CN109510820A - A kind of block chain cryptographic methods that decentralization can customize - Google Patents
A kind of block chain cryptographic methods that decentralization can customize Download PDFInfo
- Publication number
- CN109510820A CN109510820A CN201811295294.XA CN201811295294A CN109510820A CN 109510820 A CN109510820 A CN 109510820A CN 201811295294 A CN201811295294 A CN 201811295294A CN 109510820 A CN109510820 A CN 109510820A
- Authority
- CN
- China
- Prior art keywords
- block chain
- password
- mobile phone
- customized
- wallet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention provides a kind of block chain cryptographic methods that decentralization can customize, include: that user registers in block chain wallet, public key+private key, mnemonic word are generated by algorithm, KEYSTORE+PASSWORD downloads a data encryptor in mobile phone after the completion of registration;The customized password of user setting is established mapping between customized password and the login mode of block chain wallet by data encryptor, and encrypted login mode is stored in mobile phone;User inputs customized password when logging in, and block chain wallet is decrypted using data encryptor for the encryption key in mobile phone, carries out money transfer transactions.The present invention is in the block chain technical foundation of decentralization, data encryptor and customized password are increased, and realizes freely being arranged for customized password, meets the present use habit of client, reduce a possibility that password is forgotten, increases the ease for use and safety of block chain wallet.
Description
Technical field
The present invention relates to block chain fields, and in particular to a kind of block chain cryptographic methods that decentralization can customize.
Background technique
Centralization login mode user name, password, mobile phone identifying code.The advantages of centralization login mode, is: account number cipher
Be stored in the server of centralization, user forget Password Shi Kexiang central server application resetting password, not because forgetting Password
And lose assets.The shortcomings that centralization login mode, is: the login mode of centralization, such as traditional financial institution such as bank,
For the assets of user by central server trustship, assets are the numerical chracter of a presentation, this number in the account of user
It is also often influenced by the operation troubles of center system and many uncontrollable additional risks must not be not subject to.When background user is believed
Breath Management System Data is distorted by people, and user carries out that corresponding data will can not be obtained when authentication, is not available the account
Password carries out register.And after user account password information is tampered, the criminal for distorting information will be easy to obtain
The information in user account is taken, the trade secret or individual privacy of company have been revealed.
Block chain login mode uses private key+public key, KEYSTORE+PASSWORD, mnemonic word.Private key is substantially one
The fixed random number of length.Public key is generated by private key by elliptic curve, is the array of 65 byte after transformation, usually
It is shown after being handled by 16 systems.When we possess a private key, so that it may calculate public key.And public key cannot calculate private key.
KEYSTORE is not private key, is common in ether mill wallet, after general creation ether mill wallet, you can be allowed to back up KEYSTORE, it
It is a string of codes, oneself can saves as text or json format, it can be opened with any ether mill wallet in the future.
The essence of KEYSTORE is encrypted private key, KEYSTORE must cooperate your wallet password come using.What PASSWORD referred to
It is to need to set a password when creating wallet, there are two main applications, first is that payment cipher when transferring accounts, second is that with
KEYSTORE imports login password when wallet.Mnemonic word is another form of expression of private key, is proposed by 31 motion of BIP, main
Syllabus is the private key for allowing user preferably to remember oneself, after creating wallet, it may appear that a backup mnemonic word function selects standby
Part mnemonic word inputs password, it may appear that 12 words have a space between each word, this is exactly mnemonic word,
It wraps only one mnemonic word and cannot modify.
The advantages of block chain login mode, is: decentralization, convenient and efficient, high security, book keeping operation speed is fast, cost compared with
Low, mutual supervision verifying.Point-to-point login mode is made by block chain technology, excludes the intermediate ring of third party financial institution
Section cancels invisible cost.The shortcomings that block chain login mode, is: currently, there are many block chain Wallet System, these wallet systems
In system, login mode file includes terminal storage, server two kinds of storage modes of storage.When terminal storage, login mode file
It is easy to be copied, replicate, login mode exists by risks such as Brute Forces.When server stores, login mode is generally all by handing over
Easy core agent management, must input trading password every time when transaction, the existing login mode file of trade center also has transaction close
Code, causes risk factor very big, once trade center, which occurs, the risks such as attack, is closed, the possibility of assets loss in wallet
Property is very big.
