为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链忘记密码,区块链登录账号

发布时间:2023-12-07-08:04:00 来源:网络 比特币基础 区块   密码   用户

区块链忘记密码,区块链登录账号

区块链忘记密码是一个普遍存在的问题,它可能会导致你无法登录账号,而且恢复密码也不是一件容易的事情。为了解决这个问题,我们要学习关于区块链忘记密码、区块链登录账号、备份助记词等三个相关关键词的知识。

区块链忘记密码是区块链账户登录时最常见的问题,它可能会导致你无法登录账号,而且恢复密码也不是一件容易的事情。在使用区块链账户时,最重要的一点是要记住自己的密码,并定期备份,以免忘记密码时出现问题。当然,如果你确实忘记了自己的密码,也可以尝试使用一些第三方工具来恢复你的密码,但是这样做往往会有安全风险,因此要慎重考虑。

区块链登录账号是使用区块链账户的前提,在使用区块链账户之前,需要先进行登录操作,以便能够进行后续的操作。登录区块链账户需要用户输入自己的用户名和密码,如果没有账户,则需要先去注册一个账户,然后再进行登录操作。登录过程中,如果忘记了密码,可以通过一些第三方工具来恢复密码,但是这样做往往会有安全风险,因此要慎重考虑。

备份助记词是一种常用的安全备份方式,它可以帮助用户备份自己的账户信息,以防止忘记密码时出现问题。备份助记词是一串由多个单词组成的字符串,每个单词都有特殊的含义,可以用来恢复账户信息。在使用区块链账户时,建议用户将备份助记词备份到安全的地方,以防止忘记密码时出现问题。

总之,区块链忘记密码、区块链登录账号、备份助记词都是区块链账户使用中的重要知识,我们一定要记住自己的密码,并定期备份,以免忘记密码时出现问题。
请查看相关英文文档

1. Hello teacher! I forgot my blockchain password, how can I get it back?

Send an email to his email.
You can ask them to send you all wallets created with that address. Links to the service are in the guide, along with all the upcoming services and software tools you need to download.
If you don't remember the email, there are several other options for recovering an encrypted wallet. Encrypted backups can be downloaded using btcrecovery, an open source Bitcoin wallet password and seed recovery tool. In order to do this, you need to install some python libraries and be somewhat familiar with the command prompt, since it does not have a graphical user interface. If you have a backup of wallet.aes.json and don't remember the wallet ID, you can import the wallet into a new wallet.

2. How to obtain the blockchain key file

1. A method for retrieving the blockchain system key, which is characterized by including the following steps: Step 1. Create the original key pair; Step 2. Calculate the business key pair based on the original key pair; Step 3. Calculate the address and account based on the business key pair; Step 4. When the business key is lost, perform Step 2. 2. According to the rights The method for retrieving a blockchain system key according to claim 1, characterized in that the original key pair includes an original private key and an original public key. 3. The method for retrieving the blockchain system key according to claim 2, characterized in that in step 1, creating an original key pair includes the following steps: Step 11. Generate an original seed using a random number. ; Step 12: Generate an original key pair from the original seed through an asymmetric encryption algorithm. The original key pair includes an original private key and an original public key. 4. The blockchain system key retrieval method according to claim 1, characterized in that in step 2, the business key pair includes a business private key and a business public key. 5. The method for retrieving the blockchain system key according to claim 4, characterized in that in step 2, specifically, a business seed is generated according to the seed production data, and a business key is generated according to the business seed. Yes, it specifically includes the following steps: Step 21, use the original private key as the encryption key, perform a seed generation operation on the seed production data, and obtain a unique ciphertext as the business seed; Step 22, use the business seed The non-pair encryption algorithm generates a business key pair, which includes a business private key and a business public key. 6. The blockchain system key retrieval method according to claim 5, characterized in that in step 21, the seed production data includes the original public key or any other selected data. 7. The method for retrieving the blockchain system key according to claim 5, characterized in that in the step 21, the seed generation operation includes an hmac encryption algorithm operation, a salted hash encryption algorithm operation, Symmetric encryption algorithm operation or asymmetric encryption algorithm operation. 8. The method for retrieving the blockchain system key according to claim 3 or 5, characterized in that the asymmetric encryption algorithm includes any one of rsa algorithm, ecc algorithm, ecdsa algorithm, sm2 algorithm and sm9 algorithm. 9. The method for retrieving the blockchain system key according to claim 5, characterized in that if the unique ciphertext is not a hash value, then a hash operation is performed on the ciphertext to obtain The hash value of the ciphertext is used as the service seed; if the ciphertext is a hash value, it can be directly used as the service seed, or the hash operation can be performed again or multiple times, and the obtained hash value is used as the service seed. 10. The method for retrieving the blockchain system key according to claim 7, characterized in that the symmetric encryption algorithm includes des algorithm, 3des algorithm, rc2 algorithm, rc4 algorithm, rc5 algorithm, aes algorithm, Any one of the sm1 algorithm, sm4 algorithm, sm7 algorithm and zuc algorithm.

