CN106911704B - Encryption and decryption method based on block chain - Google Patents
Encryption and decryption method based on block chain Download PDFInfo
- Publication number
- CN106911704B CN106911704B CN201710146631.8A CN201710146631A CN106911704B CN 106911704 B CN106911704 B CN 106911704B CN 201710146631 A CN201710146631 A CN 201710146631A CN 106911704 B CN106911704 B CN 106911704B
- Authority
- CN
- China
- Prior art keywords
- block chain
- information
- module
- sender
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information encryption and decryption method, which comprises the following steps: step 1: the sender designates the recipient; step 2: the sender confirms the sending information; and step 3: time limits for sender acknowledgement messages; and 4, step 4: encrypting the information to obtain an encrypted information string; and 5: and decrypting the encrypted information string. According to the invention, one-to-one or one-to-many transaction information is encrypted, transferred and stored, so that the quick access of common internet application is supported, the threshold of a block chain is reduced, and the user experience is improved.
Description
Technical Field
The invention relates to the field of encryption and decryption, in particular to an encryption and decryption method based on a block chain.
Background
With the rapid development of the internet, people are rapidly coming into the information age. However, due to the high openness of the internet, people face more and more threats such as hacking, information leakage, brute force cracking and the like when carrying out information transmission, and great potential safety hazards are caused to own benefits, business confidentiality and even national safety.
With the advent of block chain technology, there are inherent characteristics: such as transparency, difficult tampering, decentralization and the like, the method can effectively promote the healthy and continuous development of the internet, bring a new mode for guaranteeing the authenticity of the online information, tracing transactions, solving disputes and arbitrating, can promote the public transparency and the credibility of the industry, and reduce the security risk of users when enjoying the convenience of the internet.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an information encryption and decryption method, which comprises the following steps: step 1: the sender designates the recipient; step 2: the sender confirms the sending information; and step 3: time limits for sender acknowledgement messages; and 4, step 4: encrypting the information to obtain an encrypted information string; and 5: and decrypting the encrypted information string.
Wherein, before decrypting the information, the receiver reads the encrypted information string.
Wherein for one-to-one designated sharing, the sender designating a recipient comprises the sender designating a recipient.
Wherein for one-to-many designated sharing, the sender designating the recipient comprises the sender designating a plurality of recipients.
Wherein encrypting the information to obtain an encrypted information string comprises: the sender A sends information to the block chain module through the one-to-one appointed sending module, and the block chain module acquires the sent information; the block chain module encrypts the information by using the public key of the receiver B to obtain an encrypted information string; the block chain module signs the encrypted sending information by using a private key of a sender A to obtain a signed encrypted information string; and the block chain module stores the encrypted information string after signature.
Wherein decrypting the encrypted information string comprises: the receiver B reads the encrypted information string after signature through the one-to-one information receiving module; the block chain module acquires the encrypted information string after signature; the block chain module carries out time check; the block chain module acquires a public key of the sender A to check the signature; if the signature verification is successful, obtaining an encrypted information string; the block chain module acquires a private key of a receiver B to decrypt the encrypted information string; and the block chain module acquires the decrypted information.
Wherein encrypting the information to obtain an encrypted information string comprises: the sender A sends the sending information to an encryption service background module through a one-to-many sending module, and the encryption service background module encrypts the sending information; the block chain module acquires block chain addresses of the plurality of receivers; the block chain module stores the mapping relation between the encrypted information and the plurality of receivers; the blockchain module obtains an encrypted information string.
Wherein decrypting the encrypted information string comprises: the plurality of recipients requesting to read the encrypted information string; the encryption service background module verifies the identity of the requester; the blockchain module obtains a plurality of receiver blockchain addresses; the block chain module obtains an encrypted information string; the block chain module carries out time check; the block chain module verifies the mapping relation between the address and the encrypted information string; the block chain module returns an encrypted information string to the encrypted service background module, and the encrypted service background module decrypts the encrypted information string; and returning the decrypted information to a plurality of receivers through the one-to-many information receiving module.
Wherein the method further comprises cancelling the sharing: the sender A specifies the information to be shared; the encryption service background module verifies the identity of the requester; the block chain module acquires an encrypted information address; the block chain module judges whether the encrypted information address is successfully acquired, and if the encrypted information address is successfully acquired, the block chain module cancels the sharing of the encrypted information; the block chain module records the sharing canceling flow.
Wherein, the time limit refers to that the sender specifies the time within a time period that the receiver can view the encrypted information for the security of the system.
