Authentication method and device based on blockchain

A blockchain, authentication-side technology, applied in the field of communications, can solve problems such as loss of private keys, brute force cracking, insecure data transfer process, etc., to meet security requirements, improve accuracy, and improve the ability of hackers to attack.

Inactive Publication Date: 2017-05-31
中钞信用卡产业发展有限公司杭州区块链技术研究院
View PDF3 Cites 77 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both software encryption and cloud encryption have the following problems: the data transfer process is not safe, the interactive environment is not safe, and the private key is prone to loss, forgetting, brute force cracking, etc.
Once a problem occurs, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device based on blockchain
  • Authentication method and device based on blockchain
  • Authentication method and device based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0044] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0045] Fig. 1(a) is a schematic diagram of a blockchain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and device based on a blockchain. The method comprises the following steps: generating a roll-out private key for transferring digital assets through the blockchain and a corresponding roll-out public key according to a random number; carrying out coding treatment on the roll-out public key, and generating a roll-in address; carrying out digital signature on the basis of the roll-out private key, a transferring numerical value of the digital assets to be transferred and the roll-in address; acquiring digital asset transferring data on the basis of the transferring numerical value, the roll-in address, the digital signature and the roll-out public key; and broadcasting the digital asset transferring data into the blockchain so that the digital asset transferring data are subjected to first-grade authentication by an authentication side, or are subjected to multi-grade authentication by a server side and the authentication side jointly after first-grade authentication is finished. Therefore, by the embodiment, hacker attack ability can be improved, and safety requirements of data and transaction in a blockchain open environment can be met.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a blockchain-based authentication method and device. Background technique [0002] Traditional digital asset interactions (such as electronic currency transactions) are usually completed by centralized institutions. Centralized institutions mainly involve third-party transaction payment platforms, bank account management systems, remote payment systems, transfer clearing systems, etc. Traditional digital asset interaction methods have problems such as cumbersome operations, opaque data, and easy tampering. [0003] With the development of communication technology, blockchain has gradually been applied to various data processing application scenarios due to its advantages of decentralization, openness, transparency, and inability to tamper. The blockchain can be regarded as a distributed unified ledger. All participants jointly determine the accounting content. Ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06Q20/40G06Q20/38
CPCH04L63/08G06Q20/38215G06Q20/401H04L9/3247
Inventor 张一锋
Owner 中钞信用卡产业发展有限公司杭州区块链技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products