Secure and efficient block chain customization login method and security reinforcing system

A login method and block chain technology, applied in the field of block chain customized login method and security reinforcement system, can solve the problems of security risks, large number of digits, unfavorable customized login, etc., and achieve convenient customization and safety performance high effect

Active Publication Date: 2017-08-18
智牛股权投资基金(平潭)合伙企业(有限合伙)
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) There are many digits, which is not conducive to customized login;
[0006] 2) All stored on the data server, there are security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure and efficient block chain customization login method and security reinforcing system
  • Secure and efficient block chain customization login method and security reinforcing system
  • Secure and efficient block chain customization login method and security reinforcing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The principles of the disclosure will now be described with reference to some example embodiments. It can be understood that these embodiments are described only for the purpose of illustrating and helping those skilled in the art to understand and implement the present disclosure, rather than suggesting any limitation to the scope of the present disclosure. The disclosure described herein may be implemented in various ways other than those described below.

[0035] As used herein, the term "comprising" and its variations may be understood as open-ended terms meaning "including but not limited to". The term "based on" may be understood as "based at least in part on". The term "one embodiment" can be read as "at least one embodiment". The term "another embodiment" may be understood as "at least one other embodiment".

[0036] figure 1 is a schematic diagram of the interaction of the blockchain in the prior art, figure 2 It is a schematic diagram of the broadcast au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure and efficient block chain customization login method and security reinforcing system. The method logs in a block chain network and comprises the following steps: selecting N bits from M bits of a character string of an original key according to a basic protocol to take as a simple login key to return to a client for logging in, performing encryption on the rest (M-N) bits of the character string to obtain an encrypted key value, then storing an encrypted result of the key to a data server, performing decryption on the encrypted key value in use to obtain the (M-N) bits of the character string, and forming the complete M bits of the character string by inputting the N bits of the character string for mutual confirmation. According to the secure and efficient block chain client login method and security reinforcing system disclosed by the invention, when the client logs in, the digits are few and are easy to be remembered, thereby being convenient for customization; and meanwhile, the character string is encrypted and stored in segments, so the security capability is high; and thus, the problems that the existing block chain private key is lost and stolen easily are solved well.

Description

technical field [0001] The invention relates to the field of block chains, in particular to a safe and efficient block chain customized login method and a security reinforcement system. Background technique [0002] In the era of big data, the whole world is digitized and enters the sea of ​​data through the Internet. This not only makes our lives more convenient, but also provides an opportunity to create wealth. However, the issue of data security cannot be underestimated. Blockchain is expected to solve this problem in the future. Blockchain is similar to an open network ledger. It originated from Bitcoin and is the underlying technology of Bitcoin. All the information of transaction records will be packaged into a "block" for storage. With the expansion of information exchange, each block is connected to each other to form a block. chain. The digital currency represented by Bitcoin is a point-to-point electronic cash system. Each transaction will be broadcast to all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0894H04L63/0428H04L63/08
Inventor 宋文鹏高林挥华正皓迟祥
Owner 智牛股权投资基金(平潭)合伙企业(有限合伙)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products