Summary of the invention
The present invention provides a kind of block chain cryptographic methods that decentralization can customize, in the block chain skill of decentralization
On the basis of art, in public key+private key, KEYSTORE+PASSWORD (password) except the element of mnemonic word, increases data encryption
Device and customized password, and being freely arranged for customized password is realized, meet the present use habit of client, reduces password
A possibility that forgetting, increases the ease for use and safety of block chain wallet.
A kind of block chain cryptographic methods that decentralization can customize, comprising:
1) user registers in block chain wallet, generates public key+private key, mnemonic word, KEYSTORE+ by algorithm
PASSWORD (password) downloads personal interpreter's device (i.e. data encryptor) in mobile phone after the completion of registration;
2) the customized password of user setting, by data encryptor customized password and block chain wallet login mode
Between establish mapping, and encrypted login mode is stored in mobile phone;
3) user inputs customized password when logging in, and block chain wallet uses the encryption private that data encryptor is in mobile phone
Key is decrypted, and user is practical to log in block chain wallet by public key+private key mode;
4) user inputs customized password in transaction, and block chain wallet uses the encryption private that data encryptor is in mobile phone
Key is decrypted, and carries out money transfer transactions.
In step 1), public key+private key, mnemonic word and KEYSTORE+PASSWORD (password) are recorded in by physics mode
Under line and keep properly;
The physics mode is to be copied with paper pen.
In step 2), by data encryptor (i.e. personal interpreter's device) in the login side of customized password and block chain wallet
Mapping is established between formula, specifically:
Mapping is established in customized password and private key by data encryptor.
It is stored in mobile phone local after the mapping encrypting of customized password and private key that data encryptor generates, does not return center
Change server, guarantees system safety.
The cipher mode of data encryptor is related to mobile phone MAC Address, even if changing a mobile phone knows customized password
Block chain wallet cannot be logged in;
In step 4), user carries out the money transfer transactions of block chain wallet using customized password, guarantees transaction data and steps on
The safety of record mode, user is practical to log in block chain wallet by public key+private key mode.
The block chain cryptographic methods that the decentralization can customize further include the side of giving for change of step 5) block chain wallet
Method specifically includes:
A) after user mobile phone is replaced or is lost, public key+private key, KEYSTORE need to be inputted in new cell-phone block chain wallet
+ PASSWORD, the one of which of mnemonic word achieve the purpose that log in block chain;
B) data encryptor is re-downloaded, and resets customized password, and establishes and maps with private key, it will be encrypted
Login mode is stored in mobile phone;
C) the customized password reset can be identical or different with former customized password;
, need to be by public key+private key i.e. after user mobile phone is replaced or is lost, KEYSTORE+PASSWORD, mnemonic word its
A kind of middle mode logs in after block chain downloading data encryption equipment again, achievees the purpose that the customized password of resetting.
Compared with prior art, the present invention has the advantage that
Currently, there are many block chain Wallet System, in these Wallet Systems, login mode file include terminal storage,
Server stores two kinds of storage modes.When terminal storage, login mode file is easy to be copied, replicate, and there are quilts for login mode
The risks such as Brute Force.When server stores, login mode, every time must be defeated when transaction generally all by trade center proxy management
Entering trading password, the existing login mode file of trade center also has trading password, causes risk factor very big, once it hands over
A possibility that risks such as attacks, closed in easy center, wallet loss is very big.
The present invention is logged in every time by the customized password of user and need to input password login and meet the existing use habit of client,
The ease for use and safety of block chain wallet are increased, specific advantage is as follows:
1) adhered to that the decentralization of block catenary system, convenient and efficient, high security, book keeping operation speed is fast, cost is relatively low, mutually
The advantages of supervision verifying;
2) function of attached data encryptor realizes the customized password of client;
3) it is stored in mobile phone local after the mapping encrypting of data encryptor generates customized password and private key, does not return
Heart server guarantees system safety.
4) cipher mode of data encryptor is related to mobile phone MAC Address, even if changing a mobile phone knows customized password
Block chain wallet can not be logged in;
5) data encryptor+customized password, public key+private key are all encrypting storings, and are associated with mobile phone MAC Address, i.e.,
Just block chain wallet can not be logged in by capturing the above-mentioned data of mobile phone acquisition.
