Supercharge Your Innovation With Domain-Expert AI Agents!

Block chain address transformation and identity authentication method and device and storage medium

A technology of identity authentication and blockchain, applied in the direction of instruments, payment systems, payment architecture, etc., can solve problems such as parallel acceleration

Pending Publication Date: 2022-01-04
HANGZHOU FUZAMEI TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, it is impossible to simply perform parallel acceleration. The most common type of VDF is to perform N hash operations on a string, because the next operation must wait for the end of the previous operation, and the current computing power of a single CPU core is mainly related to The main frequency is related. As for the main frequency parameters of the CPU, the performance difference between the worst CPU and the best CPU is no more than 5 times, and the main frequency of the general household CPU is 2G hz. The fastest CPU can probably be about 3 times faster

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain address transformation and identity authentication method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment provides a method for modifying a blockchain address, which is applicable to a blockchain system client, and the method includes:

[0028] S1. Obtain the address information of the address to be transformed in the blockchain system;

[0029] S2. Generate an identity hash locally, and register the identity hash in the corresponding address to be transformed according to the address information;

[0030] Wherein, the identity hash is obtained by performing N hash operations on the first random character string, identity information and private information, and the number of operations N is set by the user, and the first random character string is obtained from the server end of the blockchain system Obtain and store correspondingly with the address information in the block chain system, the identity information includes one or more of ID number and mobile phone number.

[0031] In the above scheme, firstly, the address of the blockchain system is transfor...

Embodiment 2

[0043] A computer device comprising: one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the The one or more processors execute the method as described in Embodiment 1.

[0044] A storage medium storing a computer program, when the program is executed by a processor, implements the method described in Embodiment 1 above.

[0045] figure 1 A schematic structural diagram of a device provided in this embodiment.

[0046] like figure 1 As shown, as another aspect, the present application also provides a computer device 500, including one or more central processing units (CPU) 501, which can be The program loaded into the random access memory (RAM) 503 by the part 508 executes various appropriate actions and processes. In the RAM 503, various programs and data necessary for the operation of the device 500 are also stored. The CPU 501 , ROM 502 , and RAM 503 are connected to each other via a bus 504 . An inp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computers, particularly relates to a block chain address transformation and identity authentication method and device and a storage medium, and has the advantages that it is guaranteed that information of a user cannot be revealed when the user registers an address, identity card information is provided only when identity verification is needed (such as asset retrieval). On the other hand, the identity hash first random character string, the identity information and the private information are obtained through N times of hash operation instead of performing hash operation by directly adopting an identity card number conventionally, so that the privacy security of the user is ensured; the situation that a hacker uses an identity card coding rule or collects a large amount of identity card information to carry out brute force cracking and corresponds to an account address to obtain user identity information is avoided, the cost of address information cracking is increased by adopting hashN operation, a certain cracking duration is increased, the duration of obtaining identity hash is set by setting N. Hackers cannot try various components for many times in a short time to form brute force cracking.

Description

technical field [0001] The invention belongs to the field of computer technology, and in particular relates to a block chain address modification and identity authentication method, device and storage medium. Background technique [0002] Blockchain wallet retrieval technology or social wallet technology is generally based on two private keys, one private key can transfer money instantly, while the other private key can realize delayed transfer, through the different permissions of the two private keys, the wallet Assets within are recovered. Under normal circumstances, the private key for delayed transfer, that is, the retrieved private key, will be stored in a third-party organization, and then verified through methods such as real-name verification. If the verification is passed, the asset will be retrieved. Among many verification schemes, the identity It is one of the most mainstream and reliable methods to confirm name registration and then verify face authentication....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/38215G06Q20/3829G06Q20/40145G06Q20/4015
Inventor 王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More