CN110070363A - Account management method and verification method in block chain network and terminal equipment - Google Patents
Account management method and verification method in block chain network and terminal equipment Download PDFInfo
- Publication number
- CN110070363A CN110070363A CN201910191172.4A CN201910191172A CN110070363A CN 110070363 A CN110070363 A CN 110070363A CN 201910191172 A CN201910191172 A CN 201910191172A CN 110070363 A CN110070363 A CN 110070363A
- Authority
- CN
- China
- Prior art keywords
- transaction
- account
- information
- verification
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
本发明实施例涉及通讯技术领域,公开了一种区块链网络中的账户管理方法、验证方法及终端设备。区块链网络中的账户管理方法,包括:通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语;在第一账户的秘钥丢失后,通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易,验证交易中包括历史交易信息和暗语口令,供交易接收方根据暗语口令和历史交易信息中的加密暗语,对第二账户执行验证操作;在验证通过后,第二账户获取第一账户的控制权;本发明实施例还提供了区块链网络中的验证方法及终端设备;可在用户的账户私钥丢失后,找回丢失的账户中的账户相关信息,避免用户因账户私钥丢失而导致的资产损失。
Embodiments of the present invention relate to the field of communication technologies, and disclose an account management method, a verification method and a terminal device in a blockchain network. An account management method in a blockchain network includes: when initiating a transaction to a transaction recipient through a first account, carrying an encrypted code generated based on a code password in the transaction information; The account initiates a verification transaction to the transaction receiver for verifying the second account. The verification transaction includes historical transaction information and a coded password for the transaction receiver to execute on the second account according to the coded password and the encrypted password in the historical transaction information. Verification operation; after the verification is passed, the second account obtains the control right of the first account; the embodiment of the present invention also provides a verification method and a terminal device in a blockchain network; after the user's account private key is lost, it can be retrieved The account-related information in the lost account can avoid the user's asset loss caused by the loss of the account's private key.
Description
技术领域technical field
本发明实施例涉及通讯技术领域,特别涉及一种区块链网络中的账户管理方法、验证方法及终端设备。The embodiments of the present invention relate to the field of communication technologies, and in particular, to an account management method, a verification method and a terminal device in a blockchain network.
背景技术Background technique
区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。它的本质是一个去中心化的数据库,同时作为数字货币的底层技术,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次数字货币网络交易的信息,用于验证其信息的有效性并生成下一个区块。Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Its essence is a decentralized database. At the same time, as the underlying technology of digital currency, it is a series of data blocks associated with cryptographic methods. Each data block contains a batch of digital currency network transaction information. Used to verify the validity of its information and generate the next block.
目前,基于区块链的交易一般都是基于钱包进行的,每个钱包具有一个唯一的地址,用户之间通过这个唯一的地址来进行交易。随着区块链技术的高速发展,区块链相关的应用越来越广泛,各企业、个人之间通过区块链进行相互之间的业务往来日益增多,交易转账也会越来越频繁,区块链钱包作为交易的载体,其安全性显得尤为重要。At present, blockchain-based transactions are generally carried out based on wallets, each wallet has a unique address, and users conduct transactions through this unique address. With the rapid development of blockchain technology, blockchain-related applications are becoming more and more extensive, business exchanges between enterprises and individuals through blockchain are increasing, and transaction transfers will become more and more frequent. As a carrier of transactions, the security of blockchain wallets is particularly important.
然而,发明人发现现有技术中至少存在如下问题:在现有技术的基于区块链的交易中,一旦用户的账户私钥丢失,该账户及该账户中的数据资产等账户相关信息均无法找回,导致用户的资产受到损失。However, the inventor found that there are at least the following problems in the prior art: in the blockchain-based transaction of the prior art, once the private key of the user's account is lost, the account and the data assets in the account and other account-related information cannot be retrieved, resulting in the loss of the user's assets.
发明内容SUMMARY OF THE INVENTION
本发明实施方式的目的在于提供一种区块链网络中的账户管理方法及终端设备,可以使得在用户的账户私钥丢失后,找回丢失的账户中的账户相关信息,从而可以避免用户因账户私钥丢失而导致的资产损失。The purpose of the embodiments of the present invention is to provide an account management method and terminal device in a blockchain network, which can make it possible to retrieve the account-related information in the lost account after the user's private key of the account is lost, so as to prevent the user from Asset loss caused by loss of account private key.
为解决上述技术问题,本发明的实施方式提供了一种区块链网络中的账户管理方法,包括:在通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语;在第一账户的秘钥丢失后,通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易,验证交易中包括历史交易信息和暗语口令,供交易接收方根据暗语口令以及历史交易信息中的加密暗语对第二账户执行验证操作;在验证通过后,第二账户获取第一账户的控制权。In order to solve the above technical problems, the embodiments of the present invention provide an account management method in a blockchain network, including: when initiating a transaction to the transaction recipient through the first account, carrying a password generated based on a coded password in the transaction information. Encryption code; after the key of the first account is lost, a verification transaction is initiated to the transaction receiver through the second account to verify the second account, and the verification transaction includes historical transaction information and code password for the transaction receiver to use according to The cipher password and the encrypted cipher in the historical transaction information perform a verification operation on the second account; after the verification is passed, the second account obtains the control right of the first account.
本发明的实施方式还提供了一种区块链网络中的账户验证方法,包括:接收用于对待验证账户进行验证的验证交易;验证交易中包括历史交易信息和暗语口令;根据历史交易信息获取到历史交易中的加密暗语;其中,加密暗语基于暗语口令生成;根据加密暗语以及验证交易中的暗语口令,对待验证账户执行验证操作;其中,待验证账户用于在验证通过后获取到使用暗语口令的第一账户的控制权。Embodiments of the present invention also provide an account verification method in a blockchain network, including: receiving a verification transaction for verifying the account to be verified; the verification transaction includes historical transaction information and a password in coded language; obtaining according to the historical transaction information To the encrypted code in the historical transaction; wherein, the encrypted code is generated based on the code password; according to the encrypted code and the code password in the verification transaction, the verification operation is performed on the account to be verified; the account to be verified is used to obtain the use code after the verification is passed. Control of the first account with the password.
本发明的实施方式还提供了一种终端设备,包括:至少一个处理器;以及,与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行如上述的区块链网络中的账户管理方法,或者能够执行如上述的区块链网络中的账户验证方法。Embodiments of the present invention also provide a terminal device, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by at least one processor. A processor executes so that at least one processor can execute the account management method in the blockchain network as described above, or can execute the account verification method in the blockchain network as described above.
本发明实施方式相对于现有技术而言,公开了一种区块链网络中的账户管理方法,在用户通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语;在第一账户的秘钥丢失后,通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易,验证交易中包括历史交易信息和暗语口令,供交易接收方根据暗语口令以及历史交易信息中的加密暗语对第二账户执行验证操作;在验证通过后,第二账户获取第一账户的控制权。通过在交易信息中携带基于只有交易发起方知晓的暗语口令而生成加密暗语,在第一账户的秘钥丢失后新申请的第二账户,发起基于暗语口令和历史交易信息的验证交易,可以有效、安全地验证使用第二账户的用户,与使用第一账号的用户是否为同一用户;在验证通过后,第二账户获取第一账户的控制权,使得用户可以找回丢失的账户中的账户相关信息,从而可以避免用户因账户私钥丢失而导致的资产损失。Compared with the prior art, the embodiment of the present invention discloses an account management method in a blockchain network. When a user initiates a transaction to a transaction recipient through a first account, the transaction information carries a password generated based on a coded password. Encryption code; after the key of the first account is lost, a verification transaction is initiated to the transaction receiver through the second account to verify the second account, and the verification transaction includes historical transaction information and code password for the transaction receiver to use according to The cipher password and the encrypted cipher in the historical transaction information perform a verification operation on the second account; after the verification is passed, the second account obtains the control right of the first account. By carrying in the transaction information an encrypted cipher based on a coded password known only to the transaction initiator, the second account newly applied for after the key of the first account is lost can initiate a verification transaction based on the coded password and historical transaction information. , Safely verify whether the user who uses the second account is the same user as the user who uses the first account; after the verification is passed, the second account obtains the control right of the first account, so that the user can retrieve the lost account in the account Relevant information, so as to avoid the user's asset loss caused by the loss of the account private key.
另外,加密暗语,具体为:通过交易接收方公钥对第一信息的哈希值进行加密后得到的加密暗语;第一信息,具体包括:用于唯一标识交易的交易流水、第一账户信息、交易接收方账户信息、资产转移信息以及暗语口令的哈希值;验证交易中包括的暗语口令具体为:暗语口令的哈希值。提供了加密暗语的一种具体的数据结构。其中,由于加密暗语包括的是暗语口令的哈希值,使得除交易发起方以外的用户无法获知到暗语口令的具体内容,可以使得到交易发起方的暗语口令不被泄露。In addition, the encrypted code is specifically: the encrypted code obtained by encrypting the hash value of the first information with the public key of the transaction recipient; the first information specifically includes: the transaction flow used to uniquely identify the transaction, the first account information , the account information of the transaction recipient, the asset transfer information and the hash value of the coded password; the coded password included in the verification transaction is specifically: the hash value of the coded password. Provides a specific data structure for encrypted ciphers. Among them, since the encrypted code includes the hash value of the code password, users other than the transaction initiator cannot know the specific content of the code code, so that the code code to the transaction initiator can not be leaked.
另外,在通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易之前,还包括:选取满足预设条件的交易接收方作为目标交易接收方;通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易,具体为:通过第二账户向目标交易接收方发起用于对第二账户进行验证的验证交易。通过选取目标交易接收方,对第二账户执行验证操作,可以更好地满足在实际应用中用户的不同需求。In addition, before initiating a verification transaction for verifying the second account to the transaction recipient through the second account, the method further includes: selecting a transaction recipient that satisfies a preset condition as a target transaction recipient; receiving the transaction through the second account The party initiates a verification transaction for verifying the second account, specifically: initiating a verification transaction for verifying the second account to the target transaction recipient through the second account. By selecting a target transaction recipient and performing a verification operation on the second account, different needs of users in practical applications can be better met.
另外,交易接收方的数量为多个;通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易,具体为:通过第二账户向多个交易接收方分别发起用于对第二账户进行验证的验证交易;验证通过,具体为:多个交易接收方对验证交易的验证通过的条数总和,达到预设门限。通过在预设条数的验证交易通过后,用户才可以在第二账户中获取到第一账户的控制权,安全性更高。In addition, the number of transaction recipients is multiple; a verification transaction for verifying the second account is initiated to the transaction recipient through the second account, specifically: initiating a verification transaction to the transaction recipients through the second account to verify the second account respectively. The second account performs a verification transaction for verification; the verification is passed, specifically: the sum of the number of verification transactions passed by multiple transaction recipients reaches a preset threshold. The user can obtain the control right of the first account in the second account only after the preset number of verification transactions are passed, and the security is higher.
附图说明Description of drawings
图1是根据本发明第一实施方式提供的一种区块链网络中的账户管理方法的流程图;FIG. 1 is a flowchart of an account management method in a blockchain network provided according to a first embodiment of the present invention;
图2是根据本发明第二实施方式提供的一种区块链网络中的账户管理方法的流程图;2 is a flowchart of an account management method in a blockchain network provided according to a second embodiment of the present invention;
图3是根据本发明第三实施方式提供的一种区块链网络中的账户管理方法的流程图;3 is a flowchart of an account management method in a blockchain network provided according to a third embodiment of the present invention;
图4是根据本发明第四实施方式提供的一种区块链网络中的账户验证方法的流程图;4 is a flowchart of an account verification method in a blockchain network provided according to a fourth embodiment of the present invention;
图5是根据本发明第四实施方式提供的一种区块链网络中的账户验证方法的中步骤403的子步骤的流程图;5 is a flowchart of sub-steps of step 403 in an account verification method in a blockchain network provided according to the fourth embodiment of the present invention;
图6是根据本发明第五实施方式提供的一种终端设备的结构连接示意图。FIG. 6 is a schematic diagram of structural connection of a terminal device according to a fifth embodiment of the present invention.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合附图对本发明的各实施方式进行详细的阐述。然而,本领域的普通技术人员可以理解,在本发明各实施方式中,为了使读者更好地理解本申请而提出了许多技术细节。但是,即使没有这些技术细节和基于以下各实施方式的种种变化和修改,也可以实现本申请所要求保护的技术方案。以下各个实施例的划分是为了描述方便,不应对本发明的具体实现方式构成任何限定,各个实施例在不矛盾的前提下可以相互结合相互引用。In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the various embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art can appreciate that, in the various embodiments of the present invention, many technical details are set forth in order for the reader to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in the present application can be realized. The following divisions of the various embodiments are for the convenience of description, and should not constitute any limitation on the specific implementation of the present invention, and the various embodiments may be combined with each other and referred to each other on the premise of not contradicting each other.
本发明的第一实施方式涉及一种区块链网络中的账户管理方法。在本实施方式中,在通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语;在第一账户的秘钥丢失后,通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易,验证交易中包括历史交易信息和暗语口令,供交易接收方根据暗语口令以及历史交易信息中的加密暗语对第二账户执行验证操作;在验证通过后,第二账户获取第一账户的控制权。The first embodiment of the present invention relates to an account management method in a blockchain network. In this embodiment, when a transaction is initiated to the transaction recipient through the first account, the encrypted cipher generated based on the cipher password is carried in the transaction information; after the secret key of the first account is lost, the transaction recipient is sent to the transaction recipient through the second account Initiate a verification transaction for verifying the second account, and the verification transaction includes historical transaction information and a coded password for the transaction recipient to perform a verification operation on the second account according to the coded password and the encrypted password in the historical transaction information; After that, the second account obtains the control right of the first account.
本实施方式中,通过在交易信息中携带基于只有交易发起方知晓的暗语口令而生成加密暗语,在第一账户的秘钥丢失后新申请的第二账户,发起基于暗语口令和历史交易信息的验证交易,可以有效、安全地验证使用第二账户的用户,与使用第一账号的用户是否为同一用户;在验证通过后,第二账户获取第一账户的控制权,使得用户可以找回丢失的账户中的账户相关信息,从而可以避免用户因账户私钥丢失而导致的资产损失。In this embodiment, an encrypted code is generated by carrying a code based on a code known only to the transaction initiator in the transaction information. After the secret key of the first account is lost, the newly applied for the second account initiates an encrypted code based on the code password and historical transaction information. The verification transaction can effectively and safely verify whether the user using the second account is the same user as the user using the first account; after the verification is passed, the second account obtains the control right of the first account, so that the user can retrieve the lost The account-related information in the account, so as to avoid the user's asset loss caused by the loss of the account's private key.
下面对本实施方式的区块链网络中的账户管理方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。The implementation details of the account management method in the blockchain network of the present embodiment will be described in detail below. The following contents are only provided for the convenience of understanding, and are not necessary to implement this solution.
本实施方式中的区块链网络中的账户管理方法的流程图如图1所示,包括:The flowchart of the account management method in the blockchain network in this embodiment is shown in Figure 1, including:
步骤101,在通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语。Step 101, when initiating a transaction to the transaction recipient through the first account, carry the encrypted code generated based on the code password in the transaction information.
具体的说,本实施方式中的加密暗语,可以为:通过交易接收方公钥对第一信息的哈希值进行加密后得到的加密暗语。其中,这里所说的第一信息,可以包括:用于唯一标识交易的交易流水、第一账户信息、交易接收方账户信息、资产转移信息以及暗语口令的哈希值。本实施方式中,暗语口令的具体内容既可以与交易有关,也可以与交易无关,类似于密码提示信息,相当于生成了一个除交易发起方的第三方无法知晓的交易标记。Specifically, the encrypted code in this embodiment may be an encrypted code obtained by encrypting the hash value of the first information with the public key of the transaction recipient. Wherein, the first information mentioned here may include: transaction flow used to uniquely identify the transaction, first account information, transaction recipient account information, asset transfer information, and a hash value of a password in cipher language. In this embodiment, the specific content of the coded password may be related to the transaction or not related to the transaction, similar to the password prompt information, which is equivalent to generating a transaction mark that cannot be known by a third party except the transaction initiator.
