CN110493261A - Identifying code acquisition methods, client, server and storage medium based on block chain - Google Patents

Identifying code acquisition methods, client, server and storage medium based on block chain Download PDF

Info

Publication number
CN110493261A
CN110493261A CN201910869882.8A CN201910869882A CN110493261A CN 110493261 A CN110493261 A CN 110493261A CN 201910869882 A CN201910869882 A CN 201910869882A CN 110493261 A CN110493261 A CN 110493261A
Authority
CN
China
Prior art keywords
client
verify data
block chain
code
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910869882.8A
Other languages
Chinese (zh)
Other versions
CN110493261B (en
Inventor
何畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910869882.8A priority Critical patent/CN110493261B/en
Publication of CN110493261A publication Critical patent/CN110493261A/en
Application granted granted Critical
Publication of CN110493261B publication Critical patent/CN110493261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a kind of identifying code acquisition methods based on block chain, a kind of client, a kind of server and a kind of storage mediums, wherein method includes: to send identifying code request to server, identifying code request carries the mark of client, identifying code request is for making server generate target verification code, and target verification code is encrypted to obtain ciphertext, verify data is generated according to identifying code request, the mark of client and ciphertext, and verify data is distributed to block chain network, and obtain storage address of the verify data in block chain network;The storage address that server is sent is received, and verify data is obtained from block chain network according to the mark of storage address and client;Ciphertext in verify data is decrypted to obtain target verification code.The transmission that can not only realize identifying code based on block chain network through the embodiment of the present invention, without using SIM card, can also realize identifying code verifying event deposits card.

