Block chain-based interaction log encryption, transfer, anti-theft method and device

An encryption method and blockchain technology, applied in the field of anti-theft, blockchain-based interaction log encryption, and retrieval, can solve problems such as interaction log theft, and achieve the effect of improving security

Active Publication Date: 2022-05-17
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current interaction log still has a certain risk of being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based interaction log encryption, transfer, anti-theft method and device
  • Block chain-based interaction log encryption, transfer, anti-theft method and device
  • Block chain-based interaction log encryption, transfer, anti-theft method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0106] The background technology of this application is an invention based on the blockchain, but it should be understood that even if it is separated from the blockchain, this application can also be implemented, that is, this application can also be extended to a conventional network without being subject to Blockchain network structure limitations.

[0107] An embodiment of the present application provides a system for encrypting and decrypting an interacti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application provides a block chain-based interaction log encryption, transfer, and anti-theft method and device. First, the biometric information is split at the terminal to obtain the corresponding components (the reference feature component when registering, and the component when using it). feature components), and then encrypt each component using at least one specific encryption method, the encryption method of each component is independent, and then upload the encrypted component to the device, and then decrypt it on the device to obtain the split components, Then use the split components to decrypt or match, and then realize the retrieval of the interaction log. On the one hand, the split method cannot be stolen, and on the other hand, each component is encrypted, and the component is used as a key to protect the transaction data. Greatly improved the security of the interaction log.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, and more specifically, to a blockchain-based interaction log encryption, retrieval, and anti-theft method and device. Background technique [0002] Identity authentication is an effective solution to the process of confirming the operator's identity in a computer network. Biometrics prove your identity based on unique identification characteristics. Biometrics is a comprehensive application or solution for identification, intelligent perception, etc. through the collection and analysis of the inherent physiological or behavioral characteristics of the human body, combined with various high-tech means. Since users do not need to remember passwords and carry media, it is easy to use and is more and more widely used in financial business scenarios such as account opening and payment. Among them, face recognition technology is widely used due to its non-invasive, non-inducti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04G06Q20/40G06Q20/38G06F21/60
CPCG06Q40/04G06Q20/3829G06Q20/40145G06Q20/389G06F21/602
Inventor 岑健明夏韵李狄威周颖
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products