Block chain token login method

A login method and blockchain technology, applied in the field of blockchain token login, can solve difficult hijacking problems, token crack login, unsatisfactory problems, etc., to eliminate network virus or illegal software hijacking, eliminate possibility, The effect of improving safety

Inactive Publication Date: 2021-05-04
中证瑞通(上海)科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 2. If you cannot log out on the server side, it is difficult to solve the hijacking problem. If the token is illegally hijacked by a virus or an external algorithm, it will be easily cracked and logged in
[0009] 3. Performance issues
For web applications with strict performance requirements, this is not ideal, especially for single-threaded environments
At present, there is no instance of using blockchain features to control login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The present invention provides a blockchain token login method, comprising the following steps:

[0026] S1, first make and upload the public key to the blockchain;

[0027] S2. Calculate the private key through the RSA algorithm. One of the main characteristics of the blockchain is that the information cannot be tampered with. Saving the public key to the blockchain can ensure that the public key will not be destroyed. If it needs to be changed, just make changes in the algorithm. it is good;

[0028] S3. Use the RSA algorithm to generate different private keys through the public key; distribute and store the private keys in different hardware devices (such as smart id cards);

[0029] S4. If you want to log in to the bank reconciliation system, you must pass the hardware verification, the face recognition system verification, and double verification;

[0030] S5. At the same time, since the data of the entire banking system is basically stored in the blockchain, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain token login method. The method comprises the following steps: S1, firstly, making and uploading a public key to a block chain; s2, calculating a private key through an RSA algorithm; s3, generating different private keys through the public key by using an RSA algorithm; distributing and storing the private key into different hardware devices (such as an intelligent id card); and S4, if a user wants to log in the bank account checking system, only when the hardware verification is passed and the face system verification is passed, the user can log in the bank account checking system after double verification. The method has the following advantages: 1, for the security problem, external hardware and face recognition are combined for permission login, so that the security is greatly improved, and the possibility of network virus or illegal software hijacking is eliminated; 2, since external software performs matching key login according to an algorithm, waste bandwidth and CPU performance do not need to be considered at all; and 3, if attacked, the public key cannot be destroyed or changed.

Description

technical field [0001] The invention relates to the field of blockchain token login, in particular to a blockchain token login method. Background technique [0002] The existing technology is: encrypted token Token login [0003] The main principles are as follows: [0004] The client uses the user name and password to request to log in to the server. After receiving the request to verify the user name and password, the server will issue a Token, and then send the Token to the client. After receiving the Token, the client can store it For example, each time the client requests resources from the server in localStorage, the client needs to bring the Token issued by the server to receive the request, and then verify the Token carried in the client request. If the verification is successful, it will be released. . (In short, it is the key (token) to pass through the server with the username and password, as long as you have the key, you can log in). [0005] shortcoming: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/32G06F21/64
CPCG06F21/32G06F21/33G06F21/64G06F2221/2141
Inventor 仇金申孔祥明杨伟
Owner 中证瑞通(上海)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products