Block chain-based wallet third-party security authentication algorithm
A security authentication and blockchain technology, applied in the field of third-party security authentication algorithms based on blockchain wallets, can solve problems such as unsatisfactory use needs, user information leakage, and poor encryption effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The present invention will be described in further detail below in conjunction with the accompanying drawings.
[0019] When the present invention is specifically implemented, a third-party security authentication algorithm based on blockchain wallet is characterized in that it comprises the following steps:
[0020] Step 1. Digital wallet users will need to package and verify the transaction block information announced by the entire network according to the calculation rules of this blockchain into a data package to be verified by consensus;
[0021] Step 2. Send a security certification application to the third-party security center, and submit the data package to be verified by consensus formed in step 1;
[0022] Step 3. Start the third-party verification mechanism in the digital wallet APP or computer application;
[0023] Step 4. The third-party security center verifies the verification result of step 3. If the authentication requirements are met, the third-party...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

