CN109510820A - A kind of block chain cryptographic methods that decentralization can customize - Google Patents

A kind of block chain cryptographic methods that decentralization can customize Download PDF

Info

Publication number
CN109510820A
CN109510820A CN201811295294.XA CN201811295294A CN109510820A CN 109510820 A CN109510820 A CN 109510820A CN 201811295294 A CN201811295294 A CN 201811295294A CN 109510820 A CN109510820 A CN 109510820A
Authority
CN
China
Prior art keywords
block chain
password
mobile phone
customized
wallet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811295294.XA
Other languages
Chinese (zh)
Inventor
金九洲
汤李琼
王晓鹏
王舒窈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Xiancao Shijia Biotechnology Co Ltd
Original Assignee
Zhejiang Xiancao Shijia Biotechnology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Xiancao Shijia Biotechnology Co Ltd filed Critical Zhejiang Xiancao Shijia Biotechnology Co Ltd
Priority to CN201811295294.XA priority Critical patent/CN109510820A/en
Publication of CN109510820A publication Critical patent/CN109510820A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention provides a kind of block chain cryptographic methods that decentralization can customize, include: that user registers in block chain wallet, public key+private key, mnemonic word are generated by algorithm, KEYSTORE+PASSWORD downloads a data encryptor in mobile phone after the completion of registration;The customized password of user setting is established mapping between customized password and the login mode of block chain wallet by data encryptor, and encrypted login mode is stored in mobile phone;User inputs customized password when logging in, and block chain wallet is decrypted using data encryptor for the encryption key in mobile phone, carries out money transfer transactions.The present invention is in the block chain technical foundation of decentralization, data encryptor and customized password are increased, and realizes freely being arranged for customized password, meets the present use habit of client, reduce a possibility that password is forgotten, increases the ease for use and safety of block chain wallet.

