, and in the 4th character string intercepted length before taking in four character strings,
Obtain the 5th character string, wherein L=1,2,3 ... n.
In the present embodiment, presetting cipher length is 6 or 8 or 10 or 16, herein without limitation.
104, judge whether the character types that password initial value includes meet preset character types condition, if not satisfied, traversal
5th character string chooses first character for meeting preset character types condition in the 5th character string, will meet preset character type
The character of profile bar part is put into password initial value, and re-executes 104, if satisfied, using password initial value as password, and execute 105;
After obtaining the 5th character string, judge whether the character types that password initial value includes meet preset character types condition,
If not satisfied, traversing the 5th character string, first meets the character of preset character types condition in the 5th character string of selection, will expire
The character of the preset character types condition of foot is put into password initial value, and re-execute the steps 104, if satisfied, password initial value is made
For password, and execute step 105.
105, judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, choose
First meets the character of preset character types condition in 5th character string, and the character for meeting preset character types condition is put into
In password, and 105 are re-executed, until the length of password is equal to presetting cipher length.
Judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, chooses the 5th
First meets the character of preset character types condition in character string, and the character for meeting preset character types condition is put into password
In, and 105 are re-execute the steps, until the length of password is equal to presetting cipher length.
The above is the detailed description that the intelligent contract encryption method to a kind of based on triple md5 encryption algorithms carries out, for just
In understanding, below by the answering to a kind of intelligent contract encryption method based on triple md5 encryption algorithms with a concrete application scene
With being illustrated, application examples includes:
(1) account and password that input user uses.
(2) user inputs contract number to his each contract for needing to generate Crypted password.
(3) Crypted password that selection generates, digit N in need, usually 6,8,10,16 length.
The requirement of password is generated, generally in need to capitalize, need small letter, need number, needs special, we are for selecting
It selects and needs to generate number of types and be denoted as n.
(4) algorithm:
X=md5 (account+contract number);
X1=md5 (password+contract number);
X2=md5 (contract number).
Generate one section of character string s=x [0,1], x1 [0,1], x2 [0,1], x [2,3] ....
(5) L=N-n is enabled, L indicates length, and N is exactly the length for needing to generate password, and n is exactly Selective type number, using must
There need be type, if the character taken out does not have type to select, finally add type.
(6) it takes password k=s [0, L], k=s [0, L] indicates the substring for taking L character before character string S as password initial value.
If k has the type not comprising selection, continuation is looked in s [L], is found the type of first selection, is put into k, Zhi Daosuo
There is type to be all found, S [L] indicates the character string that interception character string S length is L.
Wherein, the character in password string need to finally have n seed type, but initial value K may not include n seed type,
So the character for the type for not including is added at end, so traversal finds first and different types of character in S [L]
It is added to the end of k character string, is mainly found with the method for traversal.
(7) if at this moment the length of password is less than N, the character of s [L] is taken down, until Password Length is N.
The position the N character string password of password and account and contract number of the embodiment of the present invention based on contractor, generation has
Uniqueness, and have one-to-one relationship with the account of contractor and password and contract number.Contractor, which generally uses, oneself to be remembered
Account firmly and password sign to electronic contract, are encrypted in this way using the intelligent contract based on triple md5 encryption algorithms
Technology N character string generated encrypts contract, and the encryption of the first contract is high;Second contractor can not deny and be signed
Contract about, to prevent fraud.
The application example is carried out by following core code:
Referring to Fig. 2, a kind of intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention
One embodiment, comprising:
Generation unit 201, for getting user account, user password and contract number, by md5 encryption algorithm according to
Family account, user password and contract number generate the first character string, the second character string and third character string;
Combining unit 202, for the first character string, the second character string and third character string to be merged into the 4th character string;
Computing unit 203, for calculating the difference L between presetting cipher length and preset character types quantity, the 4th
The character string of L character is obtained as password initial value, and in the character string that the 4th character string intercepted length is L before taking in character string
To the 5th character string;
First judging unit 204, for judging whether the character types that password initial value includes meet preset character type profile bar
Part, if not satisfied, traversing the 5th character string, first meets the character of preset character types condition in the 5th character string of selection,
The character for meeting preset character types condition is put into password initial value, and the first judging unit of retriggered 204, if satisfied,
Using password initial value as password, and trigger second judgment unit 205;
Second judgment unit 205 if being equal to, terminates for judging whether the length of password is equal to presetting cipher length,
If being not equal to, first meets the character of preset character types condition in the 5th character string of selection, will meet preset character type
The character of profile bar part is put into password, and retriggered second judgment unit 205, until the length of password is long equal to presetting cipher
Degree;
Wherein, L=1,2,3 ... n.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user password, contract number.
Further, third character string is corresponding with contract number.
Further, presetting cipher length is 6 or 8 or 10 or 16, herein without limitation.
The design cycle of the embodiment of the present invention is as follows:
User's account, password, contract number for inputting oneself first;Then md5 encryption algorithm is called three times, and parameter is respectively
Account+contract number, password+contract number, contract number, obtaining three character strings is X, X1, X2, i.e. X=MD5 (account+contract respectively
Number), X1=MD5 (password+contract number), X2=MD5 (contract number);Then one section of character string S=X [0,1] X1 [0,1] X2 is synthesized
[0,1] X [2,3] X1 [2,3] X2 [2,3] ..., takes L=N-n, and wherein N is final digit, and n is character types;Remember K=S
[0, L], if K has the type not comprising selection, continuation is looked in S [L], and the type for finding first selection is put into K
In, until all types are all found.If at this moment the length of password is less than N, the character of S [L], Zhi Daomi are taken down
Code length is N.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-
OnlyMemory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various to deposit
Store up the medium of program code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of intelligent contract encryption method based on triple md5 encryption algorithms characterized by comprising
S1: getting user account, user password and contract number, by md5 encryption algorithm according to the user account, the use
Family password and the contract number generate the first character string, the second character string and third character string;
S2: first character string, second character string and the third character string are merged into the 4th character string;
S3: the difference L, L before taking in the 4th character string between presetting cipher length and preset character types quantity are calculated
The character string of a character obtains the 5th character as password initial value, and in the character string that the 4th character string intercepted length is L
String;
S4: judging whether the character types that the password initial value includes meet preset character types condition, if not satisfied, traversal institute
It states the 5th character string, chooses in the 5th character string first and meet the character of preset character types condition, will meet preset
The character of character types condition is put into the password initial value, and re-executes S4, if satisfied, the password initial value is made
For password, and execute S5;
S5: judging whether the length of the password is equal to the presetting cipher length and terminates if being equal to, if being not equal to, selects
It takes in the 5th character string first to meet the character of preset character types condition, the institute of preset character types condition will be met
It states character to be put into the password, and re-executes S5, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
2. the intelligent contract encryption method according to claim 1 based on triple md5 encryption algorithms, which is characterized in that institute
It is corresponding with the user account, the contract number to state the first character string.
3. the intelligent contract encryption method according to claim 2 based on triple md5 encryption algorithms, which is characterized in that institute
It is corresponding with the user password, the contract number to state the second character string.
4. the intelligent contract encryption method according to claim 3 based on triple md5 encryption algorithms, which is characterized in that institute
It is corresponding with the contract number to state third character string.
5. the intelligent contract encryption method according to claim 1 based on triple md5 encryption algorithms, which is characterized in that institute
Stating presetting cipher length is 6 or 8 or 10 or 16.
6. a kind of intelligent contract encryption device based on triple md5 encryption algorithms characterized by comprising
Generation unit, for getting user account, user password and contract number, by md5 encryption algorithm according to the user
Account, the user password and the contract number generate the first character string, the second character string and third character string;
Combining unit, for first character string, second character string and the third character string to be merged into the 4th word
Symbol string;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, in the 4th character
The character string of L character is obtained as password initial value, and in the character string that the 4th character string intercepted length is L before taking in string
To the 5th character string;
First judging unit, for judging whether the character types that the password initial value includes meet preset character types condition,
If not satisfied, traversing the 5th character string, first meets preset character types condition in selection the 5th character string
The character for meeting preset character types condition is put into the password initial value by character, and retriggered first judges list
Member, if satisfied, using the password initial value as password, and trigger second judgment unit;
Second judgment unit is tied for judging whether the length of the password is equal to the presetting cipher length if being equal to
Beam chooses in the 5th character string first and meets the character of preset character types condition, will meet preset if being not equal to
The character of character types condition is put into the password, and retriggered second judgment unit, until the length of the password
Degree is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
7. the intelligent contract encryption device according to claim 6 based on triple md5 encryption algorithms, which is characterized in that institute
It is corresponding with the user account, the contract number to state the first character string.
8. the intelligent contract encryption device according to claim 7 based on triple md5 encryption algorithms, which is characterized in that institute
It is corresponding with the user password, the contract number to state the second character string.
9. the intelligent contract encryption device according to claim 8 based on triple md5 encryption algorithms, which is characterized in that institute
It is corresponding with the contract number to state third character string.
10. the intelligent contract encryption device according to claim 6 based on triple md5 encryption algorithms, which is characterized in that institute
Stating presetting cipher length is 6 or 8 or 10 or 16.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710129301.8A CN106909852B (en) | 2017-03-06 | 2017-03-06 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710129301.8A CN106909852B (en) | 2017-03-06 | 2017-03-06 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106909852A CN106909852A (en) | 2017-06-30 |
CN106909852B true CN106909852B (en) | 2019-11-08 |
Family
ID=59187018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710129301.8A Expired - Fee Related CN106909852B (en) | 2017-03-06 | 2017-03-06 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106909852B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107342858B (en) * | 2017-07-05 | 2019-09-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN109428722A (en) * | 2017-08-30 | 2019-03-05 | 上海策赢网络科技有限公司 | A kind of content delivery method and device |
CN110020855B (en) * | 2019-01-31 | 2020-05-29 | 阿里巴巴集团控股有限公司 | Method, node and storage medium for realizing privacy protection in block chain |
CN110096901B (en) * | 2019-05-08 | 2021-04-02 | 北京智签科技有限公司 | Electronic contract data encryption storage method and signing client |
CN110264194B (en) * | 2019-05-20 | 2021-05-28 | 创新先进技术有限公司 | Receipt storage method and node based on event function type |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101593332A (en) * | 2008-05-28 | 2009-12-02 | 北京邮电大学 | A kind of electronic contract management system and its implementation |
CN103326991A (en) * | 2012-03-20 | 2013-09-25 | 北京聚宝网络科技有限公司 | Method for password encrypted storage and password authentication |
CN103684758A (en) * | 2013-11-05 | 2014-03-26 | 广东全通教育股份有限公司 | User password mixing encryption method and system |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006003675A2 (en) * | 2004-07-12 | 2006-01-12 | Syed Ibrahim Abdul Hameed Khan | System, method of generation and use of bilaterally generated variable instant passwords |
US20070031009A1 (en) * | 2005-04-15 | 2007-02-08 | Julius Mwale | Method and system for string-based biometric authentication |
CN102983967B (en) * | 2012-12-06 | 2015-09-02 | 厦门市美亚柏科信息股份有限公司 | The complicated quick ergodic algorithm of password and device |
US9237015B2 (en) * | 2013-07-24 | 2016-01-12 | Cisco Technology, Inc. | Compact and efficient communication security through combining anti-replay with encryption |
-
2017
- 2017-03-06 CN CN201710129301.8A patent/CN106909852B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101593332A (en) * | 2008-05-28 | 2009-12-02 | 北京邮电大学 | A kind of electronic contract management system and its implementation |
CN103326991A (en) * | 2012-03-20 | 2013-09-25 | 北京聚宝网络科技有限公司 | Method for password encrypted storage and password authentication |
CN103684758A (en) * | 2013-11-05 | 2014-03-26 | 广东全通教育股份有限公司 | User password mixing encryption method and system |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
Also Published As
Publication number | Publication date |
---|---|
CN106909852A (en) | 2017-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106909852B (en) | Intelligent contract encryption method and device based on triple md5 encryption algorithms | |
US11316696B2 (en) | Hash subtrees for grouping components by component type | |
Singh et al. | Blockchain: Future of financial and cyber security | |
US10560451B2 (en) | Table-connected tokenization | |
CN106899698B (en) | Cross-chain interoperation method between block chains | |
JP2023089207A (en) | Consolidated blockchain-based data transfer control method and system | |
CN110709871A (en) | Parameterizable intelligent contracts | |
CN109919756A (en) | Fund transfer system, checking method and method of commerce based on Merkle tree backtracking location technology | |
JP2021532466A (en) | Computer-enhanced methods, computer systems, and cryptocurrency depository to enable secure escrowing and storage of cryptocurrencies. | |
US20160092698A1 (en) | Tokenization Column Replacement | |
CN112769567A (en) | Block chain HD private key retrieving method | |
Homoliak et al. | An air-gapped 2-factor authentication for smart-contract wallets | |
CN112970227A (en) | Computer-implemented system and method including public key combination verification | |
KR102181098B1 (en) | System and method for distributed database using block chain | |
Chaum et al. | W-OTS+ up my sleeve! a hidden secure fallback for cryptocurrency wallets | |
RU2686818C1 (en) | Method for scaling distributed information system | |
Chhabra et al. | An overview of blockchain technology and comparison between various cryptocurrencies | |
Sharma et al. | Blockchain Revolution: Adaptability in Business World and Challenges in Implementation | |
Maram | Bitcoin generation using Blockchain technology | |
Bèatrix-May et al. | Integrating blockchain technology in a cyber physical system to secure data | |
Nath et al. | Impact of Blockchain to Secure E-Banking Transaction | |
CN109949036A (en) | Secret protection endorsement method and device, verification method and device | |
Gupta et al. | 5 Emergence of Big | |
Ravi et al. | A Framework For Securing Online Transaction Through Block Chain | |
Soulaimani et al. | Blockchain and hashing algorithms: A review |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191108 Termination date: 20200306 |
|
CF01 | Termination of patent right due to non-payment of annual fee |