Unlock instant, AI-driven research and patent intelligence for your innovation.

Account protection method, device, system and storage medium

An account and user technology, applied in the field of communication, can solve the problem that the security of blockchain accounts is not high enough, and achieve the effect of reducing the risk of leakage and strengthening security.

Active Publication Date: 2021-12-03
SHENZHEN THUNDER NETWORK TECH +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the existing blockchain account security is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account protection method, device, system and storage medium
  • Account protection method, device, system and storage medium
  • Account protection method, device, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 As shown, this embodiment provides a blockchain account protection method, which can be executed by the client, including:

[0061] S110. If a predetermined user input signal is detected, send a verification code acquisition request to the authentication server, where the verification code acquisition request includes the identification information of the user.

[0062] As a preferred implementation manner, the predetermined user input signal is an input signal indicating that the user agrees to make transaction payment. Specifically, the user enters an input signal to initiate transaction payment in the wallet APP or web page of the client, and the client detects the aforementioned input signal and sends a verification code acquisition request to the authentication server. Wherein, the verification code acquisition request includes the user's identification information, and the user's identification information includes the user's name, user's address...

Embodiment 2

[0070] Such as figure 2 As shown, this embodiment provides a blockchain account protection method, the method can be executed by a blockchain entry point device, and the method includes:

[0071] S210. Receive a transaction entry request from a user, where the transaction request includes transaction information and a verification code.

[0072] Specifically, the transaction information includes receiving account, payment amount, payment account and other information. The verification code may be a string of numbers (6 digits, 4 digits, etc.), a string of characters (for example, Chinese characters, English characters, or characters in other languages), or a combination of numbers and characters.

[0073] S220. Send an authentication request to an authentication server, where the authentication request includes the identification information of the user and the verification code.

[0074] Specifically, the user's identification information includes the user's name, the user...

Embodiment 3

[0081] Such as image 3 As shown, this embodiment provides a blockchain account protection method, which can be executed by an authentication server, including:

[0082] S310. Receive a verification code acquisition request sent by the client, where the verification code acquisition request includes the identification information of the user.

[0083] Specifically, the user enters an input signal to initiate transaction payment in the wallet APP or web page of the client, and the client detects the aforementioned input signal and sends a verification code acquisition request to the authentication server. Wherein, the verification code acquisition request includes the user's identification information, and the user's identification information includes the user's name, user's address, user's phone number, user's email address, personal identification number (PIN), user's fingerprint or other biometric information and information specific to an account the user has with, for ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an account protection method, device, system, and storage medium, wherein the blockchain account protection method includes: if a predetermined user input signal is detected, a verification code acquisition request is sent to an authentication server, and the verification code acquisition request includes user The identification information; receive the verification code sent by the authentication server; send the transaction entry request to the blockchain entry point device, and the transaction entry request includes transaction information and verification code. The account protection method, device, system and storage medium provided by the present invention perform secondary verification on the account through the verification code on the basis of the block chain, effectively reducing the risk of user account information leakage, which not only conforms to the user's usage habits, but also Enhanced security of user account information.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular to an account protection method, device, system and storage medium. Background technique [0002] Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Its essence is a decentralized database, which is a series of data blocks associated with cryptographic methods. . At present, the blockchain uses a private key as the unique identifier of private data. Once leaked, the control over the account will be lost immediately. Even if the current private key exists in a key file and is encrypted and stored, there is still a risk of being leaked and stolen, and there are many examples of being hacked in reality. Obviously, the security of existing blockchain accounts is not high enough. Contents of the invention [0003] In order to overcome the deficie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q40/04G06Q20/40G06Q20/38G06F21/44
CPCG06F21/44G06F2221/2133G06Q20/3825G06Q20/3829G06Q20/4014G06Q40/04H04L63/0838
Inventor 张慧勇
Owner SHENZHEN THUNDER NETWORK TECH