The method and the system used for network transaction security authentication in a block chain

A security authentication, network transaction technology, applied in the field of blockchain computer applications, can solve problems such as information leakage

Active Publication Date: 2019-04-30
链博(成都)科技有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Due to the rapid development of blockchain technology in today's society, many industries have already cited this technology for data sharing and post-data processing. Due to the remarkable characteristics of blockchain technology: decentralization (DApp), information cannot be tampered with, and smart contracts Technology ensures the security of transaction data, but information needs to be shared during the transaction process of all parties involved in the transaction, which brings the risk of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The method and the system used for network transaction security authentication in a block chain
  • The method and the system used for network transaction security authentication in a block chain
  • The method and the system used for network transaction security authentication in a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0049] Such as figure 1 As shown, the present invention provides a method for security authentication of network transactions in blockchain, comprising the following steps:

[0050] S1, perform smart contract matching for the authenticated transaction subject in the blockchain node, obtain the transaction request node of the authenticated transaction subject, and generate an encrypted feature storage unit for the transaction request node;

[0051] S2, the transaction request node collected by the encrypted feature storage unit sends the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network transaction security authentication method and system for a block chain, and the method comprises the following steps: S1, carrying out the intelligent contract matching of an authentication transaction main body in a block chain node, obtaining a transaction request node of the authentication transaction main body, and generating an encryption feature storage unitfor the transaction request node; S2, sending the transaction request node collected by the encryption feature storage unit to an authentication code needing authentication transaction to form a defense instruction; and S3, obtaining the defense instruction from the block chain node needing terminal transaction, and carrying out instruction authentication on the block chain node needing terminaltransaction.

Description

technical field [0001] The invention relates to the application field of block chain computers, in particular to a method and system for network transaction security authentication in block chains. Background technique [0002] Due to the rapid development of blockchain technology in today's society, many industries have already cited this technology for data sharing and post-data processing. Due to the remarkable characteristics of blockchain technology: decentralization (DApp), information cannot be tampered with, and smart contracts Technology ensures the security of transaction data, but information needs to be shared during the transaction process between parties to the transaction, which brings the risk of information leakage. Although the main body using the blockchain has adopted the data encryption method, how to ensure the security of transaction information and the high efficiency of transaction processing, this urgently requires those skilled in the art to solve ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q40/04H04L29/08
CPCG06Q20/3829G06Q40/04H04L67/1097
Inventor 幸赞鳌
Owner 链博(成都)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products