需要注意的是,本实施方式中的交易流水是对交易进行唯一标识,通过该标识,可以找到该标识下的相关交易信息。It should be noted that the transaction flow in this embodiment is to uniquely identify the transaction, and through the identification, the relevant transaction information under the identification can be found.
举例而言,第一账户的若暗语口令为:“东方明珠”,则用户的终端设备基于该暗语口令生成的加密暗语的数据结构可以为:交易接收方公钥(SHA256(交易流水+第一账户信息+交易接收方账户信息+资产转移信息+SHA256(东方明珠))),基于此,不难发现,任何人都可以验证交易发起方发起的交易信息中是否携带加密暗语,但是除交易发起方外,几乎不会有人知晓暗语口令的具体内容,使得暗语口令的私密性得到保证。For example, if the cipher password of the first account is: "Oriental Pearl", then the data structure of the encrypted cipher generated by the user's terminal device based on the cipher password may be: the public key of the transaction recipient (SHA256 (transaction flow + first account) information + transaction recipient account information + asset transfer information + SHA256 (Oriental Pearl))), based on this, it is not difficult to find that anyone can verify whether the transaction information initiated by the transaction initiator carries encrypted codes, but except the transaction initiator , almost no one knows the specific content of the coded password, which ensures the privacy of the coded password.
在上述例子中,暗语口令的哈希值以及第一信息的哈希值均为:256比特的哈希值,分别用于表示暗语口令的唯一值和第一信息的唯一值,具有唯一性。当然,本实施方式中对具体的哈希值算法不作具体限定。In the above example, the hash value of the coded password and the hash value of the first information are both: 256-bit hash values, which are respectively used to represent the unique value of the coded password and the unique value of the first information, and are unique. Of course, the specific hash value algorithm is not specifically limited in this embodiment.
另外,在通过第一账户向交易接收方发起交易时的交易信息中,还可以包括但不限于下列信息:用于唯一标识交易的交易流水、第一账户信息、交易接收方账户信息、资产转移信息以及第一账户的私钥签名。其中,由于交易信息中包括第一账户的私钥签名,从而可以确保交易的安全性和合法性。In addition, the transaction information when a transaction is initiated to the transaction recipient through the first account may also include, but is not limited to, the following information: transaction flow used to uniquely identify the transaction, first account information, transaction recipient account information, asset transfer information and the private key signature of the first account. Among them, since the transaction information includes the signature of the private key of the first account, the security and legitimacy of the transaction can be ensured.
步骤102,在第一账户的秘钥丢失后,通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易。Step 102, after the secret key of the first account is lost, a verification transaction for verifying the second account is initiated to the transaction recipient through the second account.
具体的说,若第一账户的秘钥丢失,用户可以新申请第二账户,并由用户的终端设备通过第二账户从区块链中获取到第一账户的交易流水,并获取到包括暗语口令的交易,生成验证交易。其中,验证交易中包括历史交易信息和暗语口令,供交易接收方根据暗语口令以及历史交易信息中的加密暗语,对第二账户执行验证操作。其中,这里所说的历史交易信息即为步骤101中的交易信息。Specifically, if the secret key of the first account is lost, the user can apply for a new second account, and the user's terminal device obtains the transaction flow of the first account from the blockchain through the second account, and obtains the transaction flow including the code word Password transactions, generate verification transactions. The verification transaction includes historical transaction information and a coded password, for the transaction recipient to perform a verification operation on the second account according to the coded password and the encrypted password in the historical transaction information. Wherein, the historical transaction information mentioned here is the transaction information in step 101 .
可以理解,交易接收方的终端设备之所以可以根据暗语口令以及历史交易信息中的加密暗语,对第二账户执行验证操作,是因为:交易接收方的终端设备,可以通过对历史交易信息中的加密暗语进行解密,从而得到在第一账户的秘钥丢失前,用户通过第一账户与该交易接收方进行交易的交易信息中携带的基于暗语口令的信息;而用户通过第二账户发出的验证交易中也包括了暗语口令的信息,由于暗语口令只有交易发起方知晓,因此,如果用户通过第一账户与该交易接收方进行交易的交易信息中携带的基于暗语口令的信息,与用户通过第二账户发出的验证交易中也包括的暗语口令的信息一致,则可以验证得到:当前通过第二账户发起验证交易的用户,就是第一账户的用户。It can be understood that the reason why the terminal device of the transaction recipient can perform the verification operation on the second account according to the cipher password and the encrypted cipher in the historical transaction information is because: the terminal device of the transaction recipient can verify the data in the historical transaction information. The encrypted cipher is decrypted, so as to obtain the information based on the cipher password carried in the transaction information that the user conducts the transaction with the transaction recipient through the first account before the key of the first account is lost; The transaction also includes the information of the coded password. Since the coded password is only known to the transaction initiator, if the user conducts a transaction with the transaction recipient through the first account, the information based on the coded password carried in the transaction information will be communicated with the user through the first account. If the information of the coded password also included in the verification transaction sent by the second account is consistent, it can be verified that: the user who currently initiates the verification transaction through the second account is the user of the first account.
进一步地,验证交易中包括的暗语口令可以为暗语口令的哈希值,具体的,验证交易中包括的可以是以交易接收方公钥对暗语口令的哈希值进行加密后得到的第二信息,第二信息的数据结构可以为:交易接收方公钥(SHA256(暗语口令))。其中,验证交易,可以包括但不限于:用于唯一标识验证交易的第一资产找回交易流水、历史交易流水、历史交易签名、第一账户信息,交易接收方账户信息、第二信息、第二账户信息,第二账户的私钥签名。其中,由于加密暗语包括的是暗语口令的哈希值,使得除交易发起方以外的用户无法获知到暗语口令的具体内容,可以使得到交易发起方的暗语口令不被泄露。Further, the coded password included in the verification transaction can be the hash value of the coded password. Specifically, the verification transaction can include the second information obtained by encrypting the hash value of the coded password with the public key of the transaction recipient. , and the data structure of the second information may be: the public key of the transaction recipient (SHA256 (cryptographic password)). Wherein, the verification transaction may include but is not limited to: the first asset recovery transaction flow, historical transaction flow, historical transaction signature, first account information, transaction receiver account information, second information, third The second account information, the private key signature of the second account. Among them, since the encrypted code includes the hash value of the code password, users other than the transaction initiator cannot know the specific content of the code code, so that the code code to the transaction initiator can not be leaked.
需要说明的是,本实施方式中,在第一账户的秘钥丢失后,通过第二账户向交易接收方发起验证交易来找回第一账户的找回交易笔数可以限制为N个,N为大于或者等于1的自然数。其中,N的具体值由区块链中设置的协议来确定。在找回交易笔数的限制下,可以对频繁通过第二账户向交易接收方发起验证交易来找回第一账户的非正常用户起到限制作用。It should be noted that, in this embodiment, after the secret key of the first account is lost, the number of retrieving transactions for retrieving the first account by initiating a verification transaction to the transaction recipient through the second account can be limited to N, where N is a natural number greater than or equal to 1. Among them, the specific value of N is determined by the protocol set in the blockchain. Under the limitation of the number of retrieved transactions, the abnormal users who frequently initiate verification transactions to the transaction recipient through the second account to retrieve the first account can be restricted.
步骤103,在验证通过后,第二账户获取第一账户的控制权。Step 103: After the verification is passed, the second account acquires the control right of the first account.
具体的说,在交易接收方根据暗语口令以及历史交易信息中的加密暗语,对第二账户执行验证操作后,进入等待期。若获取到验证结果,则在验证通过后,第二账户获取第一账户的控制权,可以避免用户因账户私钥丢失而导致的资产损失。Specifically, after the transaction recipient performs a verification operation on the second account according to the coded password and the encrypted coded language in the historical transaction information, the waiting period is entered. If the verification result is obtained, after the verification is passed, the second account obtains the control right of the first account, which can avoid the user's asset loss caused by the loss of the account's private key.
不难发现,本实施方式提供的一种区块链网络中的账户管理方法,通过在交易信息中携带基于只有交易发起方知晓的暗语口令而生成加密暗语,在第一账户的秘钥丢失后新申请的第二账户,发起基于暗语口令和历史交易信息的验证交易,可以有效、安全地验证使用第二账户的用户,与使用第一账号的用户是否为同一用户;在验证通过后,第二账户获取第一账户的控制权,使得用户可以找回丢失的账户中的账户相关信息,从而可以避免用户因账户私钥丢失而导致的资产损失。It is not difficult to find that an account management method in a blockchain network provided by this embodiment generates an encrypted cipher by carrying a cipher password known only to the transaction initiator in the transaction information. After the secret key of the first account is lost, The newly applied second account initiates a verification transaction based on the coded password and historical transaction information, which can effectively and safely verify whether the user using the second account is the same user as the user using the first account; The second account obtains the control right of the first account, so that the user can retrieve the account-related information in the lost account, thereby avoiding the user's asset loss caused by the loss of the account's private key.
本发明的第二实施方式涉及一种区块链网络中的账户管理方法。第二实施方式是在第一实施方式的基础上作出的改进,具体改进之处在于:在本实施方式中,在通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易之前,还选取满足预设条件的交易接收方作为目标交易接收方,并通过第二账户向目标交易接收方发起用于对第二账户进行验证的验证交易。本实施方式中,公开了可以通过选取目标交易接收方,对第二账户执行验证操作,可以更好地满足在实际应用中用户的不同需求。The second embodiment of the present invention relates to an account management method in a blockchain network. The second embodiment is an improvement made on the basis of the first embodiment, and the specific improvement lies in that: in this embodiment, a verification transaction for verifying the second account is initiated to the transaction recipient through the second account Previously, a transaction recipient that satisfies a preset condition is also selected as a target transaction recipient, and a verification transaction for verifying the second account is initiated to the target transaction recipient through the second account. In this embodiment, it is disclosed that the verification operation can be performed on the second account by selecting the target transaction recipient, which can better meet the different needs of users in practical applications.
本实施方式中的区块链网络中的账户管理方法的流程图如图2所示,包括:The flowchart of the account management method in the blockchain network in this embodiment is shown in Figure 2, including:
步骤201,在通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语。Step 201, when initiating a transaction to the transaction recipient through the first account, carry the encrypted code generated based on the code password in the transaction information.
由于本步骤与第一实施方式中的步骤101大致相同,为避免重复,此处不再赘述。Since this step is substantially the same as step 101 in the first embodiment, in order to avoid repetition, it will not be repeated here.
步骤202,在第一账户的秘钥丢失后,选取满足预设条件的交易接收方作为目标交易接收方。Step 202, after the secret key of the first account is lost, select a transaction recipient that satisfies a preset condition as a target transaction recipient.
具体的说,通过区块链网络,可以根据用户的第一账户的交易信息,按照某种算法选择特定的交易接收方作为目标交易接收方。比如,可以在第一账户的交易信息中选择最早的交易信息,根据该最早的交易信息得到交易接收方的信息,将该交易接收方作为目标交易接收方。再比如,可以在第一账户的交易信息中选择距当前的时间最近一次的交易信息,根据该最近一次的交易信息得到交易接收方的信息,将该交易接收方作为目标交易接收方。此外,还可以根据某种算法,在第一账户的交易信息中随机选择交易接收方作为目标交易接收方,本实施例对此不作具体限定。Specifically, through the blockchain network, according to the transaction information of the user's first account, a specific transaction recipient can be selected as the target transaction recipient according to a certain algorithm. For example, the earliest transaction information may be selected from the transaction information of the first account, the information of the transaction recipient may be obtained according to the earliest transaction information, and the transaction recipient may be regarded as the target transaction recipient. For another example, the latest transaction information from the current time may be selected from the transaction information of the first account, the transaction recipient information is obtained according to the latest transaction information, and the transaction recipient is used as the target transaction recipient. In addition, according to a certain algorithm, the transaction recipient may be randomly selected as the target transaction recipient in the transaction information of the first account, which is not specifically limited in this embodiment.
此外,本实施方式中,还可以根据智能合约的规定选择特定的交易接收方作为目标交易接收方。其中,这里所说的智能合约可以理解为传统合约的数字化网络化版本,是区块链上运行的计算机程序,可以满足在源代码中写入的条件时自行执行。由于智能合约一旦编写好就可以被用户信赖,合约条款就不会被改变。也就是说,任何人也不能对智能合约进行修改,具有不可更改性。这就使得,如果编写好的智能合约的规定是选择满足A条件的交易接收方作为目标交易接收方,那么就不可能更改为选择满足B条件的交易接收方作为目标交易接收方。In addition, in this embodiment, a specific transaction recipient can also be selected as the target transaction recipient according to the provisions of the smart contract. Among them, the smart contract mentioned here can be understood as the digital network version of the traditional contract, which is a computer program running on the blockchain, which can be executed by itself when the conditions written in the source code are satisfied. Since a smart contract can be trusted by users once written, the terms of the contract cannot be changed. That is to say, no one can modify the smart contract, which is immutable. This makes it impossible to change to select the transaction recipient that satisfies the condition B as the target transaction recipient if the regulation of the written smart contract is to select the transaction recipient that satisfies the A condition as the target transaction recipient.
步骤203,通过第二账户向目标交易接收方发起用于对第二账户进行验证的验证交易。Step 203 , initiate a verification transaction for verifying the second account to the target transaction recipient through the second account.
其中,验证交易中包括历史交易信息和暗语口令,供交易接收方根据暗语口令以及历史交易信息中的加密暗语,对第二账户执行验证操作。The verification transaction includes historical transaction information and a coded password, for the transaction recipient to perform a verification operation on the second account according to the coded password and the encrypted password in the historical transaction information.
本实施方式中,通过第二账户,仅向目标交易接收方发起用于对第二账户进行验证的验证交易。In this embodiment, a verification transaction for verifying the second account is only initiated to the target transaction recipient through the second account.
步骤204,在验证通过后,第二账户获取第一账户的控制权。Step 204, after the verification is passed, the second account acquires the control right of the first account.
由于本步骤与第一实施方式中的步骤103大致相同,为避免重复,此处不再赘述。Since this step is substantially the same as step 103 in the first embodiment, in order to avoid repetition, it will not be repeated here.
不难发现,本实施方式提供的一种区块链网络中的账户管理方法,在通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易之前,还选取满足预设条件的交易接收方作为目标交易接收方,并通过第二账户向目标交易接收方发起用于对第二账户进行验证的验证交易。本实施方式中,公开了可以通过选取目标交易接收方,对第二账户执行验证操作,可以更好地满足在实际应用中用户的不同需求。It is not difficult to find that, in an account management method in a blockchain network provided by this embodiment, before initiating a verification transaction for verifying the second account to the transaction recipient through the second account, it also selects a method that satisfies a preset condition. The transaction receiver is used as the target transaction receiver, and a verification transaction for verifying the second account is initiated to the target transaction receiver through the second account. In this embodiment, it is disclosed that the verification operation can be performed on the second account by selecting the target transaction recipient, which can better meet the different needs of users in practical applications.
本发明的第三实施方式涉及一种区块链网络中的账户管理方法。第三实施方式是在第一实施方式的基础上作出的改进,具体改进之处在于:在本实施方式中,交易接收方的数量为多个;通过第二账户向多个交易接收方分别发起用于对第二账户进行验证的验证交易;在多个交易接收方对验证交易的验证通过的条数总和,达到预设门限的情况下,才验证通过。本实施方式中,通过在预设条数的验证交易通过后,用户才可以在第二账户中获取到第一账户的控制权,安全性更高。The third embodiment of the present invention relates to an account management method in a blockchain network. The third embodiment is an improvement made on the basis of the first embodiment. The specific improvement lies in that: in this embodiment, the number of transaction recipients is multiple; A verification transaction for verifying the second account; the verification is passed only when the sum of the number of verification transactions passed by multiple transaction recipients reaches a preset threshold. In this embodiment, the user can obtain the control right of the first account in the second account only after the preset number of verification transactions are passed, and the security is higher.
本实施方式中的区块链网络中的账户管理方法的流程图如图3所示,包括:The flowchart of the account management method in the blockchain network in this embodiment is shown in FIG. 3 , including:
步骤301,在通过第一账户向交易接收方发起交易时,在交易信息中携带基于暗语口令生成的加密暗语。Step 301, when initiating a transaction to the transaction recipient through the first account, carry the encrypted code generated based on the code password in the transaction information.
由于本步骤与第一实施方式中的步骤101大致相同,为避免重复,此处不再赘述。Since this step is substantially the same as step 101 in the first embodiment, in order to avoid repetition, it will not be repeated here.
步骤302,在第一账户的秘钥丢失后,通过第二账户向多个交易接收方分别发起用于对第二账户进行验证的验证交易。Step 302: After the secret key of the first account is lost, a verification transaction for verifying the second account is respectively initiated to multiple transaction recipients through the second account.
本实施方式中,交易接收方的数量为多个。In this embodiment, the number of transaction recipients is plural.
一般来说,从注册第一账户开始至第一账户的秘钥丢失为止,会通过第一账户分别与很多个交易接收方均进行过交易。因此,通过第二账户向交易接收方发起用于对第二账户进行验证的验证交易时,具体可以通过第二账户向多个交易接收方分别发起用于对第二账户进行验证的验证交易。其中,验证交易中包括历史交易信息和暗语口令,供多个交易接收方分别根据暗语口令以及历史交易信息中的加密暗语,对第二账户执行验证操作。Generally speaking, from the registration of the first account to the loss of the secret key of the first account, transactions have been conducted with many transaction recipients through the first account respectively. Therefore, when a verification transaction for verifying the second account is initiated to the transaction recipient through the second account, verification transactions for verifying the second account may be initiated to multiple transaction recipients through the second account. The verification transaction includes historical transaction information and a coded password, for multiple transaction recipients to perform verification operations on the second account according to the coded password and the encrypted password in the historical transaction information, respectively.
比如说,可以是在20个交易接收方中随机选择5个交易接收方,通过第二账户向这5个交易接收方分别发起用于对第二账户进行验证的验证交易,供这5个交易接收方分别根据验证交易中包括的历史交易信息的加密暗语和暗语口令,对第二账户执行验证操作。当然,上述仅为举例说明,实际应用中不应以上述为限。比如,还可以选择10个交易接收方或者20个交易接收方来分别对第二账户执行验证操作。For example, it is possible to randomly select 5 transaction recipients from among 20 transaction recipients, and initiate verification transactions to the 5 transaction recipients through the second account for verifying the second account, for the 5 transaction recipients. The receiver performs a verification operation on the second account according to the encrypted cipher and the cipher password of the historical transaction information included in the verification transaction, respectively. Of course, the above is only an example, and the practical application should not be limited by the above. For example, 10 transaction recipients or 20 transaction recipients may also be selected to perform the verification operation on the second account respectively.
步骤303,在进行验证的验证交易中,验证通过的条数总和达到预设门限时,第二账户获取第一账户的控制权。Step 303 , in the verification transaction for verification, when the sum of the number of verified items reaches a preset threshold, the second account acquires the control right of the first account.
在一个实施例中,如果通过第二账户向20个交易接收方分别发起了用于对第二账户进行验证的验证交易,预设门限设为交易接收方总数的80%,即16。若20个交易接收方对验证交易的验证通过的条数总和为5个,没有达到预设门限16,则验证失败,该流程结束;若20个交易接收方对验证交易的验证通过的条数总和19个,达到预设门限16,则验证通过。其中,对于预设门限的设定,可以是一个固定值,也可以是根据第二账户执行验证操作的交易接收方的总数来设定,此处不作具体限定。In one embodiment, if a verification transaction for verifying the second account is respectively initiated to 20 transaction recipients through the second account, the preset threshold is set to 80% of the total number of transaction recipients, that is, 16. If the total number of verification transactions passed by 20 transaction receivers is 5, and the preset threshold of 16 is not reached, the verification fails and the process ends; if the number of verification transactions passed by 20 transaction receivers is verified The total number is 19, and if the preset threshold of 16 is reached, the verification is passed. The setting of the preset threshold may be a fixed value, or may be set according to the total number of transaction recipients who perform the verification operation on the second account, which is not specifically limited here.
需要说明的是,本实施方式也可以是在第二实施方式的基础上作出的改进。It should be noted that this embodiment may also be an improvement made on the basis of the second embodiment.
不难发现,本实施方式提供的一种区块链网络中的账户管理方法,交易接收方的数量为多个;通过第二账户向多个交易接收方分别发起用于对第二账户进行验证的验证交易;在多个交易接收方对验证交易的验证通过的条数总和,达到预设门限的情况下,才验证通过。本实施方式中,通过在预设条数的验证交易通过后,用户才可以在第二账户中获取到第一账户的控制权,安全性更高。It is not difficult to find that, in an account management method in a blockchain network provided by this embodiment, the number of transaction recipients is multiple; the second account is used to respectively initiate multiple transaction recipients to verify the second account. The verification transaction; the verification is passed only when the total number of verification transactions passed by multiple transaction recipients reaches the preset threshold. In this embodiment, the user can obtain the control right of the first account in the second account only after the preset number of verification transactions are passed, and the security is higher.
本发明的第四实施方式涉及一种区块链网络中的账户验证方法。本实施方式中,接收用于对待验证账户进行验证的验证交易;验证交易中包括历史交易信息和暗语口令;根据历史交易信息获取到历史交易中的加密暗语;其中,加密暗语基于暗语口令生成;根据加密暗语以及验证交易中的暗语口令,对待验证账户执行验证操作;其中,待验证账户用于在验证通过后获取到使用暗语口令的第一账户的控制权。The fourth embodiment of the present invention relates to an account verification method in a blockchain network. In this embodiment, a verification transaction for verifying the account to be verified is received; the verification transaction includes historical transaction information and a password; the encrypted password in the historical transaction is obtained according to the historical transaction information; wherein, the encrypted password is generated based on the password password; According to the encrypted code and the code password in the verification transaction, the verification operation is performed on the account to be verified; the account to be verified is used to obtain the control right of the first account using the code password after the verification is passed.
本实施方式中,通过在接收用于对待验证账户进行验证的验证交易后,根据验证交易中包括的历史交易信息,获取到历史交易中的加密暗语;再根据验证交易中包括的暗语口令和获取到的加密暗语,对待验证账户执行验证操作。若验证通过,则表明待验证账户和使用暗语口令的第一账户所使用的暗语口令相同,由于暗语口令只有交易发起方知晓,因此,在验证通过后,待验证账户可以获取到使用暗语口令的第一账户的控制权,使得用户可以找回丢失的账户中的账户相关信息,从而可以避免用户因账户私钥丢失而导致的资产损失。In this embodiment, after receiving the verification transaction for verifying the account to be verified, according to the historical transaction information included in the verification transaction, the encrypted code in the historical transaction is obtained; The encrypted code received, and the verification operation is performed on the account to be verified. If the verification is passed, it means that the account to be verified and the first account using the password password use the same password. Since the password password is only known to the transaction initiator, after the verification is passed, the account to be verified can obtain the password using the password password. The control right of the first account enables the user to retrieve the account-related information in the lost account, thereby avoiding the user's asset loss caused by the loss of the account private key.
下面对本实施方式的区块链网络中的账户验证方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。The implementation details of the account verification method in the blockchain network of the present embodiment will be described in detail below. The following contents are only provided for the convenience of understanding, and are not necessary to implement this solution.
本实施方式中的区块链网络中的账户验证方法的流程图如图4所示,包括:The flowchart of the account verification method in the blockchain network in this embodiment is shown in Figure 4, including:
步骤401,接收用于对待验证账户进行验证的验证交易。Step 401: Receive a verification transaction for verifying the account to be verified.
其中,验证交易中包括历史交易信息和暗语口令。这里所说的待验证账户,具体为在用户的第一账户的私钥丢失后,新申请的账户。Among them, the verification transaction includes historical transaction information and coded password. The account to be verified here specifically refers to the newly applied account after the private key of the user's first account is lost.
具体的说,验证交易中包括的暗语口令可以为暗语口令的哈希值,具体的,验证交易中包括的可以是以交易接收方公钥对暗语口令的哈希值进行加密后得到的第二信息,第二信息的数据结构可以为:交易接收方公钥(SHA256(暗语口令))。其中,验证交易,可以包括但不限于:用于唯一标识验证交易的第一资产找回交易流水、历史交易流水、历史交易签名、第一账户信息,交易接收方账户信息、第二信息、第二账户信息,第二账户的私钥签名;这里所说的第二账户为待验证账户。其中,由于加密暗语包括的是暗语口令的哈希值,使得除交易发起方以外的用户无法获知到暗语口令的具体内容,可以使得到交易发起方的暗语口令不被泄露。Specifically, the cipher password included in the verification transaction may be a hash value of the cipher password. Specifically, the cipher password included in the verification transaction may be a second hash value obtained by encrypting the hash value of the cipher password with the public key of the transaction recipient. information, and the data structure of the second information may be: the public key of the transaction recipient (SHA256 (cryptographic password)). Wherein, the verification transaction may include but is not limited to: the first asset recovery transaction flow, historical transaction flow, historical transaction signature, first account information, transaction receiver account information, second information, third Second account information, the private key signature of the second account; the second account mentioned here is the account to be verified. Among them, since the encrypted code includes the hash value of the code password, users other than the transaction initiator cannot know the specific content of the code code, so that the code code to the transaction initiator can not be leaked.
步骤402,根据历史交易信息获取到历史交易中的加密暗语。其中,加密暗语基于暗语口令生成。In step 402, the encrypted code words in the historical transaction are acquired according to the historical transaction information. Among them, the encrypted code is generated based on the code password.
具体的说,本实施方式中的加密暗语,可以为:通过交易接收方公钥对第一信息的哈希值进行加密后得到的加密暗语。其中,这里所说的第一信息,可以包括:用于唯一标识交易的交易流水、第一账户信息、交易接收方账户信息、资产转移信息以及暗语口令的哈希值。本实施方式中,暗语口令的具体内容既可以与交易有关,也可以与交易无关,类似于密码提示信息,相当于生成了一个除交易发起方的第三方无法知晓的交易标记。Specifically, the encrypted code in this embodiment may be an encrypted code obtained by encrypting the hash value of the first information with the public key of the transaction recipient. Wherein, the first information mentioned here may include: transaction flow used to uniquely identify the transaction, first account information, transaction recipient account information, asset transfer information, and a hash value of a password in cipher language. In this embodiment, the specific content of the coded password may be related to the transaction or not related to the transaction, similar to the password prompt information, which is equivalent to generating a transaction mark that cannot be known by a third party except the transaction initiator.
另外,本实施方式中的历史交易信息,还可以包括但不限于下列信息:用于唯一标识交易的交易流水、所述第一账户信息、交易接收方账户信息、资产转移信息以及所述第一账户的私钥签名。其中,由于历史交易信息中包括第一账户的私钥签名,从而可以确保交易的安全性和合法性。In addition, the historical transaction information in this embodiment may also include, but is not limited to, the following information: transaction flow for uniquely identifying transactions, the first account information, the transaction recipient account information, asset transfer information, and the first The account's private key signature. Among them, since the historical transaction information includes the private key signature of the first account, the security and legality of the transaction can be ensured.
步骤403,根据加密暗语以及验证交易中的暗语口令,对待验证账户执行验证操作。Step 403: Perform a verification operation on the account to be verified according to the encrypted cipher and the cipher password in the verification transaction.
其中,待验证账户用于在验证通过后获取到使用暗语口令的第一账户的控制权。The account to be verified is used to obtain the control right of the first account using the coded password after the verification is passed.
具体的说,本步骤403可以包括如下子步骤,其具体流程图参见图5:Specifically, this step 403 may include the following sub-steps, and the specific flowchart is shown in FIG. 5 :
子步骤4031,以交易接收方私钥,对历史交易信息中的加密暗语进行解密,解密后得到第一信息的哈希值。Sub-step 4031, decrypt the encrypted code in the historical transaction information with the private key of the transaction recipient, and obtain the hash value of the first information after decryption.
具体的说,若历史交易信息中的加密暗语为:交易接收方公钥(SHA256(交易流水+第一账户信息+交易接收方账户信息+资产转移信息+SHA256(东方明珠))),则以交易接收方私钥对该加密暗语进行解密后,得到的第一信息的哈希值为:SHA256(交易流水+第一账户信息+交易接收方账户信息+资产转移信息+SHA256(东方明珠))。Specifically, if the encrypted code in the historical transaction information is: the public key of the transaction recipient (SHA256 (transaction flow + first account information + transaction recipient account information + asset transfer information + SHA256 (Oriental Pearl))), then the transaction After the recipient's private key decrypts the encrypted code, the obtained hash value of the first information is: SHA256 (transaction flow + first account information + transaction recipient account information + asset transfer information + SHA256 (Oriental Pearl)).
其中,第一信息可以包括:用于唯一标识交易的交易流水、第一账户信息、交易接收方账户信息、资产转移信息以及暗语口令的哈希值。Wherein, the first information may include: transaction flow used to uniquely identify the transaction, first account information, transaction recipient account information, asset transfer information, and a hash value of a coded password.
子步骤4032,以交易接收方私钥,对第二信息进行解密,得到暗语口令的哈希值。Sub-step 4032, decrypt the second information with the private key of the transaction recipient to obtain the hash value of the cipher password.
若以交易接收方公钥对暗语口令的哈希值进行加密后得到第二信息后,第二信息的数据结构为:交易接收方公钥(SHA256(暗语口令))。那么,以交易接收方私钥,对第二信息进行解密,得到的暗语口令的哈希值为:(SHA256(暗语口令))。If the second information is obtained by encrypting the hash value of the cipher password with the public key of the transaction receiver, the data structure of the second information is: the public key of the transaction receiver (SHA256 (crypto password)). Then, decrypt the second information with the private key of the transaction recipient, and the obtained hash value of the cipher password is: (SHA256 (cipher password)).
需要说明的是,本实施方式中不对子步骤4031和子步骤4032执行的先后顺序进行限定。It should be noted that the order of execution of sub-step 4031 and sub-step 4032 is not limited in this embodiment.
子步骤4033,获取历史交易信息中的第三信息。Sub-step 4033, acquiring the third information in the historical transaction information.
其中,第三信息可以包括:历史交易流水、第一账户信息、交易接收方账户信息以及资产转移信息。The third information may include: historical transaction flow, first account information, transaction recipient account information, and asset transfer information.
子步骤4034,计算第三信息和暗语口令的哈希值的组合的哈希值。Sub-step 4034: Calculate the hash value of the combination of the hash value of the third message and the cipher password.
通过子步骤4033得到的第三信息,和通过子步骤4032得到的暗语口令,可以得到本步骤中的第三信息和暗语口令的哈希值的组合的哈希值,计算得到的哈希值可以表示为:SHA256(历史交易流水+第一账户信息+交易接收方账户信息+资产转移信息+(SHA256(暗语口令))。The third information obtained by sub-step 4033 and the coded password obtained by sub-step 4032 can obtain the hash value of the combination of the third information and the hash value of the coded password in this step, and the calculated hash value can be It is expressed as: SHA256 (historical transaction flow + first account information + transaction recipient account information + asset transfer information + (SHA256 (password)).
子步骤4035,若计算得到的哈希值与解密后得到的第一信息的哈希值一致,则判定验证通过。Sub-step 4035, if the calculated hash value is consistent with the hash value of the first information obtained after decryption, it is determined that the verification is passed.
具体的说,在子步骤4031中得到的第一信息的哈希值为:SHA256(交易流水+第一账户信息+交易接收方账户信息+资产转移信息+SHA256(东方明珠));在子步骤4034中计算得到的哈希值为:SHA256(历史交易流水+第一账户信息+交易接收方账户信息+资产转移信息+(SHA256(暗语口令));若计算得到的哈希值与解密后得到的第一信息的哈希值一致,则表明在验证交易中的暗语口令也是“东方明珠”,由于暗语口令的具体内容只有交易发起方知晓,因此可以判定第一账户属于该用户,判定验证通过;否则,验证失败,该流程结束。Specifically, the hash value of the first information obtained in sub-step 4031 is: SHA256 (transaction flow + first account information + transaction recipient account information + asset transfer information + SHA256 (Oriental Pearl)); in sub-step 4034 The hash value calculated in: SHA256 (historical transaction flow + first account information + transaction recipient account information + asset transfer information + (SHA256 (password)); if the calculated hash value is the same as the one obtained after decryption If the hash values of the first information are consistent, it indicates that the code password in the verification transaction is also the "Oriental Pearl". Since the specific content of the code password is only known to the transaction initiator, it can be determined that the first account belongs to the user and the verification is passed; otherwise , the verification fails and the process ends.
在一具体的实施例中,在判定验证通过后,还可以将验证通过的结果发布至区块链网络,供区块链网络在验证通过的条数总和达到预设门限时,判定待验证账户验证通过。其中,验证通过的结果具体可以为第二资产找回交易。这里所说的第二资产找回交易,可以包括但不限于:第二资产找回交易流水,第一资产找回交易流水,第一账户信息,第二账户信息,交易资产信息,交易权重,交易接收方签名。通过将第二资产找回交易的数据包发送至第二账户,使第二账户获取到第一账户的控制权。In a specific embodiment, after it is determined that the verification is passed, the result of the verification can also be released to the blockchain network, so that the blockchain network can determine the account to be verified when the sum of the number of verified items reaches a preset threshold. Verification passed. Wherein, the result of passing the verification may specifically be the second asset retrieval transaction. The second asset recovery transaction mentioned here may include but is not limited to: second asset recovery transaction flow, first asset recovery transaction flow, first account information, second account information, transaction asset information, transaction weight, The transaction recipient's signature. By sending the data package of the second asset recovery transaction to the second account, the second account obtains the control right of the first account.
与现有技术相比,本实施方式提供的一种区块链网络中的账户验证方法,通过在接收用于对待验证账户进行验证的验证交易后,根据验证交易中包括的历史交易信息,获取到历史交易中的加密暗语;再根据验证交易中包括的暗语口令和获取到的加密暗语,对待验证账户执行验证操作。若验证通过,则表明待验证账户和使用暗语口令的第一账户所使用的暗语口令相同,由于暗语口令只有交易发起方知晓,因此,在验证通过后,待验证账户可以获取到使用暗语口令的第一账户的控制权,使得用户可以找回丢失的账户中的账户相关信息,从而可以避免用户因账户私钥丢失而导致的资产损失。Compared with the prior art, an account verification method in a blockchain network provided by this embodiment is obtained by, after receiving a verification transaction for verifying the account to be verified, according to the historical transaction information included in the verification transaction. To the encrypted code in the historical transaction; then according to the code password included in the verification transaction and the obtained encrypted code, the verification operation is performed on the account to be verified. If the verification is passed, it means that the account to be verified and the first account using the password password use the same password. Since the password password is only known to the transaction initiator, after the verification is passed, the account to be verified can obtain the password using the password password. The control right of the first account enables the user to retrieve the account-related information in the lost account, thereby avoiding the user's asset loss caused by the loss of the account private key.
不难发现,本实施方式为与第一至第三实施方式中任一实施方式相对应的方法实施例,本实施方式可与第一至第三实施方式中任一实施方式互相配合实施。第一实施方式中提到的相关技术细节在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第一实施方式中。It is not difficult to find that this embodiment is a method example corresponding to any one of the first to third embodiments, and this embodiment can be implemented in cooperation with any one of the first to third embodiments. The relevant technical details mentioned in the first embodiment are still valid in this embodiment, and are not repeated here in order to reduce repetition. Correspondingly, the related technical details mentioned in this embodiment can also be applied to the first embodiment.
上面各种方法的步骤划分,只是为了描述清楚,实现时可以合并为一个步骤或者对某些步骤进行拆分,分解为多个步骤,只要包括相同的逻辑关系,都在本专利的保护范围内;对算法中或者流程中添加无关紧要的修改或者引入无关紧要的设计,但不改变其算法和流程的核心设计都在该专利的保护范围内。The steps of the above various methods are divided only for the purpose of describing clearly. During implementation, they can be combined into one step or some steps can be split and decomposed into multiple steps. As long as the same logical relationship is included, they are all within the protection scope of this patent. ;Adding insignificant modifications to the algorithm or process or introducing insignificant designs, but not changing the core design of the algorithm and process are all within the scope of protection of this patent.
本发明第五实施方式涉及一种终端设备,如图6所示,包括:至少一个处理器501;以及,与至少一个处理器501通信连接的存储器502;其中,存储器502存储有可被至少一个处理器501执行的指令,指令被至少一个处理器501执行,以使所述至少一个处理器501能够执行如第一至第三实施方式中任一的区块链网络中的账户管理方法,或者能够执行如第四实施方式的区块链网络中的账户验证方法。The fifth embodiment of the present invention relates to a terminal device, as shown in FIG. 6 , comprising: at least one processor 501; and a memory 502 connected in communication with the at least one processor 501; Instructions executed by the processor 501, the instructions are executed by at least one processor 501 to enable the at least one processor 501 to execute the account management method in the blockchain network as in any one of the first to third embodiments, or The account verification method in the blockchain network as the fourth embodiment can be performed.
其中,存储器502和处理器501采用总线方式连接,总线可以包括任意数量的互联的总线和桥,总线将一个或多个处理器501和存储器502的各种电路连接在一起。总线还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路连接在一起,这些都是本领域所公知的,因此,本文不再对其进行进一步描述。总线接口在总线和收发机之间提供接口。收发机可以是一个元件,也可以是多个元件,比如多个接收器和发送器,提供用于在传输介质上与各种其他装置通信的单元。经处理器501处理的数据通过天线在无线介质上进行传输,进一步,天线还接收数据并将数据传送给处理器501。The memory 502 and the processor 501 are connected by a bus, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors 501 and various circuits of the memory 502 together. The bus may also connect together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and therefore will not be described further herein. The bus interface provides the interface between the bus and the transceiver. A transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing a means for communicating with various other devices over a transmission medium. The data processed by the processor 501 is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 501 .
处理器501负责管理总线和通常的处理,还可以提供各种功能,包括定时,外围接口,电压调节、电源管理以及其他控制功能。而存储器502可以被用于存储处理器501在执行操作时所使用的数据。Processor 501 is responsible for managing the bus and general processing, and may also provide various functions including timing, peripheral interface, voltage regulation, power management, and other control functions. The memory 502 may be used to store data used by the processor 501 in performing operations.
即,本领域技术人员可以理解,实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。That is, those skilled in the art can understand that all or part of the steps in the method of implementing the above embodiments can be completed by instructing relevant hardware through a program, and the program is stored in a storage medium and includes several instructions to make a device ( It may be a single chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, removable hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes.
本领域的普通技术人员可以理解,上述各实施方式是实现本发明的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本发明的精神和范围。Those skilled in the art can understand that the above-mentioned embodiments are specific examples for realizing the present invention, and in practical applications, various changes in form and details can be made without departing from the spirit and the spirit of the present invention. scope.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910191172.4A CN110070363B (en) | 2019-03-13 | 2019-03-13 | Account management method, verification method and terminal device in blockchain network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910191172.4A CN110070363B (en) | 2019-03-13 | 2019-03-13 | Account management method, verification method and terminal device in blockchain network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110070363A true CN110070363A (en) | 2019-07-30 |
CN110070363B CN110070363B (en) | 2021-08-06 |
Family
ID=67366307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910191172.4A Active CN110070363B (en) | 2019-03-13 | 2019-03-13 | Account management method, verification method and terminal device in blockchain network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110070363B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110912702A (en) * | 2019-10-25 | 2020-03-24 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on hidden social relationship |
CN111461721A (en) * | 2020-04-16 | 2020-07-28 | 北京俩撇科技有限公司 | Block chain-based method and device for protecting account and verifying transaction |
CN111476572A (en) * | 2020-04-09 | 2020-07-31 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111639923A (en) * | 2020-05-07 | 2020-09-08 | 杭州云象网络技术有限公司 | Digital currency transaction accounting method and system based on zero knowledge proof |
CN111861475A (en) * | 2020-08-04 | 2020-10-30 | 上海信联信息发展股份有限公司 | Transaction recovery method and device for digital assets and electronic equipment |
US11676141B2 (en) | 2020-04-02 | 2023-06-13 | Baidu International Technology (Shenzen) Co., Ltd. | Block chain-based asset processing method, device, apparatus and storage medium |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1647089A (en) * | 2002-03-04 | 2005-07-27 | 创作在线技术有限公司 | Electronic transfer system |
CN101000673A (en) * | 2006-01-13 | 2007-07-18 | 蒋利 | Confirmation system and method for user transaction password |
CN101286256A (en) * | 2008-05-01 | 2008-10-15 | 包国文 | Self-help bank card theftproof system and its data processing method |
CN101299254A (en) * | 2008-06-16 | 2008-11-05 | 李丽丽 | Payment system and payment method thereof |
CN101651675A (en) * | 2009-08-27 | 2010-02-17 | 北京飞天诚信科技有限公司 | Method and system for enhancing security of network transactions |
CN101777158A (en) * | 2010-01-13 | 2010-07-14 | 北京飞天诚信科技有限公司 | Method and system for secure transaction |
CN102096880A (en) * | 2011-01-27 | 2011-06-15 | 深圳市农产品股份有限公司 | Electronic settlement transaction background management system and settlement methods |
CN103944730A (en) * | 2014-04-25 | 2014-07-23 | 天地融科技股份有限公司 | Data security interactive system |
CN107066893A (en) * | 2017-02-28 | 2017-08-18 | 腾讯科技(深圳)有限公司 | The treating method and apparatus of accounts information in block chain |
CN107609876A (en) * | 2017-08-18 | 2018-01-19 | 北京云知科技有限公司 | A kind of method and system for recovering block chain assets |
CN108292376A (en) * | 2015-12-15 | 2018-07-17 | 万事达卡国际公司 | The system for carrying out crossed card certification using purse transaction certification history |
CN108512661A (en) * | 2018-04-02 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of safety protecting method of block chain private key for user |
CN108764907A (en) * | 2018-05-30 | 2018-11-06 | 招商银行股份有限公司 | Assets method for retrieving, system and computer readable storage medium |
CN108876332A (en) * | 2018-06-04 | 2018-11-23 | 清华大学 | A kind of block chain method for secure transactions and device based on biological characteristic label certification |
CN109246208A (en) * | 2018-08-29 | 2019-01-18 | 杭州秘猿科技有限公司 | A kind of decentralization application account restoration methods, apparatus and system |
CN109345259A (en) * | 2018-09-29 | 2019-02-15 | 腾讯科技(深圳)有限公司 | Virtual resource transfer method, device, medium and electronic equipment based on block chain |
-
2019
- 2019-03-13 CN CN201910191172.4A patent/CN110070363B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1647089A (en) * | 2002-03-04 | 2005-07-27 | 创作在线技术有限公司 | Electronic transfer system |
CN101000673A (en) * | 2006-01-13 | 2007-07-18 | 蒋利 | Confirmation system and method for user transaction password |
CN101286256A (en) * | 2008-05-01 | 2008-10-15 | 包国文 | Self-help bank card theftproof system and its data processing method |
CN101299254A (en) * | 2008-06-16 | 2008-11-05 | 李丽丽 | Payment system and payment method thereof |
CN101651675A (en) * | 2009-08-27 | 2010-02-17 | 北京飞天诚信科技有限公司 | Method and system for enhancing security of network transactions |
CN101777158A (en) * | 2010-01-13 | 2010-07-14 | 北京飞天诚信科技有限公司 | Method and system for secure transaction |
CN102096880A (en) * | 2011-01-27 | 2011-06-15 | 深圳市农产品股份有限公司 | Electronic settlement transaction background management system and settlement methods |
CN103944730A (en) * | 2014-04-25 | 2014-07-23 | 天地融科技股份有限公司 | Data security interactive system |
CN108292376A (en) * | 2015-12-15 | 2018-07-17 | 万事达卡国际公司 | The system for carrying out crossed card certification using purse transaction certification history |
CN107066893A (en) * | 2017-02-28 | 2017-08-18 | 腾讯科技(深圳)有限公司 | The treating method and apparatus of accounts information in block chain |
CN107609876A (en) * | 2017-08-18 | 2018-01-19 | 北京云知科技有限公司 | A kind of method and system for recovering block chain assets |
CN108512661A (en) * | 2018-04-02 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of safety protecting method of block chain private key for user |
CN108764907A (en) * | 2018-05-30 | 2018-11-06 | 招商银行股份有限公司 | Assets method for retrieving, system and computer readable storage medium |
CN108876332A (en) * | 2018-06-04 | 2018-11-23 | 清华大学 | A kind of block chain method for secure transactions and device based on biological characteristic label certification |
CN109246208A (en) * | 2018-08-29 | 2019-01-18 | 杭州秘猿科技有限公司 | A kind of decentralization application account restoration methods, apparatus and system |
CN109345259A (en) * | 2018-09-29 | 2019-02-15 | 腾讯科技(深圳)有限公司 | Virtual resource transfer method, device, medium and electronic equipment based on block chain |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110912702A (en) * | 2019-10-25 | 2020-03-24 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on hidden social relationship |
CN110912702B (en) * | 2019-10-25 | 2022-05-10 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on hidden social relationship |
US11676141B2 (en) | 2020-04-02 | 2023-06-13 | Baidu International Technology (Shenzen) Co., Ltd. | Block chain-based asset processing method, device, apparatus and storage medium |
CN111476572A (en) * | 2020-04-09 | 2020-07-31 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111476572B (en) * | 2020-04-09 | 2024-03-19 | 财付通支付科技有限公司 | Block chain-based data processing method, device, storage medium and equipment |
CN111461721A (en) * | 2020-04-16 | 2020-07-28 | 北京俩撇科技有限公司 | Block chain-based method and device for protecting account and verifying transaction |
CN111639923A (en) * | 2020-05-07 | 2020-09-08 | 杭州云象网络技术有限公司 | Digital currency transaction accounting method and system based on zero knowledge proof |
CN111639923B (en) * | 2020-05-07 | 2023-09-29 | 杭州云象网络技术有限公司 | Digital currency transaction accounting method and system based on zero knowledge proof |
CN111861475A (en) * | 2020-08-04 | 2020-10-30 | 上海信联信息发展股份有限公司 | Transaction recovery method and device for digital assets and electronic equipment |
CN111861475B (en) * | 2020-08-04 | 2024-09-24 | 上海信联信息发展股份有限公司 | Transaction recovery method and device for digital asset and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110070363B (en) | 2021-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11877213B2 (en) | Methods and systems for asset obfuscation | |
US12021998B2 (en) | Hash-based data verification system | |
US11856104B2 (en) | Methods for secure credential provisioning | |
US11949791B2 (en) | Hash contract generation and verification system | |
EP3607728B1 (en) | Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain | |
CN110383757B (en) | System and method for secure processing of electronic identities | |
US10318932B2 (en) | Payment card processing system with structure preserving encryption | |
KR101999188B1 (en) | Secure personal devices using elliptic curve cryptography for secret sharing | |
CN110070363B (en) | Account management method, verification method and terminal device in blockchain network | |
CN103370688B (en) | A system and method for generating multi-factor personalized server strong keys from simple user passwords | |
JP2020522205A (en) | Progressive key encryption algorithm | |
CN114553439A (en) | Encryption key management based on identity information | |
CN115203749B (en) | Data transaction method and system based on block chain | |
US11436351B1 (en) | Homomorphic encryption of secure data | |
CN110999254A (en) | Securely performing cryptographic operations | |
CN108199847A (en) | Security processing method, computer equipment and storage medium | |
CN117350715B (en) | Payment method, account configuration method, system, device, equipment and medium | |
US7979712B2 (en) | Network system, server and information terminal for list matching | |
CN115361147A (en) | Device registration method and device, computer device and storage medium | |
TWI669672B (en) | Electronic trading method and system | |
CN115587811A (en) | Digital signature verification method and device | |
AU2018282255A1 (en) | System and method for secure transmission of data and data authentication | |
CN110089074A (en) | Transceiving system, transmitting device, receiving device, method, computer program | |
KR20180089951A (en) | Method and system for processing transaction of electronic cash | |
WO2024148239A1 (en) | System and method for parallel manufacture and verification of one-time-password authentication cards |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |