Key chain generation and verification method and device thereof

A key chain and key technology, applied in the field of data authentication, can solve the problems of hidden key security, easy forgetting of keys, and high cost, and achieve the effect of improving security and convenience.

Inactive Publication Date: 2018-12-07
UNION MOBILE PAY
View PDF5 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In modern life, there are many application systems accessed by keys. Users often need to save keys of various types and addresses. Keys are easy t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key chain generation and verification method and device thereof
  • Key chain generation and verification method and device thereof
  • Key chain generation and verification method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] An embodiment of the present invention provides a blockchain system, including M nodes, where M is greater than or equal to three. Among them, M nodes form a "decentralized" system through dynamic networking through a peer-to-peer network (Peer to Peer, P2P). figure 1 A schematic diagram of a feasible block chain system architecture provided for the embodiment of the present invention, such as figure 1 As shown, the blockchain syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key chain generation and verification method and a device thereof. The key chain generation comprises the following steps: a node server obtains a key storage request of a user, wherein the key storage request comprises user identity information, key information, application system address information and biological verification information, the key information is used for the user to log in the application system corresponding to the address information of the application system; the node server adds the biometric authentication information into the noise to obtain the biometric encrypted information; wherein the biometric encryption information is used for verifying the biometric authentication information input by the user before acquiring the key information;the node server constructs the key information and the bio-encryption information into a new block in a key chain according to a consensus algorithm, and records the address of the new block, and theaddress mapping relationship between the user identity information and the application system address information, wherein the key chain is used for storing key information of a user.

Description

technical field [0001] The invention relates to the technical field of data authentication, in particular to a method for generating and verifying a key chain and a device thereof. Background technique [0002] In modern life, there are many application systems accessed by keys. Users often need to save keys of various types and addresses. Keys are easy to forget. If the user's mobile device is lost, the key stored on the mobile device has a great security risk and the user experience is poor. [0003] Therefore, in order to solve the above-mentioned various problems of key storage, under the premise of ensuring the security of the user's key, a key storage method is urgently needed at present, so as to improve the convenience and security of the user's key storage. Contents of the invention [0004] The invention provides a key chain generation method, an application system verification method and a device, which are used to improve the efficiency of key storage and key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/46G06F21/32
CPCG06F21/32G06F21/46
Inventor 方亚南高睿泽
Owner UNION MOBILE PAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products