Description

Identifying code acquisition methods, client, server and storage medium based on block chain
Technical field
The present invention relates to field of communication technology more particularly to a kind of identifying code acquisition methods, Yi Zhongke based on block chain Family end, a kind of server and a kind of storage medium.
Background technique
Someone carries out malice login, decryption or batch behaviour using the Brute Force mode of specific program in order to prevent Make certain program, many websites require that user carries out identifying code verifying when user logs in or operates certain program.Although Identifying code verifying is carried out when logging in or operating certain program to be more troublesome, but the account of user can preferably be protected to pacify Entirely, and effectively batch brush single operation is avoided.Currently, more universal identifying code verification mode is short-message verification, but for There is no user identity identification (Subscriber Identification Module, SIM) card, that is to say not no telephone number How terminal, such as tablet computer, computer etc. realize that short-message verification is problem to be solved.
Summary of the invention
The embodiment of the invention provides a kind of identifying code acquisition methods based on block chain, a kind of client, a kind of service Device and a kind of storage medium can not only realize the transmission of identifying code based on block chain network, can be with without using SIM card That realizes identifying code verifying event deposits card.
In a first aspect, the embodiment of the invention provides a kind of identifying code acquisition methods based on block chain, the method packet It includes:
Identifying code request is sent to server, the identifying code request carries the mark of client, the identifying code request For making the server generate target verification code, and the target verification code is encrypted to obtain ciphertext, be tested according to described It demonstrate,proves code request, the mark of the client and the ciphertext and generates verify data, and the verify data is distributed to block chain Network, and obtain storage address of the verify data in the block chain network;
The storage address that the server is sent is received, and according to the mark of the client and the storage address The verify data is obtained from the block chain network;
Ciphertext in the verify data is decrypted to obtain the target verification code.
Second aspect, the identifying code acquisition methods the embodiment of the invention provides another kind based on block chain, the method Include:
In response to the identifying code request that client is sent, target verification code is generated, the identifying code request carries the visitor The mark at family end;
The target verification code is encrypted, ciphertext is obtained;
Verify data is generated according to identifying code request, the mark of the client and the ciphertext;
The verify data is distributed to block chain network, and obtains the verify data in the block chain network Storage address;
The storage address is sent to the client, so that the client is according to the mark of the client and described Storage address obtains the verify data from the block chain network, and the ciphertext in the verify data is decrypted To the target verification code.
It is described corresponding in a first aspect, the embodiment of the invention provides a kind of identifying code acquisition device based on block chain Device includes:
Transmission unit, for sending identifying code request to server, the identifying code request carries the mark of client, institute Identifying code request is stated for making the server generate target verification code, and the target verification code is encrypted to obtain close Text generates verify data according to identifying code request, the mark of the client and the ciphertext, and by the verify data It is distributed to block chain network, and obtains storage address of the verify data in the block chain network;
Receiving unit, the storage address sent for receiving the server;
Processing unit, for being obtained from the block chain network according to the mark and the storage address of the client The verify data;
The processing unit is also used to that the ciphertext in the verify data is decrypted to obtain the target verification code.
Corresponding to second aspect, identifying code acquisition device the embodiment of the invention provides another kind based on block chain, institute Stating device includes:
Processing unit, the identifying code request for sending in response to client, generates target verification code, the identifying code is asked Seek the mark for carrying the client;
The processing unit is also used to encrypt the target verification code, obtains ciphertext, asked according to the identifying code It asks, the mark of the client and the ciphertext generate verify data;
The processing unit is also used to the verify data being distributed to block chain network, and obtains the verify data Storage address in the block chain network;
Transmission unit, for sending the storage address to the client, so that the client is according to the client The mark at end and the storage address obtain the verify data from the block chain network, and in the verify data Ciphertext is decrypted to obtain the target verification code.
In another aspect, the embodiment of the invention provides a kind of clients, comprising: processor, communication interface and memory, institute It states processor, the communication interface and the memory to be connected with each other, the memory is stored with executable program code, described Processor executes the identifying code described in above-mentioned first aspect based on block chain and obtains for calling the executable program code Method.
The embodiment of the invention also provides a kind of servers, comprising: processor, communication interface and memory, the processing Device, the communication interface and the memory are connected with each other, and the memory is stored with executable program code, the processor For calling the executable program code, the identifying code acquisition methods described in above-mentioned second aspect based on block chain are executed.
Correspondingly, the embodiment of the invention also provides a kind of storage medium, it is stored with instruction in the storage medium, when it When running on computers, so that computer executes the verifying based on block chain described in above-mentioned first aspect or second aspect Code acquisition methods.
In the embodiment of the present invention, identifying code is encrypted, the safety of identifying code can be improved;In addition, server will wrap The verify data for including the corresponding ciphertext of identifying code, identifying code request and client identification is distributed in block chain network, client It is verified code to being decrypted from the ciphertext in the verify data got in block chain network, on the one hand can be based on block chain On the other hand the transmission of network implementations identifying code can store identifying code verification process using block chain network without using SIM card In verify data, to realize that identifying code verifying event deposits card.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the configuration diagram that a kind of identifying code provided in an embodiment of the present invention obtains system;
Fig. 2 is a kind of structural schematic diagram of block chain block provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of identifying code acquisition methods based on block chain provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another identifying code acquisition methods based on block chain provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of identifying code acquisition device based on block chain provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another identifying code acquisition device based on block chain provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of client provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.
The embodiment of the present invention provides a kind of identifying code and obtains system, the identifying code obtain system can be by client, Server, multiple nodes (any form of calculating equipment in access network, such as server, user terminal) pass through network communication Form connect the distributed system to be formed.Distributed system can be block catenary system, be implementation of the present invention referring to Fig. 1, Fig. 1 The identifying code that example provides obtains the optional framework signal that system is applied to block catenary system (block chain network in other words) Figure, is formed by client, server and multiple nodes.Point-to-point (P2P, the Peer To Peer) net of composition is formed between node Network, P2P agreement are one and operate on transmission control protocol (TCP, Transmission Control Protocol) agreement Application layer protocol.In a distributed system, any machine such as server, terminal can be added and become node, node packet Include hardware layer, middle layer, operating system layer and application layer.
Referring to the function of each node in block catenary system shown in fig. 1, the function being related to includes:
1) it routes, the basic function that node has, for the communication between supporting node.
Node, can be with the following functions in addition to routing function:
2) it applies, for being deployed in block chain, specific transactions is realized according to practical business demand, record realizes function Relevant data form record data, carry digital signature in the recorded data to indicate the source of task data, will record number According to other nodes being sent in block catenary system, for other nodes in verifying record data source and integrality success, Record data are added in interim block.
For example, the business that application is realized includes:
2.1) wallet, for providing the function of carrying out the transaction of electronic money, including initiation transaction (that is, will currently trade Transaction record be sent to other nodes in block catenary system, after the success of other node verifications, as recognizing that transaction is effective Response, will be in the interim block of the record data deposit block chain of transaction;Certainly, wallet is also supported in inquiry electronic money address Remaining electronic money;
2.2) account book, the function of the operations such as storage, inquiry and modification for providing account data, by reconciliation mesh number are shared According to the record data of operation be sent to other nodes in block catenary system, after other node verifications are effective, as recognizing account Record data are stored in interim block by mesh number according to effective response, can also send confirmation to the node for initiating operation.
2.3) intelligent contract, the agreement of computerization can execute the clause of some contract, by being deployed in shared account book On code for being executed when meeting certain condition realize, according to actual business demand code for completing automation Transaction, such as the physical state of inquiry the bought commodity of buyer, by the transfer of the electronic money of buyer after buyer signs for cargo To the address of trade company;Certainly, intelligent contract be not limited only to execute for transaction contract, can also be performed to received information into The contract of row processing.
3) block chain, including a series of block (Block) that successive time sequencings according to generation mutually connect, new block Once be added in block chain to be removed again, the record data of block catenary system interior joint submission are had recorded in block.
Referring to fig. 2, Fig. 2 is that block structure provided in an embodiment of the present invention (Block Structure) one is optionally shown It is intended to, includes the cryptographic Hash (cryptographic Hash of this block) and previous block that this block storing data records in each block Cryptographic Hash, each block connect to form block chain by cryptographic Hash.In addition, can also include time when block generates in block The information such as stamp.Block chain (Blockchain) is substantially the database of a decentralization, is a string using cryptography method It is associated the data block generated, contains relevant information in each data block, the validity for verifying its information is (anti- It is pseudo-) and the next block of generation.
In the embodiment of the present invention, user end to server sends the identifying code request for carrying client identification;Server is rung It should request to generate target verification code in the identifying code, and the target verification code is encrypted to obtain ciphertext, be asked according to identifying code It asks, the mark of client and ciphertext generate verify data, and the verify data of generation be distributed to block chain network, and will obtain Storage address of the verify data got in block chain network is sent to client;Client is according to its mark and the storage Location obtains the verify data from block chain network, and the ciphertext in the verify data is decrypted to obtain the target verification Code.By the above-mentioned means, can be encrypted to identifying code, to improve the safety of identifying code;In addition, block chain network can be based on The transmission for realizing identifying code, without using SIM card;And also using testing in block chain network storage identifying code verification process Data are demonstrate,proved, to realize that identifying code verifying event deposits card.It is described in detail below.