Description

A kind of block chain cryptographic methods that decentralization can customize
Technical field
The present invention relates to block chain fields, and in particular to a kind of block chain cryptographic methods that decentralization can customize.
Background technique
Centralization login mode user name, password, mobile phone identifying code.The advantages of centralization login mode, is: account number cipher Be stored in the server of centralization, user forget Password Shi Kexiang central server application resetting password, not because forgetting Password And lose assets.The shortcomings that centralization login mode, is: the login mode of centralization, such as traditional financial institution such as bank, For the assets of user by central server trustship, assets are the numerical chracter of a presentation, this number in the account of user It is also often influenced by the operation troubles of center system and many uncontrollable additional risks must not be not subject to.When background user is believed Breath Management System Data is distorted by people, and user carries out that corresponding data will can not be obtained when authentication, is not available the account Password carries out register.And after user account password information is tampered, the criminal for distorting information will be easy to obtain The information in user account is taken, the trade secret or individual privacy of company have been revealed.
Block chain login mode uses private key+public key, KEYSTORE+PASSWORD, mnemonic word.Private key is substantially one The fixed random number of length.Public key is generated by private key by elliptic curve, is the array of 65 byte after transformation, usually It is shown after being handled by 16 systems.When we possess a private key, so that it may calculate public key.And public key cannot calculate private key. KEYSTORE is not private key, is common in ether mill wallet, after general creation ether mill wallet, you can be allowed to back up KEYSTORE, it It is a string of codes, oneself can saves as text or json format, it can be opened with any ether mill wallet in the future. The essence of KEYSTORE is encrypted private key, KEYSTORE must cooperate your wallet password come using.What PASSWORD referred to It is to need to set a password when creating wallet, there are two main applications, first is that payment cipher when transferring accounts, second is that with KEYSTORE imports login password when wallet.Mnemonic word is another form of expression of private key, is proposed by 31 motion of BIP, main Syllabus is the private key for allowing user preferably to remember oneself, after creating wallet, it may appear that a backup mnemonic word function selects standby Part mnemonic word inputs password, it may appear that 12 words have a space between each word, this is exactly mnemonic word, It wraps only one mnemonic word and cannot modify.
The advantages of block chain login mode, is: decentralization, convenient and efficient, high security, book keeping operation speed is fast, cost compared with Low, mutual supervision verifying.Point-to-point login mode is made by block chain technology, excludes the intermediate ring of third party financial institution Section cancels invisible cost.The shortcomings that block chain login mode, is: currently, there are many block chain Wallet System, these wallet systems In system, login mode file includes terminal storage, server two kinds of storage modes of storage.When terminal storage, login mode file It is easy to be copied, replicate, login mode exists by risks such as Brute Forces.When server stores, login mode is generally all by handing over Easy core agent management, must input trading password every time when transaction, the existing login mode file of trade center also has transaction close Code, causes risk factor very big, once trade center, which occurs, the risks such as attack, is closed, the possibility of assets loss in wallet Property is very big.
Summary of the invention
The present invention provides a kind of block chain cryptographic methods that decentralization can customize, in the block chain skill of decentralization On the basis of art, in public key+private key, KEYSTORE+PASSWORD (password) except the element of mnemonic word, increases data encryption Device and customized password, and being freely arranged for customized password is realized, meet the present use habit of client, reduces password A possibility that forgetting, increases the ease for use and safety of block chain wallet.
A kind of block chain cryptographic methods that decentralization can customize, comprising:
1) user registers in block chain wallet, generates public key+private key, mnemonic word, KEYSTORE+ by algorithm PASSWORD (password) downloads personal interpreter's device (i.e. data encryptor) in mobile phone after the completion of registration;
2) the customized password of user setting, by data encryptor customized password and block chain wallet login mode Between establish mapping, and encrypted login mode is stored in mobile phone;
3) user inputs customized password when logging in, and block chain wallet uses the encryption private that data encryptor is in mobile phone Key is decrypted, and user is practical to log in block chain wallet by public key+private key mode;
4) user inputs customized password in transaction, and block chain wallet uses the encryption private that data encryptor is in mobile phone Key is decrypted, and carries out money transfer transactions.
In step 1), public key+private key, mnemonic word and KEYSTORE+PASSWORD (password) are recorded in by physics mode Under line and keep properly;
The physics mode is to be copied with paper pen.
In step 2), by data encryptor (i.e. personal interpreter's device) in the login side of customized password and block chain wallet Mapping is established between formula, specifically:
Mapping is established in customized password and private key by data encryptor.
It is stored in mobile phone local after the mapping encrypting of customized password and private key that data encryptor generates, does not return center Change server, guarantees system safety.
The cipher mode of data encryptor is related to mobile phone MAC Address, even if changing a mobile phone knows customized password Block chain wallet cannot be logged in;
In step 4), user carries out the money transfer transactions of block chain wallet using customized password, guarantees transaction data and steps on The safety of record mode, user is practical to log in block chain wallet by public key+private key mode.
The block chain cryptographic methods that the decentralization can customize further include the side of giving for change of step 5) block chain wallet Method specifically includes:
A) after user mobile phone is replaced or is lost, public key+private key, KEYSTORE need to be inputted in new cell-phone block chain wallet + PASSWORD, the one of which of mnemonic word achieve the purpose that log in block chain;
B) data encryptor is re-downloaded, and resets customized password, and establishes and maps with private key, it will be encrypted Login mode is stored in mobile phone;
C) the customized password reset can be identical or different with former customized password;
, need to be by public key+private key i.e. after user mobile phone is replaced or is lost, KEYSTORE+PASSWORD, mnemonic word its A kind of middle mode logs in after block chain downloading data encryption equipment again, achievees the purpose that the customized password of resetting.
Compared with prior art, the present invention has the advantage that
Currently, there are many block chain Wallet System, in these Wallet Systems, login mode file include terminal storage, Server stores two kinds of storage modes.When terminal storage, login mode file is easy to be copied, replicate, and there are quilts for login mode The risks such as Brute Force.When server stores, login mode, every time must be defeated when transaction generally all by trade center proxy management Entering trading password, the existing login mode file of trade center also has trading password, causes risk factor very big, once it hands over A possibility that risks such as attacks, closed in easy center, wallet loss is very big.
The present invention is logged in every time by the customized password of user and need to input password login and meet the existing use habit of client, The ease for use and safety of block chain wallet are increased, specific advantage is as follows:
1) adhered to that the decentralization of block catenary system, convenient and efficient, high security, book keeping operation speed is fast, cost is relatively low, mutually The advantages of supervision verifying;
2) function of attached data encryptor realizes the customized password of client;
3) it is stored in mobile phone local after the mapping encrypting of data encryptor generates customized password and private key, does not return Heart server guarantees system safety.
4) cipher mode of data encryptor is related to mobile phone MAC Address, even if changing a mobile phone knows customized password Block chain wallet can not be logged in;
5) data encryptor+customized password, public key+private key are all encrypting storings, and are associated with mobile phone MAC Address, i.e., Just block chain wallet can not be logged in by capturing the above-mentioned data of mobile phone acquisition.
Detailed description of the invention
Fig. 1 is the flow diagram for the block chain cryptographic methods that decentralization of the present invention can customize.
Specific embodiment
As shown in Figure 1, this method includes following for a kind of block chain cryptographic methods that decentralization can customize of the present invention Step:
1) veteran's machine is registered by block chain wallet to block chain;
2) public key+private key, KEYSTORE+PASSWORD, the information such as mnemonic word are generated;
3) above- mentioned information are recorded online lower by physics mode (being copied with paper pen) and kept properly;
4) downloading data encryption equipment (i.e. personal interpreter's device) inputs customized password, and personal interpreter's device is in customized password Mapping is established between private key;
5) personal interpreter's device+customized password, public key+private key, KEYSTORE+PASSWORD, mnemonic word encrypting storing, visitor Family can log in block chain wallet by above-mentioned any way;
6) veteran's machine logs in existing block chain wallet but forgets customized password, need to pass through public key+private key, KEYSTORE + PASSWORD, the one way in which of mnemonic word download personal interpreter's device after logging in block chain again, it is customized close to reach resetting The purpose of code;
7) new cell-phone logs in existing block chain wallet, need to pass through public key+private key, KEYSTORE+PASSWORD, mnemonic word One way in which log in block chain after download personal interpreter's device, achieve the purpose that the customized password of resetting.
Embodiment 1
As shown in Figure 1, a kind of block chain cryptographic methods that decentralization can customize, comprising:
1) user registers in block chain wallet, generates public key+private key, KEYSTORE+PASSWORD by algorithm and helps Remember word, generates a data encryptor (i.e. personal interpreter's device) after the completion of registration in mobile phone;
2) the customized password of user setting, it is (specific using private in customized password and login mode by personal interpreter's device Key) between establish connection, and encrypted login mode is stored in mobile phone;
3) for user by mnemonic word, public key+private key is online lower by physics mode (being copied with paper pen) record and keeps properly;
4) user inputs customized password when logging in, and block chain wallet is stepped on using personal interpreter's device for the encryption in mobile phone Record mode is decrypted, and user logs in wallet by login mode;
5) user inputs customized password in transaction, and block chain wallet is stepped on using personal interpreter's device for the encryption in mobile phone Record mode is decrypted, and user can carry out money transfer transactions, guarantees the safety of transaction data and login mode.
6) adhered to that the decentralization of block catenary system, convenient and efficient, high security, book keeping operation speed is fast, cost is relatively low, mutually The advantages of supervision verifying;
7) function of attached personal interpreter's device realizes the customized password of client;
8) it is stored in mobile phone local after the mapping encrypting that personal interpreter's device generates, does not return centralized server, guarantees system System safety.
9) cipher mode of personal interpreter's device is related to mobile phone MAC Address, even if hand-off machine knows customized password also not Block chain wallet can be logged in;
10) personal interpreter's device+customized password, public key+private key are all encrypting storings, and are associated with mobile phone MAC Address, i.e., Just block chain wallet can not be logged in by capturing the above-mentioned data of mobile phone acquisition;
The method for retrieving of block chain wallet, comprising:
11) the encrypted login mode is stored in mobile phone, can be in new cell-phone after user mobile phone is replaced or is lost Public key+private key, KEYSTORE+PASSWORD and mnemonic word one of which are inputted in block chain wallet reaches the mesh for logging in block chain 's;
12) personal interpreter's device is re-downloaded, and resets customized password, encrypted login mode is stored in hand In machine;
13) the customized password reset can be identical or different with former customized password.

Claims (7)

1. a kind of block chain cryptographic methods that decentralization can customize characterized by comprising
1) user registers in block chain wallet, by algorithm generate public key+private key, mnemonic word, KEYSTORE+PASSWORD, A data encryptor is downloaded after the completion of registration in mobile phone;
2) the customized password of user setting, through data encryptor between customized password and the login mode of block chain wallet Mapping is established, and encrypted login mode is stored in mobile phone;
3) user inputs customized password when logging in, block chain wallet using data encryptor be encryption key in mobile phone into Row decryption, user is practical to log in block chain wallet by public key+private key mode;
4) user inputs customized password in transaction, block chain wallet using data encryptor be encryption key in mobile phone into Row decryption, carries out money transfer transactions.
2. the block chain cryptographic methods that decentralization according to claim 1 can customize, which is characterized in that step 1) In, public key+private key, mnemonic word and KEYSTORE+PASSWORD are online lower by physics mode record and keep properly.
3. the block chain cryptographic methods that decentralization according to claim 2 can customize, which is characterized in that step 1) In, the physics mode is to be copied with paper pen.
4. the block chain cryptographic methods that decentralization according to claim 1 can customize, which is characterized in that step 2) In, mapping is established between customized password and the login mode of block chain wallet by data encryptor, specifically:
Mapping is established in customized password and private key by data encryptor.
5. the block chain cryptographic methods that decentralization according to claim 4 can customize, which is characterized in that step 2) In, it is stored in mobile phone local after the mapping encrypting of customized password and private key that data encryptor generates, does not return centralization clothes Business device.
6. the block chain cryptographic methods that decentralization according to claim 4 can customize, which is characterized in that step 2) In, the cipher mode of data encryptor is related to mobile phone MAC Address.
7. the block chain cryptographic methods that decentralization according to claim 4 can customize, which is characterized in that further include step The method for retrieving of rapid 5) block chain wallet, specifically includes:
A) after user mobile phone is replaced or is lost, public key+private key, KEYSTORE+ need to be inputted in new cell-phone block chain wallet PASSWORD, the one of which of mnemonic word achieve the purpose that log in block chain;
B) data encryptor is re-downloaded, customized password is reset, and establish and map with private key, by encrypted login side Formula is stored in mobile phone;
C) the customized password reset can be identical or different with former customized password.
CN201811295294.XA 2018-11-01 2018-11-01 A kind of block chain cryptographic methods that decentralization can customize Pending CN109510820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811295294.XA CN109510820A (en) 2018-11-01 2018-11-01 A kind of block chain cryptographic methods that decentralization can customize

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811295294.XA CN109510820A (en) 2018-11-01 2018-11-01 A kind of block chain cryptographic methods that decentralization can customize

Publications (1)

Publication Number Publication Date
CN109510820A true CN109510820A (en) 2019-03-22

Family

ID=65747361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811295294.XA Pending CN109510820A (en) 2018-11-01 2018-11-01 A kind of block chain cryptographic methods that decentralization can customize

Country Status (1)

Country Link
CN (1) CN109510820A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922084A (en) * 2019-04-10 2019-06-21 北京阿尔山区块链联盟科技有限公司 Key management method, device and electronic equipment
CN110289946A (en) * 2019-07-12 2019-09-27 深圳市元征科技股份有限公司 A kind of generation method and block chain node device of block chain wallet localization file
CN111541725A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Block chain all-in-one machine, password acceleration card thereof, and key management method and device
CN112884474A (en) * 2021-02-19 2021-06-01 上海源庐加佳信息科技有限公司 Block chain wallet mnemonic word generating and importing method, system and terminal
CN115150149A (en) * 2022-06-28 2022-10-04 北京送好运信息技术有限公司 Method for managing multiple digital certificates of electronic mailbox based on block chain technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107070896A (en) * 2017-03-20 2017-08-18 智牛股权投资基金(平潭)合伙企业(有限合伙) A kind of safe and efficient block chain customization login method and security hardening system
CN107634989A (en) * 2017-08-25 2018-01-26 中积有限公司 A kind of cloud wallet construction method and server
CN107948192A (en) * 2017-12-22 2018-04-20 众安信息技术服务有限公司 A kind of block chain account customization identification and login method and system
US20180131511A1 (en) * 2016-08-03 2018-05-10 James Taylor Systems and Methods for Dynamic Cypher Key Management
CN108123801A (en) * 2017-12-29 2018-06-05 重庆小犀智能科技有限公司 A kind of block chain wallet uses audio encryption private key system and method
CN108492154A (en) * 2018-04-24 2018-09-04 仝相宝 A kind of intelligent projection mapping method and its system based on the storage of block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180131511A1 (en) * 2016-08-03 2018-05-10 James Taylor Systems and Methods for Dynamic Cypher Key Management
CN107070896A (en) * 2017-03-20 2017-08-18 智牛股权投资基金(平潭)合伙企业(有限合伙) A kind of safe and efficient block chain customization login method and security hardening system
CN107634989A (en) * 2017-08-25 2018-01-26 中积有限公司 A kind of cloud wallet construction method and server
CN107948192A (en) * 2017-12-22 2018-04-20 众安信息技术服务有限公司 A kind of block chain account customization identification and login method and system
CN108123801A (en) * 2017-12-29 2018-06-05 重庆小犀智能科技有限公司 A kind of block chain wallet uses audio encryption private key system and method
CN108492154A (en) * 2018-04-24 2018-09-04 仝相宝 A kind of intelligent projection mapping method and its system based on the storage of block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922084A (en) * 2019-04-10 2019-06-21 北京阿尔山区块链联盟科技有限公司 Key management method, device and electronic equipment
CN110289946A (en) * 2019-07-12 2019-09-27 深圳市元征科技股份有限公司 A kind of generation method and block chain node device of block chain wallet localization file
CN111541725A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Block chain all-in-one machine, password acceleration card thereof, and key management method and device
US11626984B2 (en) 2020-07-08 2023-04-11 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain integrated station and cryptographic acceleration card, key management methods and apparatuses
CN112884474A (en) * 2021-02-19 2021-06-01 上海源庐加佳信息科技有限公司 Block chain wallet mnemonic word generating and importing method, system and terminal
CN115150149A (en) * 2022-06-28 2022-10-04 北京送好运信息技术有限公司 Method for managing multiple digital certificates of electronic mailbox based on block chain technology
CN115150149B (en) * 2022-06-28 2024-01-30 北京送好运信息技术有限公司 Method for managing various digital certificates through electronic mailbox based on blockchain technology

Similar Documents

Publication Publication Date Title
US20210344678A1 (en) System for accessing data from multiple devices
CN109510820A (en) A kind of block chain cryptographic methods that decentralization can customize
JP6818679B2 (en) Secure host card embroidery credentials
CN105516201B (en) Lightweight anonymous authentication and cryptographic key negotiation method under a kind of environment of multi-server
CN110462658A (en) For providing system and method for the digital identity record to verify the identity of user
CN105684346A (en) Method for securing over-the-air communication between a mobile application and a gateway
CN104463001A (en) Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key
JP2001525093A (en) Electronic trading
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
JP2009510644A (en) Method and configuration for secure authentication
CN101897165A (en) Method of authentication of users in data processing systems
CN107833032A (en) It is a kind of based on mobile phone without card Bank Account Number implementation method
KR101923943B1 (en) System and method for remitting crypto currency with enhanced security
CN105022966A (en) Database data encryption and decryption method and system
CN109587276A (en) A kind of data back up method, system and associated component
CN107920052A (en) A kind of encryption method and intelligent apparatus
CN104951939A (en) Electronic bank card system and application method thereof as well as electronic method of bank card
CN107070896B (en) Safe and efficient block chain network customized login method and safe reinforcement system
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
CN109146468A (en) A kind of backup and restoration methods of the logical card of number
Rezaeighaleh et al. Deterministic sub-wallet for cryptocurrencies
CN107209884A (en) Store the security documents information in different zones
Rezaeighaleh et al. Multilayered defense-in-depth architecture for cryptocurrency wallet
KR20130021774A (en) Method for providing security service based on digital certificate and system for providing security service based on digital certificate
US9277403B2 (en) Authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322

RJ01 Rejection of invention patent application after publication