Block chain authorization calculation control method
A control method and blockchain technology, applied in the field of blockchain authorized computing control, can solve problems such as process inability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0008] The technical solutions of the present invention will be further described below in combination with specific embodiments. The technical solution of the present invention is a method for constructing private transactions on the chain. The process is as follows: Step 1. In the energy chain block chain, a private key is generated through a randomly generated 256-bit 0, 1 character string, and a private key is generated in the energy chain area. The format of the block chain storage private key file stores the private key in the file. The user calculates the private key through the format of the storage private key file and the symmetric encryption password, stores the private key file to record the symmetric encryption algorithm, and the symmetric encrypted key Wen; Step 2, start the encrypted transmission of private key authorized use, and escrow the user's private key in the instruction set extension, and then go to Step 4; Step 3, in a specific surrounded container, sta...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com