Referring to Fig. 3, Fig. 3 is a kind of process of the identifying code acquisition methods based on block chain provided in an embodiment of the present invention Schematic diagram.Identifying code acquisition methods described in the embodiment of the present invention based on block chain include:
S301, user end to server send identifying code request.
In the embodiment of the present invention, client detect the register of user's triggering or operate certain program (such as Give out information, place an order) etc. operation when, to server send identifying code request, with to server request random verification code.It should Identifying code request carries the mark of client.In one embodiment, which can be public key address, and public key address is client Hold the storage address of the corresponding public key of local private key.The public key and private key form asymmetric key pair, this two keys can be with Encryption and decryption each other, if that only corresponding key can just be decrypted with one of encrypted data;Public key is public It opens, does not need to maintain secrecy, and private key is must to be kept properly by holding in one's own possession and be paid attention to maintaining secrecy.In other embodiments, should Mark can be the corresponding public key of client local private key, or the media access control address (Media for client Access Control Address, MAC Address) etc. can be used for the character string of unique identification client.
S302, the server are requested in response to the identifying code that the client is sent, and generate target verification code.
In the embodiment of the present invention, server can use its preset identifying code generate program, identifying code Core Generator or Person's identifying code generating algorithm generates random verification code, and using the random verification code of generation as target verification code.The accidental validation Code can be the character string for the preset characters number that server generates at random, which may include in number, letter and Chinese character One or more.In a specific embodiment, server predefined default characters, the default characters include more The mapping relations of a character and each character and number;After server receives the identifying code request of client transmission, ring Should identifying code request generate random number, and concentrated from preset characters and inquire character with nonces match;It is tested according to generation The length of card code repeats above-mentioned steps, obtains multiple characters;Server is successive suitable according to what is inquired by multiple character Sequence is arranged in target verification code, or by multiple character random alignment at target verification code.
S303, the server encrypt the target verification code, obtain ciphertext.
In the embodiment of the present invention, when the public key address for being identified as its corresponding public key of local private key of client, service Device obtains the public key address of client from the identifying code request that client is sent, and it is local to obtain client according to the public key address The corresponding public key of private key, and target verification code is encrypted using the public key, obtain ciphertext.
In another embodiment, when client is when being identified as the corresponding public key of its local private key, server is from client The public key is obtained in the identifying code request of transmission, and target verification code is encrypted using the public key, obtains ciphertext.
In another embodiment, it is identified as the character string for unique identification client such as its MAC Address when client, And not for the public key of client or when public key address, server by utilizing server local private key adds the target verification code It is close, obtain ciphertext.
S304, the server are requested according to the identifying code, the mark of client and the ciphertext generate verify data.
The verify data is distributed to block chain network by S305, the server, and obtains the verify data in institute State the storage address in block chain network.
In the embodiment of the present invention, the verify data of generation is sent to the node in block chain network by server, the node It can be any node in block chain network.In other embodiments, the node specifically can be in block chain network away from The node nearest from server, to improve the efficiency of server transport data.In addition, the node is also possible in block chain network The node nearest apart from client., can be by user end to server requests verification code for node, server is to client The behavior that end sends identifying code is considered as a transaction.The node receive server transmission verify data after, according to The verify data generates target block, and the target block is added in block chain.Wherein it is possible to include by the verify data The mark of client be loaded in the block head of target block, in order to which the subsequent mark according to client inquires the target Block.In this mode, storage address of the verify data that server is got in block chain network is to generate the target block Node node address.
In other embodiments, which can be synchronized to block chain network by the node for generating the target block In each node can effectively prevent the verifying number in order to which each node in block chain network stores the verify data According to by falsification.In this mode, storage address of the verify data that server is got in block chain network can be block chain The node address of any node in network.In one embodiment, the verify data that server is got is in block chain network Storage address be specifically as follows generate the target block node node address, or in block chain network distance take The node address of the nearest node of business device;Furthermore it is also possible to for the node of node nearest apart from client in block chain network Address, to improve the efficiency that client obtains verify data.
The embodiment of the present invention by the way that verify data is distributed to block chain network, with using the block in block chain network come The verify data generated in storage identifying code verification process can execute register or operate certain for subsequent judgement client Identifying code verifying whether was carried out in the operating process such as kind program, strong evidence is provided, to realize depositing for identifying code verifying event Card.
S306, the server send the storage address to the client.
S307, the client receive the storage address that the server is sent, and according to the mark of the client Know and the storage address obtains the verify data from the block chain network.
In the embodiment of the present invention, node of the client into the corresponding block chain network of the storage address sends verify data Request, verify data request carry the mark of client.After the node receives the verify data request of client transmission, The target block for storing the verify data of client is inquired from the block chain being locally stored, and is obtained from the target block It takes and is sent to client with the matched verify data of the mark of client, and the verify data that will acquire.Correspondingly, client End receives the verify data that the node is sent.In one embodiment, node record client in ciphertext request record obtains Take the record of verify data, so that server is in the identifying code that subsequent check client is submitted, inquiring client terminal whether be from The identifying code that the node obtains.
S308, the client are decrypted the ciphertext in the verify data to obtain the target verification code.
In the embodiment of the present invention, if the ciphertext in verify data is the corresponding public key of server by utilizing client local private key Target verification code is encrypted, then using its local, the ciphertext in verify data is decrypted in private key to client To target verification code.
In another embodiment, if the ciphertext in verify data be its local private key of server by utilizing to target verification code into Row encryption obtains, then server is while sending verify data storage address to client, by server local private key pair The public key address of the public key answered or the public key is sent to client.Client obtains the corresponding public key of server local private key, And the ciphertext in verify data is decrypted using the public key to obtain target verification code.
In one embodiment, the ciphertext in verify data is decrypted after obtaining target verification code in client, output Prompt information comprising the target verification code, to prompt client user to be manually entered target verification in identifying code input frame Code.In one embodiment, the target verification code can be shown in the predeterminable area of interface of input method, and pass through in user defeated During entering method keyboard input target verification code, target verification code is shown in always the predeterminable area of interface of input method.Another In one embodiment, the ciphertext in verify data is decrypted after obtaining target verification code in client, automatically tests the target Card code is input in identifying code input frame.
Client sends verifying code check request when detecting the trigger event for determining submission identifying code, to server, Verifying code check request carries the mark of identifying code and client to be verified.Wherein it is possible to be to work as to detect that user inputs When determining the instruction for submitting identifying code, the trigger event for determining and submitting identifying code is confirmly detected;It is also possible to manual in user During inputting identifying code, when detecting that the number of characters of identifying code of input reaches preset characters number, confirmly detect really Surely the trigger event of identifying code is submitted.Server is stored according to the mark of client from the corresponding node of above-mentioned storage address Inquiring client terminal obtains the record of verify data in ciphertext request record.If in ciphertext request record, there is no client acquisitions to test The record of data is demonstrate,proved, server then determines that client is not the identifying code obtained from the node, and directly decision verification code check The verifying code check that request carries does not pass through.If in ciphertext request record, there are the record that client obtains verify data, services Device then local search and the matched target verification code of client identification, and judge to verify identifying code and mesh that code check request carries Whether consistent mark identifying code;If consistent, it is determined that the verifying code check that verifying code check request carries passes through;It is on the contrary, it is determined that The verifying code check that verifying code check request carries does not pass through.
By the above-mentioned means, can also realize the function of short-message verification even if client does not configure SIM card, can effectively solve The problem of certainly current terminal is without short-message verification is unable to complete in the case of SIM card increases the diversity of identifying code verification mode.
In the embodiment of the present invention, identifying code is encrypted, the safety of identifying code can be improved;In addition, server will wrap The verify data for including the corresponding ciphertext of identifying code, identifying code request and client identification is distributed in block chain network, client It is verified code to being decrypted from the ciphertext in the verify data got in block chain network, on the one hand can be based on block chain On the other hand the transmission of network implementations identifying code can store identifying code verification process using block chain network without using SIM card In verify data, to realize that identifying code verifying event deposits card.
Referring to Fig. 4, Fig. 4 is the stream of another identifying code acquisition methods based on block chain provided in an embodiment of the present invention Journey schematic diagram.Identifying code acquisition methods described in the embodiment of the present invention based on block chain include:
S401, user end to server send identifying code request.
S402, the server are requested in response to the identifying code that the client is sent, and generate target verification code.
S403, the server encrypt the target verification code, obtain ciphertext.
S404, the server are requested according to the identifying code, the mark of client and the ciphertext generate verify data.
In the embodiment of the present invention, the specific implementation of step S401 to step S404 can refer to the phase in embodiment above It should describe, details are not described herein again.
The verify data is sent to the first node in block chain network by S405, the server.
In the embodiment of the present invention, first node can be any node in block chain network.In other embodiments, First node specifically can be the node that distance service device is nearest in block chain network, to improve the effect of server transport data Rate.Wherein, server can store the node address of each node in block chain network.
S406, the first node generate target block according to the verify data, and the target block is added to In block chain.
In the embodiment of the present invention, for the node in block chain network, user end to server can be requested to test Code is demonstrate,proved, server is considered as a transaction to the behavior that client sends identifying code.First node is receiving server transmission Verify data after, target block is generated according to the verify data, and the target block is added in local block chain.Its In, the mark for the client which includes can be loaded in the block head of target block, in order to subsequent basis The mark of client inquires the target block.
The target block is sent to the second node in the block chain network by S407, the first node, will The target block is synchronized to the second node.
In the embodiment of the present invention, second node can refer to any node in block chain network in addition to first node, It may also mean that the node set of any node composition in block chain network in addition to first node.Target block is synchronized to Each node in block chain network may make each node in block chain network to store identical verify data, can have Effect prevents verify data by falsification.In other embodiments, second node specifically can be in block chain network apart from client The node set for holding the specific nodes such as nearest node to form.
S408, the second node receive the target block that the first node is sent, and by the target block It is added in the local block chain of each node.
S409, the server send memory address request to the first node.
In the embodiment of the present invention, memory address request carries the mark and the corresponding section of institute's memory request address of client The attribute information of point;The memory address request can also carry the location information etc. of client and/or server.Storage address is asked Ask the node address of the destination node for storing above-mentioned verify data to first node request and meeting the attribute information, the section Dot address namely it is satisfactory storage address.The destination node for meeting the attribute information includes: the section for generating target block The nearest node of point, the node nearest apart from client, distance service device or load based on each node, the response time, with The optimal node, etc. that the factors such as the distance between client and/or server are determined.
S410, the first node obtain storage address, and the storage that will acquire in response to the memory address request Address is sent to server.
In the embodiment of the present invention, the memory address request that first node is sent in response to server obtains and stores above-mentioned test It demonstrate,proves data and meets the node address of the destination node of the attribute information, the node address of the destination node, which that is to say, to be conformed to The storage address asked;And the storage address is sent to server.Wherein, first node is stored with each node in block chain network Node address and the information such as position.
S411, the server receive the storage address that the first node is sent, and to described in client transmission Storage address.
In one embodiment, memory address request also carries the address of client, and first node can directly will acquire Storage address be sent to client.
S412, the client send verifying number to the corresponding destination node of the storage address according to the storage address According to request, to obtain the verify data from the target block that the destination node stores, the verify data request is carried The mark of client.
S413, the destination node respond the verify data request verify data, and the verifying number that will acquire According to being sent to the client.
In the embodiment of the present invention, after destination node receives the verify data request of client transmission, from being locally stored Block chain in inquire the target block for storing the verify data of client, and from the target block obtain and client The matched verify data of mark, and the verify data that will acquire is sent to client.Correspondingly, client receives the section The verify data that point is sent.
S414, the client are decrypted the ciphertext in the verify data to obtain the target verification code.
In the embodiment of the present invention, if the ciphertext in verify data is the corresponding public key of server by utilizing client local private key Target verification code is encrypted, then using its local, the ciphertext in verify data is decrypted in private key to client To target verification code.For example, it is assumed that n=3233, e=17, d=2753;N and e are packaged into public key, n and d are packaged into private key, It that is to say that public key is (3233,17), private key is (3233,2723);Encryption uses public key (3233,17), and decryption uses private key (3233,2723).Public key (3233,17) encryption: character string can be indicated using ascil code/unicode value, it is assumed that one A character m=a, ascii code are 65, need to meet m < n and encrypt to m.M^e ≡ c (mod n), c are encrypted characters string;N= 3233, e=17.Above formula can indicate are as follows: (65^17) %3233=c, c=2790.Private key (3233,2723) decryption: it is taking After c=2790, execute following algorithm: m is can be obtained in c^d ≡ m (mod n).Above formula can indicate are as follows: m=(2790^ 2723) %3233 passes through the available answer m=65 of quick power modulus.
It should be noted that the specific implementation of certain not detailed descriptions of the step S401 into step S414 can refer to Corresponding description in embodiment above, details are not described herein again.
Referring to Fig. 5, Fig. 5 is a kind of identifying code acquisition device based on block chain that first embodiment of the invention provides Structural schematic diagram.Identifying code acquisition device described in the embodiment of the present invention based on block chain is applied to previously described Client, described device include:
Transmission unit 501, for sending identifying code request to server, the identifying code request carries the mark of client Know, the identifying code request encrypt to the target verification code for making the server generate target verification code To ciphertext, verify data is generated according to identifying code request, the mark of the client and the ciphertext, and by the verifying Data publication is to block chain network, and obtains storage address of the verify data in the block chain network;
Receiving unit 502, the storage address sent for receiving the server;
Processing unit 503, for the mark and the storage address according to the client from the block chain network Obtain the verify data;
The processing unit 503 is also used to that the ciphertext in the verify data is decrypted to obtain the target verification Code.
In one embodiment, described to be identified as public key address, the public key address is corresponding for client local private key Public key address, the ciphertext is that the server by utilizing tests the target according to the public key that the public key address is got Card code is encrypted;
When the processing unit 503 is decrypted to obtain the target verification code to the ciphertext in the verify data, tool Body is used for: the ciphertext in the verify data being decrypted using the private key to obtain the target verification code.
In one embodiment, the processing unit 503 is according to the mark of the client and the storage address from described When obtaining the verify data in block chain network, it is specifically used for:
Verifying is sent by node of the transmission unit 501 into the corresponding block chain network of the storage address Request of data, the verify data request carry the mark of the client, and the verify data request is for making the node It obtains and identifies matched verify data with described, and the verify data that will acquire is sent to the client;
The verify data that the node is sent is received by the receiving unit 502.
It is understood that the function of each functional unit of the identifying code acquisition device based on block chain of the embodiment of the present invention It can be implemented according to the method in above method embodiment, specific implementation process is referred to above method embodiment Associated description, details are not described herein again.
In the embodiment of the present invention, identifying code is encrypted, the safety of identifying code can be improved;In addition, server will wrap The verify data for including the corresponding ciphertext of identifying code, identifying code request and client identification is distributed in block chain network, client It is verified code to being decrypted from the ciphertext in the verify data got in block chain network, on the one hand can be based on block chain On the other hand the transmission of network implementations identifying code can store identifying code verification process using block chain network without using SIM card In verify data, to realize that identifying code verifying event deposits card.
Referring to Fig. 6, Fig. 6 is a kind of identifying code acquisition device based on block chain that second embodiment of the invention provides Structural schematic diagram.Identifying code acquisition device described in the embodiment of the present invention based on block chain is applied to previously described Server, described device include:
Processing unit 601, the identifying code request for sending in response to client, generates target verification code, the verifying Code request carries the mark of the client;
The processing unit 601 is also used to encrypt the target verification code, ciphertext is obtained, according to the verifying Code request, the mark of the client and the ciphertext generate verify data;
The processing unit 601 is also used to the verify data being distributed to block chain network, and obtains the verifying number According to the storage address in the block chain network;
Transmission unit 602, for sending the storage address to the client, so that the client is according to the visitor The mark at family end and the storage address obtain the verify data from the block chain network, and in the verify data Ciphertext be decrypted to obtain the target verification code.
In one embodiment, described to be identified as public key address, the public key address is corresponding for client local private key Public key address, the processing unit 601 encrypts the target verification code, when obtaining ciphertext, is specifically used for: according to The public key address obtains the corresponding public key of client local private key;The target verification code is carried out using the public key Encryption, obtains ciphertext.
In one embodiment, it is specific to use when the verify data is distributed to block chain network by the processing unit 601 In: the verify data is sent to by the node in block chain network by the transmission unit 602 so that the node according to The verify data generates target block, and the target block is added in block chain.
In one embodiment, described device further includes receiving unit 603, the identifying code sent for receiving the client Verification request;
The processing unit 601 is also used to: being requested in response to the verifying code check that the client is sent, is tested described in acquisition Demonstrate,prove the mark of code check the request identifying code carried and the client;According to the mark of the client from the storage address The record that the client obtains the verify data is inquired in the ciphertext request record of corresponding node storage;If the ciphertext There is no the records that the client obtains the verify data in request record, it is determined that the verifying code check request carries Verifying code check do not pass through.
In another embodiment, the processing unit 601 is also used to: if there are the clients in ciphertext request record End obtains the record of the verify data, then obtains the target verification code according to the mark;Judge the verifying code check Request the identifying code carried and the target verification code whether consistent, if so, determining what the verifying code check request carried Verifying code check passes through.
It is understood that the function of each functional unit of the identifying code acquisition device based on block chain of the embodiment of the present invention It can be implemented according to the method in above method embodiment, specific implementation process is referred to above method embodiment Associated description, details are not described herein again.
In the embodiment of the present invention, identifying code is encrypted, the safety of identifying code can be improved;In addition, server will wrap The verify data for including the corresponding ciphertext of identifying code, identifying code request and client identification is distributed in block chain network, client It is verified code to being decrypted from the ciphertext in the verify data got in block chain network, on the one hand can be based on block chain On the other hand the transmission of network implementations identifying code can store identifying code verification process using block chain network without using SIM card In verify data, to realize that identifying code verifying event deposits card.
Referring to Fig. 7, Fig. 7 is a kind of structural schematic diagram of client provided in an embodiment of the present invention.The embodiment of the present invention Described in client include: processor 701, user interface 702, communication interface 703 and memory 704.Wherein, processor 701, user interface 702, communication interface 703 and memory 704 can be connected by bus or other modes, the embodiment of the present invention with For being connected by bus.
Wherein, processor 701 (or CPU (Central Processing Unit, central processing unit)) is the meter of terminal Core and control core are calculated, can parse the Various types of data of all kinds of instructions and processing terminal in terminal, such as: CPU It can be used for parsing user to instruct to switching on and shutting down transmitted by terminal, and controlling terminal carries out switching on and shutting down operation;For another example: CPU can To transmit all kinds of interaction datas, etc. between terminal inner structure.User interface 702 is to realize that user interacts with terminal With the medium of information exchange, concrete embodiment may include for the display screen (Display) of output and for the key of input Disk (Keyboard) etc., it should be noted that keyboard herein both can be physical keyboard, or touch screen virtual key Disk can also be keyboard of the entity in conjunction with touch screen virtualphase.Communication interface 703 optionally may include that the wired of standard connects Mouth, wireless interface (such as Wi-Fi, mobile communication interface) are used for sending and receiving data by the control of processor 701.Memory 704 (Memory) it is memory device in terminal, for storing program and data.It is understood that memory 704 herein was both It may include the internal memory of terminal, naturally it is also possible to the extended menory supported including terminal.The offer of memory 704 is deposited Store up space, which stores the operating system of terminal, it may include but be not limited to: android system, iOS system, Windows Phone system etc., the present invention is to this and is not construed as limiting.
In embodiments of the present invention, processor 701 is executed such as by the executable program code in run memory 704 Lower operation:
Identifying code request is sent to server by communication interface 703, the identifying code request carries the mark of client, The identifying code request is encrypted to obtain close for making the server generate target verification code to the target verification code Text generates verify data according to identifying code request, the mark of the client and the ciphertext, and by the verify data It is distributed to block chain network, and obtains storage address of the verify data in the block chain network;
The storage address that the server is sent is received by communication interface 703, and according to the mark of the client Know and the storage address obtains the verify data from the block chain network;
Ciphertext in the verify data is decrypted to obtain the target verification code.
In one embodiment, described to be identified as public key address, the public key address is corresponding for client local private key Public key address, the ciphertext is that the server by utilizing tests the target according to the public key that the public key address is got Card code is encrypted;The processor 701 is decrypted to obtain the target and test to the ciphertext in the verify data When demonstrate,proving code, it is specifically used for: the ciphertext in the verify data is decrypted using the private key to obtain the target verification code.
In one embodiment, the processor 701 is according to the mark of the client and the storage address from the area When obtaining the verify data in block chain network, it is specifically used for: corresponding described to the storage address by communication interface 703 Node in block chain network sends verify data request, and the verify data request carries the mark of the client, described Verify data request identifies matched verify data with described for obtaining the node, and the verify data hair that will acquire Give the client;The verify data that the node is sent is received by communication interface 703.
In the specific implementation, processor 701 described in the embodiment of the present invention, user interface 702, communication interface 703 and Client described in a kind of identifying code acquisition methods based on block chain provided in an embodiment of the present invention can be performed in memory 704 Implementation described in the identifying code acquisition device based on block chain shown in Fig. 4 also can be performed, herein in the implementation at end It repeats no more.
In the embodiment of the present invention, identifying code is encrypted, the safety of identifying code can be improved;In addition, server will wrap The verify data for including the corresponding ciphertext of identifying code, identifying code request and client identification is distributed in block chain network, client It is verified code to being decrypted from the ciphertext in the verify data got in block chain network, on the one hand can be based on block chain On the other hand the transmission of network implementations identifying code can store identifying code verification process using block chain network without using SIM card In verify data, to realize that identifying code verifying event deposits card.
Referring to Fig. 8, Fig. 8 is a kind of structural schematic diagram of server provided in an embodiment of the present invention.The embodiment of the present invention Described in client include: processor 801, communication interface 802 and memory 803.Wherein, processor 801, communication interface 802 and memory 803 can be connected by bus or other modes, the embodiment of the present invention is for through bus connection.
Wherein, processor 801 (or CPU (Central Processing Unit, central processing unit)) is server Core and control core are calculated, can parse the Various types of data of all kinds of instructions and processing server in server, example Such as: CPU can transmit all kinds of interaction datas, etc. between server internal structure.Communication interface 802 optionally may include Standard wireline interface and wireless interface (such as Wi-Fi, mobile communication interface), by the control of processor 801 for receiving and dispatching number According to.Memory 803 (Memory) is the memory device in server, for storing program and data.It is understood that herein Memory 803 both may include server internal memory, naturally it is also possible to the extension storage supported including server Device.Memory 803 provides memory space, which stores the operating system of server, it may include but be not limited to: Android system, iOS system, Windows Phone system etc., the present invention is to this and is not construed as limiting.
In embodiments of the present invention, processor 801 is executed such as by the executable program code in run memory 803 Lower operation:
In response to the identifying code request that client is sent, target verification code is generated, the identifying code request carries the visitor The mark at family end;
The target verification code is encrypted, ciphertext is obtained;
Verify data is generated according to identifying code request, the mark of the client and the ciphertext;
The verify data is distributed to block chain network, and obtains the verify data in the block chain network Storage address;
The storage address is sent to the client by communication interface 802, so that the client is according to the visitor The mark at family end and the storage address obtain the verify data from the block chain network, and in the verify data Ciphertext be decrypted to obtain the target verification code.
In one embodiment, described to be identified as public key address, the public key address is corresponding for client local private key Public key address, the processor 801 encrypts the target verification code, when obtaining ciphertext, is specifically used for: according to institute It states public key address and obtains the corresponding public key of client local private key;The target verification code is added using the public key It is close, obtain ciphertext.
In one embodiment, when the verify data is distributed to block chain network by the processor 801, it is specifically used for: The verify data is sent to the node in block chain network by communication interface 802, so that the node is tested according to It demonstrate,proves data and generates target block, and the target block is added in block chain.
In one embodiment, the processor 801 is also used to: the verifying code check sent in response to the client is asked It asks, obtains the mark of verifying code check the request identifying code carried and the client;According to the mark of the client The client, which is inquired, from the ciphertext request record that the corresponding node of the storage address stores obtains the verify data Record;If in the ciphertext request record, there is no the records that the client obtains the verify data, it is determined that described to test The verifying code check that card code check request carries does not pass through.
In another embodiment, the processor 801 is also used to: if there are the clients in ciphertext request record The record of the verify data is obtained, then the target verification code is obtained according to the mark;Judge that the verifying code check is asked Ask the identifying code of carrying and the target verification code whether consistent, if so, determining testing for the verifying code check request carrying Card code check passes through.
In the specific implementation, processor 801 described in the embodiment of the present invention, communication interface 82 and memory 803 can be held The implementation of server described in a kind of row identifying code acquisition methods based on block chain provided in an embodiment of the present invention, Also implementation described in the identifying code acquisition device based on block chain shown in Fig. 5 can be performed, details are not described herein.
In the embodiment of the present invention, identifying code is encrypted, the safety of identifying code can be improved;In addition, server will wrap The verify data for including the corresponding ciphertext of identifying code, identifying code request and client identification is distributed in block chain network, client It is verified code to being decrypted from the ciphertext in the verify data got in block chain network, on the one hand can be based on block chain On the other hand the transmission of network implementations identifying code can store identifying code verification process using block chain network without using SIM card In verify data, to realize that identifying code verifying event deposits card.
The embodiment of the invention also provides a kind of storage medium, instruction is stored in storage medium, when its on computers When operation, so that computer executes client institute in the identifying code acquisition methods based on block chain as described in the embodiments of the present invention The method of execution.
The embodiment of the invention also provides another storage medium, instruction is stored in storage medium, when it is in computer When upper operation, so that computer executes server in the identifying code acquisition methods based on block chain as described in the embodiments of the present invention Performed method.
The embodiment of the present invention also provides a kind of computer program product comprising instruction, when run on a computer, So that computer executes in the identifying code acquisition methods based on block chain as described in the embodiments of the present invention performed by client Method performed by client or server in method.
It should be noted that for simple description, therefore, it is stated as a systems for each embodiment of the method above-mentioned The combination of actions of column, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described, because For according to the present invention, certain some step can be performed in other orders or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily this hair Necessary to bright.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
Above disclosed is only section Example of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (11)

1. a kind of identifying code acquisition methods based on block chain, which is characterized in that the described method includes:
Identifying code request is sent to server, the identifying code request carries the mark of client, and the identifying code request is used for So that the server is generated target verification code, and the target verification code is encrypted to obtain ciphertext, according to the identifying code Request, the mark of the client and the ciphertext generate verify data, and the verify data is distributed to block chain network, And obtain storage address of the verify data in the block chain network;
Receive the storage address that the server is sent, and according to the mark of the client and the storage address from institute It states and obtains the verify data in block chain network;
Ciphertext in the verify data is decrypted to obtain the target verification code.
2. the method as described in claim 1, which is characterized in that described to be identified as public key address, the public key address is described The address of the corresponding public key of client local private key, the ciphertext are that the server by utilizing is got according to the public key address Public key the target verification code encrypted;
The ciphertext in the verify data is decrypted to obtain the target verification code, comprising:
The ciphertext in the verify data is decrypted using the private key to obtain the target verification code.
3. method according to claim 1 or 2, which is characterized in that the mark and the storage according to the client Address obtains the verify data from the block chain network, comprising:
Node into the corresponding block chain network of the storage address sends verify data request, and the verify data is asked The mark for carrying the client is sought, the verify data request is for obtaining the node and the matched verifying of mark Data, and the verify data that will acquire is sent to the client;
Receive the verify data that the node is sent.
4. a kind of identifying code acquisition methods based on block chain, which is characterized in that the described method includes:
In response to the identifying code request that client is sent, target verification code is generated, the identifying code request carries the client Mark;
The target verification code is encrypted, ciphertext is obtained;
Verify data is generated according to identifying code request, the mark of the client and the ciphertext;
The verify data is distributed to block chain network, and obtains storage of the verify data in the block chain network Address;
The storage address is sent to the client, so that mark and the storage of the client according to the client Address obtains the verify data from the block chain network, and the ciphertext in the verify data is decrypted to obtain institute State target verification code.
5. method as claimed in claim 4, which is characterized in that described to be identified as public key address, the public key address is described The address of the corresponding public key of client local private key, it is described that the target verification code is encrypted, obtain ciphertext, comprising:
The corresponding public key of client local private key is obtained according to the public key address;
The target verification code is encrypted using the public key, obtains ciphertext.
6. method as described in claim 4 or 5, which is characterized in that it is described that the verify data is distributed to block chain network, Include:
The verify data is sent to the node in block chain network, so that the node generates mesh according to the verify data Block is marked, and the target block is added in block chain.
7. method as described in claim 4 or 5, which is characterized in that the method also includes:
In response to the client send verifying code check request, obtain it is described verifying code check request carry identifying code and The mark of the client;
According to the inquiry from the ciphertext request record that the corresponding node of the storage address stores of the mark of the client Client obtains the record of the verify data;
If in the ciphertext request record, there is no the records that the client obtains the verify data, it is determined that the verifying The verifying code check that code check request carries does not pass through.
8. the method for claim 7, which is characterized in that the method also includes:
If there are the records that the client obtains the verify data in the ciphertext request record, obtained according to the mark Take the target verification code;
Judge whether identifying code and the target verification code of the verifying code check request carrying are consistent, if so, determining institute The verifying code check that verifying code check request carries is stated to pass through.
9. a kind of client characterized by comprising processor, communication interface and memory, the processor, the communication Interface and the memory are connected with each other, and the memory is stored with executable program code, and the processor is for calling institute Executable program code is stated, the identifying code acquisition methods as described in any one of claims 1-3 based on block chain are executed.
10. a kind of server characterized by comprising processor, communication interface and memory, the processor, the communication Interface and the memory are connected with each other, and the memory is stored with executable program code, and the processor is for calling institute Executable program code is stated, such as the described in any item identifying code acquisition methods based on block chain of claim 4-8 are executed.
11. a kind of storage medium, which is characterized in that instruction is stored in the storage medium, when run on a computer, So that computer executes such as the described in any item identifying code acquisition methods based on block chain of claim 1-3 or 4-8.
CN201910869882.8A 2019-09-16 2019-09-16 Verification code obtaining method based on block chain, client, server and storage medium Active CN110493261B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910869882.8A CN110493261B (en) 2019-09-16 2019-09-16 Verification code obtaining method based on block chain, client, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910869882.8A CN110493261B (en) 2019-09-16 2019-09-16 Verification code obtaining method based on block chain, client, server and storage medium

Publications (2)

Publication Number Publication Date
CN110493261A true CN110493261A (en) 2019-11-22
CN110493261B CN110493261B (en) 2021-07-27

Family

ID=68558169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910869882.8A Active CN110493261B (en) 2019-09-16 2019-09-16 Verification code obtaining method based on block chain, client, server and storage medium

Country Status (1)

Country Link
CN (1) CN110493261B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889128A (en) * 2019-11-27 2020-03-17 上海禾一网络科技有限公司 Input method and device based on block chain storage and encryption key exchange
CN110990790A (en) * 2019-11-29 2020-04-10 腾讯科技(深圳)有限公司 Data processing method and equipment
CN111078437A (en) * 2019-12-24 2020-04-28 五八有限公司 Remote calling method and device of verification code, electronic equipment and readable storage medium
CN111093196A (en) * 2019-12-30 2020-05-01 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111310156A (en) * 2019-11-28 2020-06-19 苏宁金融科技(南京)有限公司 Automatic identification method and system for slider verification code
CN111400743A (en) * 2020-04-07 2020-07-10 百度国际科技(深圳)有限公司 Transaction processing method and device based on block chain network, electronic equipment and medium
CN111835783A (en) * 2020-07-22 2020-10-27 东莞市盟大塑化科技有限公司 Data retrieval method and device and computer equipment
CN111835775A (en) * 2020-07-16 2020-10-27 华北电力科学研究院有限责任公司 Block chain-based Internet of things equipment safety calling method, device and equipment
CN112148379A (en) * 2020-08-28 2020-12-29 迅鳐成都科技有限公司 Method, device, system and storage medium for uninstalling user contract of alliance chain
WO2020098842A3 (en) * 2020-03-06 2021-01-07 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and devices for generating and verifying passwords
CN112383611A (en) * 2020-11-11 2021-02-19 上海保险交易所股份有限公司 File evidence storing method, system and server based on block chain
CN113078998A (en) * 2021-04-08 2021-07-06 太原理工大学 Block chain storage verification method for providing address information
CN113254972A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Information security management method based on block chain
CN114143030A (en) * 2021-10-29 2022-03-04 北京达佳互联信息技术有限公司 Verification processing method and device, electronic equipment and storage medium
CN114978541A (en) * 2022-05-19 2022-08-30 中国银行股份有限公司 Transaction data processing method, device, equipment and storage medium
CN116389013A (en) * 2023-06-07 2023-07-04 广州鲁邦通智能科技有限公司 Short message password verification method, mobile terminal and system
WO2024036645A1 (en) * 2022-08-19 2024-02-22 华为技术有限公司 Method and apparatus for obtaining key

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2557521A2 (en) * 2003-07-07 2013-02-13 Rovi Solutions Corporation Reprogrammable security for controlling piracy and enabling interactive content
CN106844477A (en) * 2016-12-23 2017-06-13 北京众享比特科技有限公司 To synchronous method after block catenary system, block lookup method and block chain
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN107920052A (en) * 2017-08-02 2018-04-17 唐盛(北京)物联技术有限公司 A kind of encryption method and intelligent apparatus
CN109102404A (en) * 2018-08-09 2018-12-28 全链通有限公司 The method for secret protection and system of block chain real name communication
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media
CN109743321A (en) * 2019-01-04 2019-05-10 中国联合网络通信集团有限公司 Block chain, application program, the user authen method of application program and system
US10298396B1 (en) * 2015-11-10 2019-05-21 Wells Fargo Bank, N.A. Identity management service via virtual passport
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN109995781A (en) * 2019-03-29 2019-07-09 腾讯科技(深圳)有限公司 Transmission method, device, medium and the equipment of data

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2557521A2 (en) * 2003-07-07 2013-02-13 Rovi Solutions Corporation Reprogrammable security for controlling piracy and enabling interactive content
US10298396B1 (en) * 2015-11-10 2019-05-21 Wells Fargo Bank, N.A. Identity management service via virtual passport
CN106844477A (en) * 2016-12-23 2017-06-13 北京众享比特科技有限公司 To synchronous method after block catenary system, block lookup method and block chain
CN107920052A (en) * 2017-08-02 2018-04-17 唐盛(北京)物联技术有限公司 A kind of encryption method and intelligent apparatus
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN109102404A (en) * 2018-08-09 2018-12-28 全链通有限公司 The method for secret protection and system of block chain real name communication
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media
CN109743321A (en) * 2019-01-04 2019-05-10 中国联合网络通信集团有限公司 Block chain, application program, the user authen method of application program and system
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN109995781A (en) * 2019-03-29 2019-07-09 腾讯科技(深圳)有限公司 Transmission method, device, medium and the equipment of data

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889128A (en) * 2019-11-27 2020-03-17 上海禾一网络科技有限公司 Input method and device based on block chain storage and encryption key exchange
CN111310156A (en) * 2019-11-28 2020-06-19 苏宁金融科技(南京)有限公司 Automatic identification method and system for slider verification code
CN110990790B (en) * 2019-11-29 2022-05-10 腾讯科技(深圳)有限公司 Data processing method and equipment
CN110990790A (en) * 2019-11-29 2020-04-10 腾讯科技(深圳)有限公司 Data processing method and equipment
CN111078437A (en) * 2019-12-24 2020-04-28 五八有限公司 Remote calling method and device of verification code, electronic equipment and readable storage medium
CN111078437B (en) * 2019-12-24 2023-07-14 五八有限公司 Remote calling method and device for verification codes, electronic equipment and readable storage medium
CN111093196B (en) * 2019-12-30 2022-04-08 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111093196A (en) * 2019-12-30 2020-05-01 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
WO2020098842A3 (en) * 2020-03-06 2021-01-07 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and devices for generating and verifying passwords
US11368309B2 (en) 2020-03-06 2022-06-21 Alipay (Hangzhou) Information Technology Co., Ltd. Methods and devices for generating and verifying passwords
CN111400743A (en) * 2020-04-07 2020-07-10 百度国际科技(深圳)有限公司 Transaction processing method and device based on block chain network, electronic equipment and medium
CN111400743B (en) * 2020-04-07 2023-08-15 百度国际科技(深圳)有限公司 Transaction processing method, device, electronic equipment and medium based on blockchain network
CN111835775A (en) * 2020-07-16 2020-10-27 华北电力科学研究院有限责任公司 Block chain-based Internet of things equipment safety calling method, device and equipment
CN111835783A (en) * 2020-07-22 2020-10-27 东莞市盟大塑化科技有限公司 Data retrieval method and device and computer equipment
CN112148379A (en) * 2020-08-28 2020-12-29 迅鳐成都科技有限公司 Method, device, system and storage medium for uninstalling user contract of alliance chain
CN112148379B (en) * 2020-08-28 2023-07-07 迅鳐成都科技有限公司 User contract unloading method, device and system of alliance chain and storage medium
CN112383611A (en) * 2020-11-11 2021-02-19 上海保险交易所股份有限公司 File evidence storing method, system and server based on block chain
CN113078998A (en) * 2021-04-08 2021-07-06 太原理工大学 Block chain storage verification method for providing address information
CN113254972A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Information security management method based on block chain
CN114143030A (en) * 2021-10-29 2022-03-04 北京达佳互联信息技术有限公司 Verification processing method and device, electronic equipment and storage medium
CN114143030B (en) * 2021-10-29 2023-09-19 北京达佳互联信息技术有限公司 Verification processing method and device, electronic equipment and storage medium
CN114978541A (en) * 2022-05-19 2022-08-30 中国银行股份有限公司 Transaction data processing method, device, equipment and storage medium
WO2024036645A1 (en) * 2022-08-19 2024-02-22 华为技术有限公司 Method and apparatus for obtaining key
CN116389013A (en) * 2023-06-07 2023-07-04 广州鲁邦通智能科技有限公司 Short message password verification method, mobile terminal and system
CN116389013B (en) * 2023-06-07 2023-09-15 广州鲁邦通智能科技有限公司 Short message password verification method, mobile terminal and system

Also Published As

Publication number Publication date
CN110493261B (en) 2021-07-27

Similar Documents

Publication Publication Date Title
CN110493261A (en) Identifying code acquisition methods, client, server and storage medium based on block chain
CN109155730A (en) Technology for device authorization
CN103746800B (en) TMK (terminal master key) safe downloading method and system
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN101641976B (en) An authentication method
CN105516948B (en) A kind of apparatus control method and device
CN109462588A (en) A kind of decentralization data trade method and system based on block chain
CN110537346A (en) Safe decentralization domain name system
CN1910882B (en) Method and system for protecting data, related communication network and computer programme product
KR20180053302A (en) Method and apparatus for facilitating electronic payments using wearable devices
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN104917807B (en) Resource transfers methods, devices and systems
CN110073387A (en) Confirm being associated between communication equipment and user
CN101405759A (en) Method and apparatus for user centric private data management
CN109688163A (en) Data processing method, device, equipment and storage medium based on alliance&#39;s chain
CN104125230B (en) A kind of short message certification service system and authentication method
CN108462710A (en) Authentication authority method, device, certificate server and machine readable storage medium
CN1977559B (en) Method and system for protecting information exchanged during communication between users
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN112804354B (en) Method and device for data transmission across chains, computer equipment and storage medium
CN111740966A (en) Data processing method based on block chain network and related equipment
CN110446203A (en) System and method for the vehicle data service based on safe subscription
JP4588529B2 (en) Service system and optimum service providing method
CN102811211A (en) Device supporting login certification and method for login certification
CN109509099A (en) Data trade method and device calculates equipment, storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant