Blockchain-implemented systems and methods for secure access control
An implementation method, blockchain technology, applied in the field of blockchain implementation systems and methods for security access control, can solve problems such as damage, protocol is vulnerable to inquiries, and destroys the expected security of blockchain, so as to overcome security Vulnerabilities, security-enhancing effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] For example, you can use figure 1 The process 10 is shown to describe the present invention. The process 10 receives input from the first party and the second party "Bob" or "B" nominally "Alice" or "A". The mechanism provides output to Alice and / or Bob. The mechanism 10 can broadcast and / or retrieve information from the blockchain 12 on the blockchain network 12, such as figure 1 As shown by the double-headed arrow in, it can represent a broadcast to the blockchain network 12 or the blockchain 12.
[0055] Process 10 represents one or more of the processes or mechanisms described below or in the claimed method. One or more of the mechanisms described herein can be considered a transaction or a collection of transactions. figure 1 Process 10 in represents a logic gate with input and output, where the output is conditioned on the input and operation of the blockchain by Alice (Alice) and Bob (Bob).
[0056] Alice (Alice) and Bob (Bob) create a multi-signature key to ensur...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