By the method, one-to-one or one-to-many transaction information is encrypted, transferred and stored based on the block chain, so that the quick access of common internet application is supported, the threshold of the block chain is reduced, and the user experience is improved.
Drawings
FIG. 1 is a block chain-based encryption system according to the present invention;
FIG. 2 is a flow chart of a method of encryption and decryption in accordance with the present invention;
FIG. 3 is a flow of information encryption sharing (one-to-one designated sharing) according to the present invention;
FIG. 4 is a flow of information encryption sharing (one-to-many designated sharing) according to the present invention;
fig. 5 shows an information encryption sharing process (cancellation of sharing) according to the present invention.
Detailed Description
The present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1, fig. 1 is a schematic structural diagram of an encryption system based on a blockchain according to the present invention, where the encryption system includes: the system comprises a one-to-one appointed sending module, a one-to-one appointed receiving module, a one-to-many appointed sending module, a one-to-many appointed receiving module, a sharing canceling module, an encryption service background module and a block chain module. The one-to-one appointed sending module, the one-to-one appointed receiving module, the one-to-many appointed sending module, the one-to-many appointed receiving module and the sharing canceling module are respectively connected to the encryption service background module, and the encryption service background module is connected to the block chain module. The encryption service background module provides an interface for the block chain module and is used for accessing modules such as an ether house in the block chain module.
The one-to-one appointed sending module is used for encrypted transmission of information between two users, namely, a is transmitted to b, and other users cannot see the information. Such as: a sends a mail to b, a gift and the like, and the one-to-one appointed receiving module is used for corresponding to the one-to-one appointed sending module and receiving and decrypting the received information. Such as: b, after receiving the information sent by a, the user uses the own key to decrypt the information, and b can also verify whether the source of the information is a.
The one-to-many appointed sending module is used for sending information to a plurality of receivers. For example, a is the holder of the message m, who wants to share the message to b, c, d simultaneously, such as: a sends a mail with the addressees b, c and d.
The one-to-many designated receiving module corresponds to the one-to-many designated transmitting module for receiving the information, but only the designated information receiver can decrypt the information and verify whether the source of the information is a or not.
The sharing canceling module is used for canceling sharing after information is shared. For example, after sharing the information m, a wants to cancel the sharing for various reasons.
The encryption service background is based on the block chain module and is used for completing interface packaging on upper-layer services, realizing automatic butt joint on a bottom-layer block chain and being compatible with a plurality of block chain products.
And the block chain module is used for sending the encryption service to different block chain products through the encryption service background.
Fig. 2 is a flowchart of an encryption and decryption method according to the present invention, which includes:
step 1: the sender designates the recipient;
for one-to-one designated sharing, sender designating recipient includes sender designating a recipient;
for one-to-many designated sharing, a sender designating a recipient includes a sender designating a plurality of recipients.
Step 2: the sender confirms the sending information;
and step 3: time limits for sender acknowledgement messages;
and 4, step 4: encrypting the information to obtain an encrypted information string;
and 5: and decrypting the encrypted information string.
Before decrypting the information, the method further comprises the step that the receiver reads the encrypted information string.
Fig. 3 is a schematic diagram illustrating a block chain-based one-to-one information encryption and decryption process according to the present invention.
As shown in the figure, the encryption process of the background module of the encryption service is as follows:
step 3101: sender a designates recipient B;
step 3102: the sender A confirms the sending information;
step 3103: sender a confirms the time limit of the message;
the time limit refers to the time that the sender specifies that the recipient can view the encrypted information within a time period for security purposes of the system. The time limit may be defined by the sender himself. For example, the examination is effective within 24 hours, and the examination cannot be performed in more than 24 hours.
Step 3104: the sender A sends information to the block chain module through the one-to-one appointed sending module, and the block chain module acquires the sent information;
it should be noted that, the one-to-one designated sending module sends the information to the encryption service background module, and the information passes through the encryption service background module and then reaches the block chain module, but the encryption service background module does not perform any processing on the information here, which is equivalent to transparent transmission.
Step 3105: the block chain module encrypts the information by using the public key of the receiver B to obtain an encrypted information string;
step 3106: the block chain module signs the encrypted sending information by using a private key of a sender A to obtain a signed encrypted information string;
step 3107: the block chain module stores the encrypted information string after signature;
step 3108: and (6) ending.
Correspondingly, the decryption process is as follows:
step 3201: the receiver B reads the encrypted information string after signature through the one-to-one information receiving module;
step 3202: the block chain module acquires the encrypted information string after signature;
step 3203: the block chain module carries out time check; if yes, go to step 3204, if not, go to step 3209;
step 3204: the block chain module acquires a public key of the sender A to check the signature;
the signature verification means verifying a signature of the sender a, and judging whether the message is a message sent by the receiver a, and belongs to a security check.
