Data processing method and device

A data processing and data input technology, applied in the Internet field, can solve problems such as insecure use of private keys

Inactive Publication Date: 2019-06-11
JUZIX TECH SHENZHEN CO LTD
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a data processing method and device to solve the technical problem that the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device
  • Data processing method and device
  • Data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0117] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0118] Considering the existing transaction data processing methods, when performing specific data processing and generating corresponding transaction signatures, a complete key, such as a complete transaction private key, will often appear and be used, which will give users the security of transaction data processing Sex poses a greater ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data processing method and device, a client stores a first private key component, a server stores a second private key component, and the method comprises the following steps: responding to a transaction data processing request, initiating an identity verification request, and carrying out bidirectional identity verification with the server; and after theverification is passed, calling a first MPC node preset at the client side to take the first private key component as input, and a second MPC node preset at the server to take the second private keycomponent as input, carrying out preset function operation according to a preset rule to obtain a transaction signature, and carrying out transaction data processing. According to the scheme, the transaction private key is firstly split, and then the first private key component and the second private key component which are split are separately stored; in the use process, MPC nodes on the two sides are called to jointly participate in operation through the private key components to generate a transaction signature, and therefore the technical problem that the secret key is not safe to use is solved, and the control power of a user on the complete transaction private key is met.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a data processing method and device. Background technique [0002] When processing transaction data, it is often necessary to generate a corresponding transaction signature as a transaction certificate, and then complete the corresponding transaction data processing according to the transaction signature. For example, according to the user's transaction signature, call the fund data corresponding to the user's account to pay for the transaction order, etc. [0003] At present, most of the existing transaction data processing methods require the user to save and manage a complete key (such as a transaction private key) through the client used; when processing transaction data, the complete key is obtained and used. key to generate a transaction signature to complete the processing of the corresponding transaction data. [0004] When the above method is impleme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38H04L29/06
Inventor 安瑞谢翔傅志敬孙立林谢红军
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products