Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain-based wallet third-party security authentication algorithm

A security authentication and blockchain technology, applied in the field of third-party security authentication algorithms based on blockchain wallets, can solve problems such as unsatisfactory use needs, user information leakage, and poor encryption effects

Inactive Publication Date: 2021-09-10
李帆 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is that the related system of the existing block chain technology in the aspect of authentication algorithm is insufficient in design, resulting in poor actual encryption effect, easy to cause user information leakage, and does not meet the needs of use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based wallet third-party security authentication algorithm
  • Block chain-based wallet third-party security authentication algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0019] When the present invention is specifically implemented, a third-party security authentication algorithm based on blockchain wallet is characterized in that it comprises the following steps:

[0020] Step 1. Digital wallet users will need to package and verify the transaction block information announced by the entire network according to the calculation rules of this blockchain into a data package to be verified by consensus;

[0021] Step 2. Send a security certification application to the third-party security center, and submit the data package to be verified by consensus formed in step 1;

[0022] Step 3. Start the third-party verification mechanism in the digital wallet APP or computer application;

[0023] Step 4. The third-party security center verifies the verification result of step 3. If the authentication requirements are met, the third-party...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Block chain-based wallet third-party security authentication algorithm. Compared with the prior art, the invention has the advantages that the algorithm process is reasonable and clear, and the third-party identity authentication of a block chain digital wallet owner can be effectively solved; and through higher-level third-party security identity authentication including but not limited to human face identity recognition, a bank USB key, a mobile phone verification code and other means, the operation of the owner is confirmed when the digital wallet initiates the transaction, so that the digital assets are prevented from being stolen and lost due to hacker invasion, private key theft and the like.

Description

technical field [0001] The technical field of Internet block chain of the present invention specifically refers to a third-party security authentication algorithm based on block chain wallet. Background technique [0002] The invention solves the problem of identity security authentication of the owner of the block chain digital wallet (digital asset account). The traditional blockchain wallet security mechanism is completely based on the authentication of the wallet private key. In practical applications, when the private key is stolen or leaked, the safe use of the wallet cannot be guaranteed. This algorithm introduces a third-party security authentication mechanism, including but not limited to authentication mechanisms based on face ID card recognition, bank U-shield, user-set up password, mobile phone verification code, etc. Through this algorithm, the specific scenario of using the wallet (digital asset transfer) ) must be certified by the third-party security center,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06Q20/02G06Q20/38G06Q20/10
CPCG06Q20/4014G06Q20/40145G06Q20/02G06Q20/3829G06Q20/105
Inventor 李帆黎兵
Owner 李帆