Step 3205: if the signature verification is successful and the encrypted information string is obtained, executing step 3206; if the signature verification is not successful, go to step 3209;
step 3206: the block chain module acquires a private key of a receiver B to decrypt the encrypted information string;
step 3207: if the decryption is successful, go to step 3208; if the decryption is not successful, go to step 3209;
step 3208: the block chain module acquires the decrypted information;
step 3209: and (6) ending.
Fig. 4 is a schematic diagram illustrating a block chain-based one-to-many information encryption and decryption process according to the present invention.
As shown, the encryption process is as follows:
step 4101: sender a specifies a plurality of recipients;
step 4102: the sender A confirms the sending information;
step 4103: sender a confirms the time limit of the message;
the time limit refers to the time that the sender specifies that the recipient can view the encrypted information within a time period for security purposes of the system. The time limit may be defined by the sender himself. For example, the examination is effective within 24 hours, and the examination cannot be performed in more than 24 hours.
Step 4104: the sender A sends the sending information to an encryption service background module through a one-to-many sending module, and the encryption service background module encrypts the sending information; in one embodiment of the invention, the encryption service background module encrypts the transmission information through a 3DES (triple data encryption algorithm);
step 4105: the block chain module acquires block chain addresses of the plurality of receivers;
step 4106: the block chain module stores the mapping relation between the encrypted information and the plurality of receivers;
step 4107: the block chain module obtains an encrypted information string;
step 4108: and (6) ending.
Correspondingly, the decryption process is as follows:
step 4201: the plurality of recipients requesting to read the encrypted information string;
step 4202: the encryption service background module verifies the identity of the requester; if so, step 4203 is executed, and if not, step 4209 is executed:
step 4203: the blockchain module obtains a plurality of receiver blockchain addresses;
step 4204: the block chain module obtains an encrypted information string;
step 4205: the block chain module carries out time check; if so, go to step 4206, if not, go to 4209;
step 4206: the block chain module verifies the mapping relation between the address and the encrypted information; if so, go to step 4207, if not, go to step 4209;
step 4207: the block chain module returns an encrypted information string to the encrypted service background module, and the encrypted service background module decrypts the encrypted information string through the 3 DES;
step 4208: returning the decrypted information to a plurality of receivers through the one-to-many information receiving module;
step 4209: and (6) ending.
Fig. 5 is a schematic flow chart of the sharing cancellation based on the blockchain according to the present invention. As shown, cancelling the sharing includes:
step 501: the sender A specifies the information to be shared;
step 502: the encryption service background module verifies the identity of the requester; if yes, executing step 503, if not, executing step 507;
step 503: the block chain module acquires an encrypted information address;
step 504: the block chain module judges whether the encrypted information address is successfully acquired, if so, the step 505 is executed, and if not, the step 507 is executed;
step 505: the block chain module cancels the sharing of the encrypted information;
step 506: the blockchain module records the process of canceling the sharing at this time, wherein the process of canceling the sharing at this time is taken as the transaction and is recorded to the blockchain;
step 507: and (6) ending.
By combining information encryption with a block chain technology, the information is guaranteed not to be stolen in transmission; the storage cannot be tampered; and the information can not be decrypted after being illegally read, and meanwhile, the common Internet application can be quickly accessed, so that the method has a positive effect on improving the information safety of industries such as Internet finance and E-commerce platforms.
1. One-to-one designation information encryption: through the data encryption characteristic of the block chain, each transaction is subject to the processes of receiver public key encryption, sender private key signature, sender public key signature verification and receiver private key decryption, so that the transaction information can only be visible between two transaction parties, and the transaction is safer.
2. One-to-many specific information encryption: the transaction information can be only visible within a designated range (one sender, a plurality of designated receivers), and the service scenes covered by the system are greatly enriched while the information security is ensured.
3. The information is not falsifiable: all encrypted data are stored on the block chain, so that the encrypted data can be guaranteed to be not falsified, information and products are more credible and safer, and the trust cost of distinguishing or selecting by a user is reduced.
4. The access is convenient and fast: the service provides a plurality of service interfaces externally, the common internet application only needs to slightly change in the original system and increase the interface calling, the butt joint with the system can be realized, and the change cost is reduced to the lowest
Although the present invention has been described by way of examples, those of ordinary skill in the art will appreciate that there are numerous variations and permutations of the present invention without departing from the spirit of the invention, and it is intended that the appended claims encompass such variations and modifications without departing from the spirit of the invention.