Detailed description of the invention
Fig. 1 is the flow diagram for the block chain cryptographic methods that decentralization of the present invention can customize.
Specific embodiment
As shown in Figure 1, this method includes following for a kind of block chain cryptographic methods that decentralization can customize of the present invention
Step:
1) veteran's machine is registered by block chain wallet to block chain;
2) public key+private key, KEYSTORE+PASSWORD, the information such as mnemonic word are generated;
3) above- mentioned information are recorded online lower by physics mode (being copied with paper pen) and kept properly;
4) downloading data encryption equipment (i.e. personal interpreter's device) inputs customized password, and personal interpreter's device is in customized password
Mapping is established between private key;
5) personal interpreter's device+customized password, public key+private key, KEYSTORE+PASSWORD, mnemonic word encrypting storing, visitor
Family can log in block chain wallet by above-mentioned any way;
6) veteran's machine logs in existing block chain wallet but forgets customized password, need to pass through public key+private key, KEYSTORE
+ PASSWORD, the one way in which of mnemonic word download personal interpreter's device after logging in block chain again, it is customized close to reach resetting
The purpose of code;
7) new cell-phone logs in existing block chain wallet, need to pass through public key+private key, KEYSTORE+PASSWORD, mnemonic word
One way in which log in block chain after download personal interpreter's device, achieve the purpose that the customized password of resetting.
Embodiment 1
As shown in Figure 1, a kind of block chain cryptographic methods that decentralization can customize, comprising:
1) user registers in block chain wallet, generates public key+private key, KEYSTORE+PASSWORD by algorithm and helps
Remember word, generates a data encryptor (i.e. personal interpreter's device) after the completion of registration in mobile phone;
2) the customized password of user setting, it is (specific using private in customized password and login mode by personal interpreter's device
Key) between establish connection, and encrypted login mode is stored in mobile phone;
3) for user by mnemonic word, public key+private key is online lower by physics mode (being copied with paper pen) record and keeps properly;
4) user inputs customized password when logging in, and block chain wallet is stepped on using personal interpreter's device for the encryption in mobile phone
Record mode is decrypted, and user logs in wallet by login mode;
5) user inputs customized password in transaction, and block chain wallet is stepped on using personal interpreter's device for the encryption in mobile phone
Record mode is decrypted, and user can carry out money transfer transactions, guarantees the safety of transaction data and login mode.
6) adhered to that the decentralization of block catenary system, convenient and efficient, high security, book keeping operation speed is fast, cost is relatively low, mutually
The advantages of supervision verifying;
7) function of attached personal interpreter's device realizes the customized password of client;
8) it is stored in mobile phone local after the mapping encrypting that personal interpreter's device generates, does not return centralized server, guarantees system
System safety.
9) cipher mode of personal interpreter's device is related to mobile phone MAC Address, even if hand-off machine knows customized password also not
Block chain wallet can be logged in;
10) personal interpreter's device+customized password, public key+private key are all encrypting storings, and are associated with mobile phone MAC Address, i.e.,
Just block chain wallet can not be logged in by capturing the above-mentioned data of mobile phone acquisition;
The method for retrieving of block chain wallet, comprising:
11) the encrypted login mode is stored in mobile phone, can be in new cell-phone after user mobile phone is replaced or is lost
Public key+private key, KEYSTORE+PASSWORD and mnemonic word one of which are inputted in block chain wallet reaches the mesh for logging in block chain
's;
12) personal interpreter's device is re-downloaded, and resets customized password, encrypted login mode is stored in hand
In machine;
13) the customized password reset can be identical or different with former customized password.
Claims (7)
1. a kind of block chain cryptographic methods that decentralization can customize characterized by comprising
1) user registers in block chain wallet, by algorithm generate public key+private key, mnemonic word, KEYSTORE+PASSWORD,
A data encryptor is downloaded after the completion of registration in mobile phone;
2) the customized password of user setting, through data encryptor between customized password and the login mode of block chain wallet
Mapping is established, and encrypted login mode is stored in mobile phone;
3) user inputs customized password when logging in, block chain wallet using data encryptor be encryption key in mobile phone into
Row decryption, user is practical to log in block chain wallet by public key+private key mode;
4) user inputs customized password in transaction, block chain wallet using data encryptor be encryption key in mobile phone into
Row decryption, carries out money transfer transactions.
2. the block chain cryptographic methods that decentralization according to claim 1 can customize, which is characterized in that step 1)
In, public key+private key, mnemonic word and KEYSTORE+PASSWORD are online lower by physics mode record and keep properly.
3. the block chain cryptographic methods that decentralization according to claim 2 can customize, which is characterized in that step 1)
In, the physics mode is to be copied with paper pen.
4. the block chain cryptographic methods that decentralization according to claim 1 can customize, which is characterized in that step 2)
In, mapping is established between customized password and the login mode of block chain wallet by data encryptor, specifically:
Mapping is established in customized password and private key by data encryptor.
5. the block chain cryptographic methods that decentralization according to claim 4 can customize, which is characterized in that step 2)
In, it is stored in mobile phone local after the mapping encrypting of customized password and private key that data encryptor generates, does not return centralization clothes
Business device.
6. the block chain cryptographic methods that decentralization according to claim 4 can customize, which is characterized in that step 2)
In, the cipher mode of data encryptor is related to mobile phone MAC Address.
7. the block chain cryptographic methods that decentralization according to claim 4 can customize, which is characterized in that further include step
The method for retrieving of rapid 5) block chain wallet, specifically includes:
A) after user mobile phone is replaced or is lost, public key+private key, KEYSTORE+ need to be inputted in new cell-phone block chain wallet
PASSWORD, the one of which of mnemonic word achieve the purpose that log in block chain;
B) data encryptor is re-downloaded, customized password is reset, and establish and map with private key, by encrypted login side
Formula is stored in mobile phone;
C) the customized password reset can be identical or different with former customized password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811295294.XA CN109510820A (en) | 2018-11-01 | 2018-11-01 | A kind of block chain cryptographic methods that decentralization can customize |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811295294.XA CN109510820A (en) | 2018-11-01 | 2018-11-01 | A kind of block chain cryptographic methods that decentralization can customize |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109510820A true CN109510820A (en) | 2019-03-22 |
Family
ID=65747361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811295294.XA Pending CN109510820A (en) | 2018-11-01 | 2018-11-01 | A kind of block chain cryptographic methods that decentralization can customize |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109510820A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922084A (en) * | 2019-04-10 | 2019-06-21 | 北京阿尔山区块链联盟科技有限公司 | Key management method, device and electronic equipment |
CN110289946A (en) * | 2019-07-12 | 2019-09-27 | 深圳市元征科技股份有限公司 | A kind of generation method and block chain node device of block chain wallet localization file |
CN111541725A (en) * | 2020-07-08 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | Block chain all-in-one machine, password acceleration card thereof, and key management method and device |
CN112884474A (en) * | 2021-02-19 | 2021-06-01 | 上海源庐加佳信息科技有限公司 | Block chain wallet mnemonic word generating and importing method, system and terminal |
CN115150149A (en) * | 2022-06-28 | 2022-10-04 | 北京送好运信息技术有限公司 | Method for managing multiple digital certificates of electronic mailbox based on block chain technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107070896A (en) * | 2017-03-20 | 2017-08-18 | 智牛股权投资基金(平潭)合伙企业(有限合伙) | A kind of safe and efficient block chain customization login method and security hardening system |
CN107634989A (en) * | 2017-08-25 | 2018-01-26 | 中积有限公司 | A kind of cloud wallet construction method and server |
CN107948192A (en) * | 2017-12-22 | 2018-04-20 | 众安信息技术服务有限公司 | A kind of block chain account customization identification and login method and system |
US20180131511A1 (en) * | 2016-08-03 | 2018-05-10 | James Taylor | Systems and Methods for Dynamic Cypher Key Management |
CN108123801A (en) * | 2017-12-29 | 2018-06-05 | 重庆小犀智能科技有限公司 | A kind of block chain wallet uses audio encryption private key system and method |
CN108492154A (en) * | 2018-04-24 | 2018-09-04 | 仝相宝 | A kind of intelligent projection mapping method and its system based on the storage of block chain |
-
2018
- 2018-11-01 CN CN201811295294.XA patent/CN109510820A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180131511A1 (en) * | 2016-08-03 | 2018-05-10 | James Taylor | Systems and Methods for Dynamic Cypher Key Management |
CN107070896A (en) * | 2017-03-20 | 2017-08-18 | 智牛股权投资基金(平潭)合伙企业(有限合伙) | A kind of safe and efficient block chain customization login method and security hardening system |
CN107634989A (en) * | 2017-08-25 | 2018-01-26 | 中积有限公司 | A kind of cloud wallet construction method and server |
CN107948192A (en) * | 2017-12-22 | 2018-04-20 | 众安信息技术服务有限公司 | A kind of block chain account customization identification and login method and system |
CN108123801A (en) * | 2017-12-29 | 2018-06-05 | 重庆小犀智能科技有限公司 | A kind of block chain wallet uses audio encryption private key system and method |
CN108492154A (en) * | 2018-04-24 | 2018-09-04 | 仝相宝 | A kind of intelligent projection mapping method and its system based on the storage of block chain |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922084A (en) * | 2019-04-10 | 2019-06-21 | 北京阿尔山区块链联盟科技有限公司 | Key management method, device and electronic equipment |
CN110289946A (en) * | 2019-07-12 | 2019-09-27 | 深圳市元征科技股份有限公司 | A kind of generation method and block chain node device of block chain wallet localization file |
CN111541725A (en) * | 2020-07-08 | 2020-08-14 | 支付宝(杭州)信息技术有限公司 | Block chain all-in-one machine, password acceleration card thereof, and key management method and device |
US11626984B2 (en) | 2020-07-08 | 2023-04-11 | Alipay (Hangzhou) Information Technology Co., Ltd. | Blockchain integrated station and cryptographic acceleration card, key management methods and apparatuses |
CN112884474A (en) * | 2021-02-19 | 2021-06-01 | 上海源庐加佳信息科技有限公司 | Block chain wallet mnemonic word generating and importing method, system and terminal |
CN115150149A (en) * | 2022-06-28 | 2022-10-04 | 北京送好运信息技术有限公司 | Method for managing multiple digital certificates of electronic mailbox based on block chain technology |
CN115150149B (en) * | 2022-06-28 | 2024-01-30 | 北京送好运信息技术有限公司 | Method for managing various digital certificates through electronic mailbox based on blockchain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210344678A1 (en) | System for accessing data from multiple devices | |
CN109510820A (en) | A kind of block chain cryptographic methods that decentralization can customize | |
JP6818679B2 (en) | Secure host card embroidery credentials | |
CN105516201B (en) | Lightweight anonymous authentication and cryptographic key negotiation method under a kind of environment of multi-server | |
CN110462658A (en) | For providing system and method for the digital identity record to verify the identity of user | |
CN105684346A (en) | Method for securing over-the-air communication between a mobile application and a gateway | |
CN104463001A (en) | Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key | |
JP2001525093A (en) | Electronic trading | |
CN109325342A (en) | Identity information management method, apparatus, computer equipment and storage medium | |
JP2009510644A (en) | Method and configuration for secure authentication | |
CN101897165A (en) | Method of authentication of users in data processing systems | |
CN107833032A (en) | It is a kind of based on mobile phone without card Bank Account Number implementation method | |
KR101923943B1 (en) | System and method for remitting crypto currency with enhanced security | |
CN105022966A (en) | Database data encryption and decryption method and system | |
CN109587276A (en) | A kind of data back up method, system and associated component | |
CN107920052A (en) | A kind of encryption method and intelligent apparatus | |
CN104951939A (en) | Electronic bank card system and application method thereof as well as electronic method of bank card | |
CN107070896B (en) | Safe and efficient block chain network customized login method and safe reinforcement system | |
CN110135175A (en) | Information processing, acquisition methods, device, equipment and medium based on block chain | |
CN109146468A (en) | A kind of backup and restoration methods of the logical card of number | |
Rezaeighaleh et al. | Deterministic sub-wallet for cryptocurrencies | |
CN107209884A (en) | Store the security documents information in different zones | |
Rezaeighaleh et al. | Multilayered defense-in-depth architecture for cryptocurrency wallet | |
KR20130021774A (en) | Method for providing security service based on digital certificate and system for providing security service based on digital certificate | |
US9277403B2 (en) | Authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190322 |
|
RJ01 | Rejection of invention patent application after publication |