3. What to do if the blockchain file does not match the password?

If the blockchain file does not match the password, you can change the password. Because blockchain files are equipped with corresponding passwords, if the passwords do not match, the password is incorrect and the password can be changed by submitting relevant personal information. So if the blockchain file does not match the password, the password can be changed.

4. What is the meaning of wallet account in blockchain exchange?

Digital wallet is a tool for storing, managing and using digital currencies, and plays a decisive role in the field of blockchain. . It is a software program or hardware device that stores cryptocurrency. In form, it is similar to an online bank account, which also has a customer ID, account number, and password. The password of the digital wallet is the "private key". Only through it can the wallet be opened and operated. Digital wallets have "receipt" and "transfer" functions, just like depositing and withdrawing money with a bank card. You need a card number and password to make normal deposits and safe withdrawals. A digital wallet does not store money, but your Bitcoin, Ethereum and other digital currencies or digital asset information.
The application fields of blockchain include digital currency, certificates, finance, anti-counterfeiting and traceability, privacy protection, supply chain, entertainment, etc. With the popularity of blockchain and Bitcoin, many related top domain names have been registered. , which has had a relatively large impact on the domain name industry.

5. How to enter Yunnan Blockchain Merchant via computer

1. Enter the Yunnan Blockchain Merchant Platform, register immediately and fill in the registration information (note: the initial password confirmation password is all registration You can ask the registrant for settings, and the registration code does not need to be filled in).
2. Check I have carefully read and agreed to the agreement, click Register, return to the home page and enter your password to log in.

6. The cryptography technology of blockchain includes

Cryptozoology technology is the core of blockchain technology. The cryptographic technology of blockchain includes digital signature algorithm and hash algorithm.
Digital Signature Algorithm
Digital signature algorithm is a subset of the digital signature standard, representing a specific public key algorithm used only for digital signatures. The key is run on the message generated by SHA-1Hashing: To verify a signature, the hash of the message is recalculated, the signature is decrypted using the public key and the results are compared. The abbreviation is DSA.

Digital signature is a special form of electronic signature. So far, at least more than 20 countries have passed laws recognizing electronic signatures, including the European Union and the United States. my country's electronic signature law was adopted at the 11th meeting of the Standing Committee of the 10th National People's Congress on August 28, 2004. . A digital signature is defined in the ISO 7498-2 standard as: “Some data appended to a data unit, or a cryptographic transformation made to the data unit, which allows the recipient of the data unit to confirm the source and origin of the data unit. The integrity of the data unit and protects the data from forgery by a person (e.g. the recipient)”. The digital signature mechanism provides an identification method to solve problems such as forgery, denial, impersonation and tampering. It uses data encryption technology and data transformation technology to enable both parties to send and receive data to meet two conditions: the receiver can identify what the sender claims. Identity; the sender cannot later deny that it sent the data.
Digital signature is an important branch of cryptography theory. It is proposed to sign electronic documents to replace handwritten signatures on traditional paper documents, so it must have 5 characteristics.
(1) The signature is credible.
(2) The signature cannot be forged.
(3) Signatures are not reusable.
(4) Signed documents are immutable.
(5) The signature is non-repudiation.
Hash algorithm
Hash is to convert an input of any length (also called pre-mapping, pre-image) into a fixed-length output through a hash algorithm, and the output is a hash value. This transformation is a compressed mapping in which the space of hash values ​​is usually much smaller than the space of inputs. Different inputs may hash to the same output, but the input values ​​cannot be deduced in reverse. Simply put, it is a function that compresses a message of any length into a message digest of a fixed length.
Hash algorithm is a one-way cryptographic system, that is, it is an irreversible mapping from plaintext to ciphertext, with only encryption process and no decryption process. At the same time, the hash function can change an input of any length to obtain a fixed-length output. The one-way characteristics of the hash function and the fixed length of the output data allow it to generate messages or data.
Represented by the Bitcoin blockchain, secondary hashing is used many times in the workload proof and key encoding process, such as SHA (SHA256(k)) or RIPEMD160 (SHA256(K)). This The advantage of this method is that it increases the workload or increases the difficulty of cracking if the protocol is not clear.
Represented by the Bitcoin blockchain, there are two main hash functions usedThe numbers are:
1.SHA-256, mainly used to complete PoW (proof of work) calculations;
2.RIPEMD160, mainly used to generate Bitcoin addresses. As shown in Figure 1 below, the process of generating an address from a public key for Bitcoin.

7. What is the blockchain cryptographic algorithm?

As an emerging technology, blockchain has received more and more widespread attention. It is a new transformation of traditional technology in the Internet era. Applications, including distributed data storage technology, consensus mechanisms and cryptography, etc. With the creation of various blockchain research alliances, related research has received more and more funding and personnel support. Hash algorithm, zero-knowledge proof, ring signature and other cryptographic algorithms used in the blockchain:

Hash algorithm

Hash algorithm is the basic technology of the blockchain. The essence of the Hash function is to A set of data of arbitrary length (finite) is mapped into a set of data streams of defined length. If this function satisfies both:

(1) The calculation of the Hash value of any input set of data is very simple;

(2) Think It is computationally difficult to find 2 different data with the same hash value.

Hash functions that satisfy the above two properties are also called cryptographic Hash functions. Unless there is any contradiction, the Hash function usually refers to the cryptographic Hash function. For the Hash function, finding such a value is called a collision. Currently popular Hash functions include MD5, SHA1, SHA2, and SHA3.

Bitcoin uses SHA256, and most blockchain systems use the SHA256 algorithm. So here we will introduce SHA256 first.

1. SHA256 algorithm steps

STEP1: Add padding bits. The message is padded so that the message length is congruent with 448 mod 512 (length = 448 mod 512). The number of padding bits ranges from 1 to 512. The highest bit of the padding bit string is 1 and the remaining bits are 0.

STEP2: Additional length value. Append the bit length of the initial message (before padding) expressed in 64-bit to the result of step 1 (low-order byte first).

STEP3: Initialize the cache. Use a 256-bit cache to store the intermediate and final results of the hash function.

STEP4: Process 512-bit (16 words) message packet sequence. The algorithm uses six basic logic functions and consists of 64 steps of iterative operations. Each step takes a 256-bit cache value as input and then updates the cache content. Each step uses a 32-bit constant value Kt and a 32-bit Wt. Where Wt is the message after grouping, t=1,2,...,16.

STEP5: After all 512-bit packets are processed, the output generated by the last packet of the SHA256 algorithm is a 256-bit message.

2. Ring signature

In 2001, three cryptographers, Rivest, Shamir and Tauman, proposed the ring signature for the first time. It is a simplified group signature, with only ring members and no managers, and does not require cooperation among ring members. In the ring signature scheme, the signer first selects a temporary set of signers, which includes the signer. The signer can then use his own private key and the public keys of others in the signature set to generate signatures independently without the help of others. Members of a set of signers may not be aware that they are included.

The ring signature scheme consists of the following parts:

(1) Key generation. Generate a key pair (public key PKi, private key SKi) for each member in the ring.

(2) Signature. The signer uses his own private key and the public keys of any n ring members (including himself) to generate signature a for message m.

(3) Signature verification. The verifier verifies whether the signature is signed by a member of the ring based on the ring signature and message m. If it is valid, it will be accepted, otherwise it will be discarded.

The properties that ring signatures satisfy:

(1) Unconditional anonymity: The attacker cannot determine which member of the ring generated the signature, even after obtaining the ring member’s private In the case of key, the probability does not exceed 1/n.

(2) Correctness: The signature must be verified by all others.

(3) Unforgeability: Other members in the ring cannot forge the signature of the real signer. Even if an external attacker obtains a valid ring signature, he cannot forge a signature for message m.

3. Comparison between ring signature and group signature

(1) Anonymity. It is a system in which individuals sign on behalf of a group. The verifier can verify that the signature is signed by a member of the group, but cannot know which member, so as to achieve the anonymity of the signer.

(2) Traceability. In group signatures, the existence of the group administrator ensures the traceability of the signature. Group administrators can revoke signatures to reveal the true signer. The ring signature itself cannot reveal the signer unless the signer himself wants to reveal or add additional information to the signature. A verifiable ring signature scheme is proposed. In the scheme, the real signer hopes that the verifier knows his identity. At this time, the real signer can verify his identity by revealing the secret information he possesses.

(3) Management system. Group signatures are managed by the group administrator, while ring signatures do not need to be managed. The signer only has to select a possible set of signers, obtain its public key, and then publish the set. All members are equal.wait.

The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only approved "Smart Learning Factory 2020- Xueshuo Innovation Workstation" launched by the School Planning and Construction Development Center of the Ministry of Education of China. "Blockchain Technology Professional" pilot workstation. The professional position is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.

8. Hot! Create and play with your own blockchain in 5 minutes


Blockchain is developing so fast this year! From an unfamiliar concept at the beginning, it has now taken off in various industries. A single spark has the potential to start a prairie fire. I really hope I can have my own blockchain to practice with! But how can one person and one computer set up a blockchain environment? The blockchain is so popular that it is not easy to say that I love you!


Don’t Worry! The editor has been addicted to blockchain and smart contracts and can’t extricate himself! Now I will take you step by step to start from scratch and create your own blockchain in 5 minutes! ~
The SuperVessel platform developed by IBM China Research Institute provides a blockchain development and testing environment for blockchain enthusiasts and developers. Through this platform, users can create multi-node blockchains based on Hyperledger Fabric for free and super quickly, and play with smart contracts on their own chains.
----
0.
Preparation
All you need is your local browser!
1. Register an account
Access the public beta address of SuperVessel blockchain service: 8800/bc.
Click the Log in button in the upper right corner, click Register in the pop-up window, fill in your email and password and submit. At this time, it is recommended to check the activation email in your mailbox and activate your account (Editor's tip: It doesn't matter if you activate lazily, but some advanced services must be activated before they can be used).
2.
Quickly create your own blockchain
After registration is completed, return to the homepage and click on the huge GIVE ME A BLOCKCHAIN ​​(Give me a blockchain!) button. Select the Consensus Plugin (consensus plug-in) and Size (number of blockchain network nodes) you want in the pop-up box.
Editor's note: Currently there are two consensus plug-ins officially provided by Hyperledger Fabric: noops and pbft.
After clicking Submit, you will get your own blockchain in a few seconds and automatically enter the monitoring panel. That’s right, getting your own blockchain is that simple!
After entering the monitoring panel, you can see that on the left is the smart contract managementManagement panel, including the management and deployment of smart contracts; on the right is the network panel, which displays the applied blockchain network situation, topology, delay information between nodes, etc. at a glance; click the telescope icon in the upper right corner to monitor in real time Log information of each node. The bottom is the blockchain panel, which shows the overall situation of the current blockchain. In the initial state, there is only one block.
3. Deploy and use smart contracts
Next, the editor will teach you how to deploy and use smart contracts on your own blockchain.
Under the Smart Contracts tab of the smart contract management panel, 2 smart contracts are listed as examples, namely map and chaincode_example02. The map contract can store key-value pairs, and the chaincode_example02 contract can simulate transfers and queries between two people.
Editor's note: The codes for these two sample contracts can be found in the Hyperledger Fabric source code.
Take the deployment and use of the chaincode_example02 contract as an example:
Deploy the contract
Click the Deploy button corresponding to the chaincode_example02 contract, and fill in the initialization value of the contract, including the contract name, initial function, and initial parameters. The initial function of the contract is init, and the initial parameters need to be filled in according to the format, such as ["a", "100", "b", "200"], which means registering two people a and b, giving them 100 units and 200 units respectively.
Click the Deploy button and the contract will be deployed in your blockchain. The process will take about 20 to 40 seconds. When a new block appears on the blockchain panel, it usually means that the contract has been deployed.
Call the contract
After the deployment is completed, view the deployed contract instance under the My Deployment tab of the smart contract management panel.
Click the Invoke button below the Action to call the smart contract, and fill in the called method name and corresponding parameters (the method names and parameters of different contracts have different meanings, which are related to the content of the contract). For this contract, call the invoke method name and fill in the parameters ["a", "b", "50"], which means a transfers 50 units to b.
After clicking Submit to complete the call, you can view the blockchain situation and a new block will be generated.


Query Contract
After the call is completed, you can query the contract execution results. Still under the My Deployment tab, click the Query button under Action to query the smart contract, and fill in the query method name and corresponding parameters. If you select the query method name and fill in the parameter ["a"], it means querying the current unit of a.
After clicking Submit, you can see that the current unit of a is 50. You can try query b again!
OK, then you can continue to operate the contract, observe the blockchain situation, or deploy a new smart contract, such as map, on the blockchain. For ease of use, the method names and parameter formats for deploying, calling, and querying contracts are all filled in by default. You only need to select a method name and change the parameters as you like! See how long you can play with the chain~
4. Upload and test your own private smart contract
In addition to the two public smart contracts currently provided, you can also upload and test your own private contract! Private contracts can only be seen by you.
Click Import private smart contract under the Smart Contracts tab.
After filling in the contract name and description, and uploading the contract code file, click Import to complete the upload.
Then the contract I uploaded will appear in the Smart Contracts list and can be deployed, called and queried as before.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37388 文章总数
  • 3637277访问次数
  • 3079建站天数