Claims (3)
1. An information encryption and decryption method, the method comprising:
step 1: the sender designates a recipient, wherein for one-to-one designated sharing, the sender designating the recipient comprises: the sender designates a recipient; for one-to-many designated sharing, a sender designating a recipient includes: the sender designates a plurality of recipients;
step 2: the sender confirms the sending information;
and step 3: time limits for sender acknowledgement messages;
and 4, step 4: the information is encrypted to obtain an encrypted information string, all encrypted data are stored on a block chain through a block chain module, and by combining information encryption and a block chain technology, the information is guaranteed not to be stolen in transmission, cannot be tampered in storage, cannot be cracked after being illegally read, and meanwhile, common internet application can also be quickly accessed; wherein,
1) for one-to-one:
the sender A sends information to the block chain module through a one-to-one appointed sending module, and the block chain module acquires the sent information;
the block chain module encrypts the information by using the public key of the receiver B to obtain encrypted sending information;
the block chain module signs the encrypted sending information by using a private key of a sender A to obtain a signed encrypted information string;
the block chain module stores the encrypted information string after signature;
2) for one-to-many:
the sender A sends the sending information to an encryption service background module through a one-to-many sending module, and the encryption service background module encrypts the sending information to obtain encrypted information;
the block chain module acquires block chain addresses of the plurality of receivers;
the block chain module stores the mapping relation between the encrypted information and the plurality of receivers;
the block chain module obtains an encrypted information string;
and 5: decrypting the encrypted information string, wherein:
1) for one-to-one, decrypting the encrypted information string comprises:
the receiver B initiates a request for reading the encrypted information string;
according to the request, the block chain module acquires the signed encrypted information string;
the block chain module carries out time check;
if the time passes the verification, the block chain module acquires the public key of the sender A to check the signature; if not, ending;
if the signature verification is successful, obtaining an encrypted information string; if the result is unsuccessful, ending;
the block chain module acquires a private key of a receiver B to decrypt the encrypted information string;
the block chain module acquires the decrypted information and sends the decrypted information to a receiver B; if the result is unsuccessful, ending;
2) for one-to-many, decrypting the encrypted information string comprises:
the plurality of recipients initiating a request to read an encrypted information string;
according to the request, the encryption service background module verifies the identity of the requester;
if the identity check is passed, the block chain module acquires a plurality of receiver block chain addresses; if not, ending;
the block chain module obtains an encrypted information string;
the block chain module carries out time check;
if the time check is passed, the block chain module verifies the mapping relation between the address and the encrypted information string; if not, ending;
if the mapping relation between the verification address and the encrypted information string passes, the block chain module returns the encrypted information string to the encrypted service background module;
and the encryption service background module decrypts the encrypted information string and returns the decrypted information to a plurality of receivers.
2. The method of claim 1, wherein the method further comprises cancelling sharing:
the sender A designates information to be shared, wherein the sender A is used as a requester for requesting to cancel the sharing of the encrypted information;
the encryption service background module verifies the identity of the requester;
if the verification is passed, the block chain module acquires an encryption information address through a contract interface; if not, ending;
the block chain module judges whether the encrypted information address is successfully acquired, and if the encrypted information address is successfully acquired, the block chain module cancels the sharing of the encrypted information; if the result is unsuccessful, ending;
the blockchain module records the sharing canceling process, wherein the sharing canceling process is recorded to the blockchain as the transaction.
3. The method of claim 1, wherein the time limit is that the system provides for security, the sender specifies a time within a time period that the recipient can view the encrypted information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710146631.8A CN106911704B (en) | 2017-03-13 | 2017-03-13 | Encryption and decryption method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710146631.8A CN106911704B (en) | 2017-03-13 | 2017-03-13 | Encryption and decryption method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106911704A CN106911704A (en) | 2017-06-30 |
CN106911704B true CN106911704B (en) | 2020-10-09 |
Family
ID=59186621
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710146631.8A Active CN106911704B (en) | 2017-03-13 | 2017-03-13 | Encryption and decryption method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106911704B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107579952A (en) * | 2017-07-17 | 2018-01-12 | 招商银行股份有限公司 | File transmitting method, message processing method and system and storage medium |
CN107332658A (en) * | 2017-08-11 | 2017-11-07 | 浙江赛佳控股有限公司 | Interface realizing method and device based on chain type block chain technology |
CN107517206A (en) * | 2017-08-18 | 2017-12-26 | 北京北信源软件股份有限公司 | A kind of method, apparatus of secure communication, computer-readable recording medium and storage control |
CN109462472A (en) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | The methods, devices and systems of data encryption and decryption |
CN109995715A (en) * | 2017-12-29 | 2019-07-09 | 百度在线网络技术(北京)有限公司 | Private data encipher-decipher method, device, equipment and the storage medium of block chain |
CN110113244A (en) * | 2018-02-09 | 2019-08-09 | 中企云链(北京)金融信息服务有限公司 | A kind of instant communicating system and method based on block chain technology |
CN109245993A (en) * | 2018-09-07 | 2019-01-18 | 中链科技有限公司 | Instant communication method and device based on block chain |
CN109218319A (en) * | 2018-09-21 | 2019-01-15 | 四川长虹电器股份有限公司 | A kind of identity authorization system and authentication method based on block chain |
CN110166237A (en) * | 2019-05-31 | 2019-08-23 | 杭州时戳信息科技有限公司 | A kind of cryptographic key distribution method and system based on block chain |
CN111464499A (en) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | Electronic warehouse receipt tracing method and device, computer equipment and storage medium |
CN112418853A (en) * | 2020-09-22 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Transaction data encryption method and device based on block chain |
CN113344705B (en) * | 2021-06-21 | 2023-03-17 | 上海计算机软件技术开发中心 | Data sharing method and system based on block chain |
CN113642018A (en) * | 2021-08-11 | 2021-11-12 | 永旗(北京)科技有限公司 | A method for key management based on blockchain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102006303A (en) * | 2010-12-06 | 2011-04-06 | 河海大学 | Method and terminal for increasing data transmission safety by using multi-encryption method |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN106385315A (en) * | 2016-08-30 | 2017-02-08 | 北京三未信安科技发展有限公司 | Digital certificate management method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
CN202067336U (en) * | 2011-06-01 | 2011-12-07 | 中国工商银行股份有限公司 | Payment device and system for realizing network security certification |
CN105207774B (en) * | 2014-05-30 | 2019-03-01 | 北京奇虎科技有限公司 | The cryptographic key negotiation method and device of verification information |
CN106027473B (en) * | 2016-01-21 | 2019-05-21 | 李明 | Identity card card-reading terminal and cloud authentication platform data transmission method and system |
CN106228344A (en) * | 2016-07-28 | 2016-12-14 | 杭州云象网络技术有限公司 | A kind of electronic government affairs system building method based on block chain technology |
-
2017
- 2017-03-13 CN CN201710146631.8A patent/CN106911704B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102006303A (en) * | 2010-12-06 | 2011-04-06 | 河海大学 | Method and terminal for increasing data transmission safety by using multi-encryption method |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN106385315A (en) * | 2016-08-30 | 2017-02-08 | 北京三未信安科技发展有限公司 | Digital certificate management method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106911704A (en) | 2017-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106911704B (en) | Encryption and decryption method based on block chain | |
US11799668B2 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
US12093419B2 (en) | Methods and devices for managing user identity authentication data | |
CN109150548B (en) | Digital certificate signing and signature checking method and system and digital certificate system | |
JP6012125B2 (en) | Enhanced 2CHK authentication security through inquiry-type transactions | |
AU2014216607B2 (en) | Data security service | |
JP2023502346A (en) | Quantum secure networking | |
CA2899027C (en) | Data security service | |
CN111179067A (en) | Block chain-based customer information exchange system between banks | |
WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
CN112632593B (en) | Data storage method, data processing method, device and storage medium | |
US20220005039A1 (en) | Delegation method and delegation request managing method | |
CN104735065A (en) | Data processing method, electronic device and server | |
US20180262471A1 (en) | Identity verification and authentication method and system | |
GB2582113A (en) | Secure electronic payment | |
CN101924635A (en) | Method and device for user identity authentication | |
KR102211033B1 (en) | Agency service system for accredited certification procedures | |
CN105471657A (en) | Method, device and system for managing inter-domain communication log of virtual machine | |
CN113328860A (en) | Block chain-based user privacy data security providing method | |
WO2025020651A1 (en) | Data generation method, data processing method, data sending method, communication system, electronic terminal and storage medium | |
CA2898587C (en) | Digitised handwritten signature authentication | |
CN103514540A (en) | USBKEY business realization method and system | |
CN114826616B (en) | Data processing method, device, electronic equipment and medium | |
CN107707510B (en) | An information push method, device and system | |
USRE49968E1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |