CN108009810A - A kind of Trusted Digital transaction in assets method - Google Patents
A kind of Trusted Digital transaction in assets method Download PDFInfo
- Publication number
- CN108009810A CN108009810A CN201711443940.8A CN201711443940A CN108009810A CN 108009810 A CN108009810 A CN 108009810A CN 201711443940 A CN201711443940 A CN 201711443940A CN 108009810 A CN108009810 A CN 108009810A
- Authority
- CN
- China
- Prior art keywords
- transaction
- exchange
- signature
- user
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9024—Graphs; Linked lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
The present invention is a kind of Trusted Digital transaction in assets method, including 1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;2)Exchange's verification transaction request signature, handles transaction request;3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;4)Mutually card signature blocks return to the signature per transaction to exchange;5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;7)Mutually card signature blocks return to the block elevation information where the stored record corresponding to trading signature.Trusted Digital transaction in assets infrastructure of the present invention can meet billions of transactions demand per second, the risk of account book data is obtained after having prevented explosion Encryption Algorithm, overcome the intrinsic problem such as insider trading existing for centralization exchange, it is therefore prevented that customer transaction request is distorted by third party.
Description
Technical field
The present invention relates to internet information alternating-current technique, more particularly, to one it is based on block chain, multicenter, can
Across digital asset method of commerce merchandised, believable.
Background technology
Term is explained:
Block chain
Block chain is a kind of recording technique of decentralization, any number of nodes in participation system, in a period of time system
The data of full detail exchange, recorded a block, while the fingerprint for generating the block is used for chain by the method for cryptography
Connect next area's block sum check.All nodes that participate in of system assert record and verification jointly, it is common assert record whether be it is true, together
When each node can replicate the copy for obtaining a complete documentation.Compared with traditional book keeping operation technology, its feature is as follows:
(1)The chain that system node is safeguarded jointly constantly increases, and is only possible to addition record, and the record occurred can not all be distorted;
(2)Decentralization, multicenter, can reach common understanding without the control of concentration in other words;
(3)Ensure that transaction can not be denied and destroyed by the mechanism of cryptography, and protect the privacy of user information and record;
In numerous block chain business applications, bit coin block platform chain its imitated by extensive infrastructure and powerful network
Should, it is considered at last as the bottom of block chain field standard.
Merkle trees
Merkle trees are a kind of Hash binary trees, it is a kind of data for being used as quick conclusion and verification large-scale data integrality
Structure.This binary tree includes cryptographic hash.Term " tree " is often used to description one kind in Computer Subject has branch
Data structure, but tree be usually squeezed display, " root " the top of figure at the same time " leaf " in the lower part of figure.
In bit coin network, Merkle trees are used to conclude area's All Activity in the block, while generate whole hand over
The digital finger-print easily gathered, and provide a kind of high effective way for verifying block and whether there is certain transaction.Generation one is complete
Merkle trees are needed recursively to Hash node to carrying out Hash, and newly-generated Hash node is inserted into Merkle trees,
Until only remaining a Hash node, which is exactly the root of Merkle trees.Used twice in the Merkle trees of bit coin
SHA256 algorithms, therefore its cryptographic hashing algorithm is also referred to as double-SHA256.
2017, digital encryption token market welcome blowout growth, according to the statistics of coinmarketcap.com,
Cut-off was to August in 2017 4 days, and Digital Radio encrypts token transactions currency type more than 1000 kinds, and total market capitalisation reaches 101,300,000,000 U.S. dollars, together
Whole world turnover is also up to 2,300,000,000 U.S. dollars when smaller than growth by 773%, only 24, but digital encryption token market is asked there is also following
Topic:
Transaction is highly concentrated in only a few exchange
Current exchange species is various, but Digital Radio encryption token transactions are but highly concentrated in the exchange of only a few.
When bit coin August 4 days 24 is small exemplified by the turnover of the whole world, nine exchanges such as Bitfinex carry 90% bit coin transaction
Volume.
Therefore, the trading processing speed of exchange, safety and reliability, which become, determines digital encryption token market development
Key factor.
The security incident of conventional transaction institute takes place frequently
Conventional transaction faces problems with:
(1)User's fund trustship does not have credible security
Exchange all uses similar pattern at this stage:Franc or token are supplemented with money the silver of exchange by user required by transaction
In row account or block chain address, then exchange carries out IOU book keeping operations in the private virtual Accounting system of oneself for user.With
Family real trade is these IOU.In order to which IOU is exchanged into franc or block chain token, user needs to carry to exchange
Now apply, after withdrawing deposit successfully, just calculate bona fide transaction and complete.In this process, exchange for user take care of assets ability and
Credit is the risk of user's maximum.
(2)Insider trading
Except facing the problem of trading volume, malicious operation coin valency are forged by exchange, user also needs to undertake exchange network operator business
Other risks that morals are brought, for example embezzle funds and cause to pay one's debts with all his assets.Due to the above problem, conventional transaction institute in recent years
Security incident takes place frequently, on the one hand the event occurred reflects missing of the block chain token transactions in every country Regulation Policy,
On the other hand it also demonstrate that the inherent risk of centralization exchange pattern.
The experience of decentralization transaction on exchange is poor, there are performance bottleneck
Open source community had had some trials that decentralization exchange is built based on block chain, such as auspicious ripple(Ripple), ratio
Special stock(BitShares), Openledger, Banchor etc., but exchange's generally existing of decentralization completely is following
Problem:
Trading experiencing is bad
It is simple to rely on design and adjustment common recognition algorithm, to improve the trading processing performance of block chain, it can not meet digital goods
The characteristic of coin transaction scale of construction explosive growth
Magnanimity transaction data stores, and causes block chain too fat to move, and block chain infrastructure is had to " bear a heavy burden and move ahead "
The business and personal data stored in block, faces the risk of privacy leakage at any time.
The content of the invention
The purpose of the present invention is to propose to one it is based on block chain, multicenter, can be across numeral merchandised, believable
Transaction in assets method.By establishing the digital asset transaction infrastructure of multicenter, multiple exchanges are transported in a manner of alliance
OK, realize that high speed low delay is merchandised.The present invention is by block chain, mutually card signature technology combines, and changes traditional block chain " transaction
Cochain deposits card and needs to be lined up " poorly efficient single thread mode, form a kind of new " multithreading " block chain infrastructure, support high
The rapidly and efficiently processing of concurrent transaction, deposit card and verification, greatly reduces large-scale parallel trading volume and mass memory pair
The pressure of block chain
In order to achieve the object of the present invention, following technical scheme is proposed:
A kind of Trusted Digital transaction in assets method, it is characterised in that the method includes the steps:
1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;
2)Exchange's verification transaction request signature, and transaction request is handled;
3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;
4)Mutually card signature blocks return to the signature per transaction to exchange;
5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;
6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;
7)Mutually card signature blocks return to the block elevation information where the stored record corresponding to trading signature.
2nd, according to the method described in claim 1, it is characterized in that, the step 1)Carrying out signature using private key has friendship
Easily ask for an autograph tamper-proof mechanisms, and the user in exchange stores its private key by digital wallet;Transmitted by user to transaction
Transaction request message is signed by private key, when transaction request received by transaction, verifies whether it is that user sends, and is prevented
Stop transaction request to be distorted by third party.
The step 2)It is to carry out following workflow by mutually demonstrate,proving signature blocks:
1) Hash:Hash is carried out to transaction data, the cryptographic Hash of generation represents the transaction in itself during follow-up;
2) it polymerize:The Hash tree formed in each cycle represents the All Activity of stage signature;
3) card is deposited:The root of the Hash tree formed in each cycle is published to block chain and carries out depositing card;
All Activity in cycle is carried out mutual signed certificate name by exchange's timing so that and All Activity can carry out depositing card and verification,
Transaction privacy is protected at the same time, reduces system pressure.
The step 5)The transaction trusted voucher for the cryptographic Hash of each transaction, all existence anduniquess correspond to therewith
" hash chain ", it comprises a series of cryptographic Hash and its meter needed for constructing Hash root vertex as transaction Hash value node
Calculate path;The trusted voucher that mutually return of card signature blocks is each merchandised is transferred to transaction platform and user terminal is deposited jointly
Storage;Hash chain, the encryption certificate for time of signing, transaction cryptographic Hash submitter's identity are contained in trusted voucher, user is merchandising
In every transaction can obtain trusted voucher, the credibility of transaction can be verified in infrastructure by voucher.
The effect of the present invention:
1)Due to the born single thread of block chain, its maximum challenge is scalability --- expanded with O (n) scales complexity
Exhibition, it is meant that its complexity can be with number of transaction linear increase.In contrast, by being breathed out to the All Activity in the cycle
Uncommon signature and polymerization, the block chain infrastructure based on mutual signed certificate name will extend in O (t) complexities --- linearly over time
Increase, and independently of number of transaction so that Trusted Digital transaction in assets infrastructure can meet billions of transaction need per second
Ask;
2)Trusted Digital transaction in assets infrastructure is by mutually demonstrate,proving signature technology, by exchange's submission to owning in each cycle
Transaction hash signature and polymerize, the root finally produced is published to block chain and carries out depositing card, with traditional decentralization transaction
Compared, and the source data of transaction need not be preserved, the size of the block for block chain of not only having abridged, has also prevented explosion encryption
The risk of account book data is obtained after algorithm;
3)Based on Trusted Digital transaction in assets infrastructure, every transaction of the user in exchange can obtain trusted voucher,
The credibility of transaction can be verified in infrastructure by voucher, it is intrinsic to overcome insider trading etc. existing for centralization exchange
Problem;
4)Compared to the exchange of conventional center, the exchange user on Trusted Digital transaction in assets infrastructure is submitting
During transaction request, transaction request information can be signed by private key for user, it is therefore prevented that customer transaction request is distorted by third party.
Brief description of the drawings
Fig. 1 Hash tree polymerization process examples;
Fig. 2 is the mutual card signature framework of the present invention;
Fig. 3 is the Trusted Digital transaction in assets infrastructure overall workflow of the present invention.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with the drawings and specific embodiments,
The present invention is described in more detail.
(One)Mutually card signature blocks
Mutually card signature blocks use Hash tree(Merkle trees)Polymerization technique, any one data submitted in system can
" tracing to its source ".As shown in Figure 1, user sends the cryptographic Hash of a transaction, it is assumed that it is X1, all requests quilt received
A Hash tree is polymerized to, returns to the fullpath then contained in the signature of user from leaf node to root node.In order to
Prove X3Integrality, it is necessary to utilize X4 、X12And X58Root cryptographic Hash is regenerated, to prove that X3 take part in the life of root node
Into.
Trusted voucher
It is in this way, corresponding " hash chain " for the cryptographic Hash of each transaction, all existence anduniquess(Sign):Contain by
Transaction Hash value node constructs a series of cryptographic Hash needed for Hash root vertex and its calculates path.Mutually card signature blocks are returned
Return that the trusted voucher each merchandised is transferred to transaction platform and user terminal is stored jointly.Hash is contained in trusted voucher
Chain, the encryption certificate for time of signing, transaction cryptographic Hash submitter's identity.
Mutually card signature framework
By using Hash tree polymerization technique, quick conclusion and verification of the signature blocks completion to extensive transaction data are mutually demonstrate,proved,
Any one transaction submitted to mutual card signature blocks " can trace to its source ".
As shown in Fig. 2, mutually the workflow of card signature blocks is divided into three steps:Hash, polymerization and issue
1) Hash:Hash is carried out to transaction data, the cryptographic Hash of generation represents the transaction in itself during follow-up;
2) it polymerize:The Hash tree formed in each cycle represents the All Activity of stage signature.
3) card is deposited:The root of the Hash tree formed in each cycle is published to block chain and carries out depositing card.
Exchange's timing(Such as once per second)All Activity in cycle is subjected to mutual signed certificate name so that All Activity can carry out
Card and verification are deposited, while protects transaction privacy, reduces system pressure.
(Two)Trusted Digital transaction in assets infrastructure overall workflow
Trusted Digital transaction in assets infrastructure overall workflow is as shown in Figure 3:
1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;
2)Exchange's verification transaction request signature, and transaction request is handled;
3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;
4)Mutually card signature blocks return to the signature per transaction to exchange;
5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;
6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;
7)The mutually information such as block height where the stored record corresponding to card signature blocks return trading signature.
Particular embodiments described above, has carried out the purpose of the present invention, technical solution and beneficial effect further
Describe in detail, it should be understood that the foregoing is merely the specific embodiment of the present invention, be not intended to limit the invention,
Within the spirit and principles of the invention, any modification, equivalent substitution, improvement and etc. done, should be included in the present invention's
Within protection domain.
Claims (4)
- A kind of 1. Trusted Digital transaction in assets method, it is characterised in that the method includes the steps:1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;2)Exchange's verification transaction request signature, and transaction request is handled;3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;4)Mutually card signature blocks return to the signature per transaction to exchange;5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;7)Mutually card signature blocks return to the block elevation information where the stored record corresponding to trading signature.
- 2. the according to the method described in claim 1, it is characterized in that, step 1)Carrying out signature using private key has transaction please Draw lots before idols a tamper-proof mechanisms, the user in exchange stores its private key by digital wallet;Transaction transmitted by from user to transaction Request message is signed by private key, when transaction request received by transaction, verifies whether it is that user sends, it is therefore prevented that Transaction request is distorted by third party.
- 3. the according to the method described in claim 2, it is characterized in that, step 2)It is as follows by mutually demonstrate,proving signature blocks progress Workflow:1) Hash:Hash is carried out to transaction data, the cryptographic Hash of generation represents the transaction in itself during follow-up;2) it polymerize:The Hash tree formed in each cycle represents the All Activity of stage signature;3) card is deposited:The root of the Hash tree formed in each cycle is published to block chain and carries out depositing card;All Activity in cycle is carried out mutual signed certificate name by exchange's timing so that and All Activity can carry out depositing card and verification, Transaction privacy is protected at the same time, reduces system pressure.
- 4. the according to the method described in claim 1, it is characterized in that, step 5)The transaction trusted voucher for each The cryptographic Hash of transaction, all existence anduniquess are corresponding " hash chain ", and it comprises construct Kazakhstan by transaction Hash value node A series of cryptographic Hash and its calculating path needed for uncommon root vertex;Mutually card signature blocks return to the trusted voucher each merchandised and pass It is defeated to be stored jointly to transaction platform and user terminal;Contained in trusted voucher hash chain, sign the time encryption certificate, Transaction cryptographic Hash submitter's identity, every transaction of the user in exchange can obtain trusted voucher, can be in base by voucher The credibility of transaction is verified on Infrastructure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711443940.8A CN108009810A (en) | 2017-12-27 | 2017-12-27 | A kind of Trusted Digital transaction in assets method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711443940.8A CN108009810A (en) | 2017-12-27 | 2017-12-27 | A kind of Trusted Digital transaction in assets method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108009810A true CN108009810A (en) | 2018-05-08 |
Family
ID=62061662
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711443940.8A Pending CN108009810A (en) | 2017-12-27 | 2017-12-27 | A kind of Trusted Digital transaction in assets method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108009810A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960826A (en) * | 2018-06-29 | 2018-12-07 | 杭州复杂美科技有限公司 | A kind of trading group, trading group building method, storage medium, equipment and system |
CN109064169A (en) * | 2018-07-13 | 2018-12-21 | 杭州复杂美科技有限公司 | Method of commerce, equipment and storage medium |
CN109257334A (en) * | 2018-08-21 | 2019-01-22 | 广州杰赛科技股份有限公司 | A kind of data chain loading system, method and storage medium based on block chain |
CN109598149A (en) * | 2018-11-20 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and apparatus of business processing |
CN109636605A (en) * | 2018-12-13 | 2019-04-16 | 南京区盟链信息科技有限公司 | A kind of monitoring and managing method and system of digital asset exchange |
CN109636391A (en) * | 2018-12-20 | 2019-04-16 | 姚前 | The confirmation method and system of assets under a kind of chain to trustship cochain |
CN109685665A (en) * | 2018-12-20 | 2019-04-26 | 姚前 | The system and method for assets trustship transfer under a kind of chain |
CN109840769A (en) * | 2019-01-21 | 2019-06-04 | 中国联合网络通信集团有限公司 | Card method and device, system and storage medium are deposited based on block chain |
CN109872142A (en) * | 2019-02-21 | 2019-06-11 | 缀初网络技术(上海)有限公司 | A kind of digital asset method of commerce and its storage medium based on trusted third party |
CN110020764A (en) * | 2018-10-25 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Method for managing resource, device, equipment and computer readable storage medium |
CN110060064A (en) * | 2019-04-26 | 2019-07-26 | 深圳市网心科技有限公司 | A kind of Transaction Information verification method and relevant apparatus |
WO2020029755A1 (en) * | 2018-08-07 | 2020-02-13 | 北京三快在线科技有限公司 | Transaction verification method and apparatus, storage medium, and electronic device |
CN111177225A (en) * | 2020-01-02 | 2020-05-19 | 支付宝(杭州)信息技术有限公司 | Account state existence proving method and device and state inquiring method and device |
CN111210345A (en) * | 2018-11-21 | 2020-05-29 | 深圳市文鼎创数据科技有限公司 | Signature method and device based on block chain network transaction and terminal equipment |
CN111401899A (en) * | 2020-03-17 | 2020-07-10 | 北京阿尔山区块链联盟科技有限公司 | Digital asset transfer method and device and server |
CN111402040A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Asset management method and system |
CN111523894A (en) * | 2020-05-06 | 2020-08-11 | 杭州复杂美科技有限公司 | Data delay publishing method, device and storage medium |
CN111833062A (en) * | 2020-09-21 | 2020-10-27 | 江苏傲为控股有限公司 | Credibility verification system for digital asset data packet |
CN112380573A (en) * | 2019-07-29 | 2021-02-19 | 创新先进技术有限公司 | Digital signature method, device and equipment in block chain type account book |
WO2021036810A1 (en) * | 2019-08-23 | 2021-03-04 | 深圳前海微众银行股份有限公司 | Evidence verification method, system, apparatus and device, and readable storage medium |
CN112966237A (en) * | 2021-03-09 | 2021-06-15 | 安徽超清科技股份有限公司 | Block chain-based digital asset processing method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150356523A1 (en) * | 2014-06-07 | 2015-12-10 | ChainID LLC | Decentralized identity verification systems and methods |
CN106157040A (en) * | 2016-07-12 | 2016-11-23 | 詹博凯 | A kind of collaborative method of commerce based on intelligent mobile terminal and system |
CN107171812A (en) * | 2017-07-18 | 2017-09-15 | 光载无限(北京)科技有限公司 | It is a kind of based on block chain without key signature infrastructure construction method |
CN107180350A (en) * | 2017-03-31 | 2017-09-19 | 唐晓领 | A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system |
CN107240001A (en) * | 2017-06-06 | 2017-10-10 | 北京汇通金财信息科技有限公司 | Transaction method and system for digital assets |
-
2017
- 2017-12-27 CN CN201711443940.8A patent/CN108009810A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150356523A1 (en) * | 2014-06-07 | 2015-12-10 | ChainID LLC | Decentralized identity verification systems and methods |
CN106157040A (en) * | 2016-07-12 | 2016-11-23 | 詹博凯 | A kind of collaborative method of commerce based on intelligent mobile terminal and system |
CN107180350A (en) * | 2017-03-31 | 2017-09-19 | 唐晓领 | A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system |
CN107240001A (en) * | 2017-06-06 | 2017-10-10 | 北京汇通金财信息科技有限公司 | Transaction method and system for digital assets |
CN107171812A (en) * | 2017-07-18 | 2017-09-15 | 光载无限(北京)科技有限公司 | It is a kind of based on block chain without key signature infrastructure construction method |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960826A (en) * | 2018-06-29 | 2018-12-07 | 杭州复杂美科技有限公司 | A kind of trading group, trading group building method, storage medium, equipment and system |
CN109064169A (en) * | 2018-07-13 | 2018-12-21 | 杭州复杂美科技有限公司 | Method of commerce, equipment and storage medium |
CN109064169B (en) * | 2018-07-13 | 2020-11-06 | 杭州复杂美科技有限公司 | Transaction method, apparatus and storage medium |
WO2020029755A1 (en) * | 2018-08-07 | 2020-02-13 | 北京三快在线科技有限公司 | Transaction verification method and apparatus, storage medium, and electronic device |
CN109257334A (en) * | 2018-08-21 | 2019-01-22 | 广州杰赛科技股份有限公司 | A kind of data chain loading system, method and storage medium based on block chain |
CN109257334B (en) * | 2018-08-21 | 2021-04-09 | 广州杰赛科技股份有限公司 | Block chain-based data uplink system, method and storage medium |
CN110020764A (en) * | 2018-10-25 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Method for managing resource, device, equipment and computer readable storage medium |
CN109598149A (en) * | 2018-11-20 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and apparatus of business processing |
CN109598149B (en) * | 2018-11-20 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Service processing method and device |
CN111210345B (en) * | 2018-11-21 | 2023-02-17 | 深圳市文鼎创数据科技有限公司 | Signature method and device based on block chain network transaction and terminal equipment |
CN111210345A (en) * | 2018-11-21 | 2020-05-29 | 深圳市文鼎创数据科技有限公司 | Signature method and device based on block chain network transaction and terminal equipment |
CN109636605A (en) * | 2018-12-13 | 2019-04-16 | 南京区盟链信息科技有限公司 | A kind of monitoring and managing method and system of digital asset exchange |
CN109685665A (en) * | 2018-12-20 | 2019-04-26 | 姚前 | The system and method for assets trustship transfer under a kind of chain |
CN109636391A (en) * | 2018-12-20 | 2019-04-16 | 姚前 | The confirmation method and system of assets under a kind of chain to trustship cochain |
CN109685665B (en) * | 2018-12-20 | 2020-09-29 | 姚前 | System and method for under-chain asset hosting transfer |
CN111402040A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Asset management method and system |
CN109840769A (en) * | 2019-01-21 | 2019-06-04 | 中国联合网络通信集团有限公司 | Card method and device, system and storage medium are deposited based on block chain |
CN109872142A (en) * | 2019-02-21 | 2019-06-11 | 缀初网络技术(上海)有限公司 | A kind of digital asset method of commerce and its storage medium based on trusted third party |
CN110060064A (en) * | 2019-04-26 | 2019-07-26 | 深圳市网心科技有限公司 | A kind of Transaction Information verification method and relevant apparatus |
CN112380573A (en) * | 2019-07-29 | 2021-02-19 | 创新先进技术有限公司 | Digital signature method, device and equipment in block chain type account book |
WO2021036810A1 (en) * | 2019-08-23 | 2021-03-04 | 深圳前海微众银行股份有限公司 | Evidence verification method, system, apparatus and device, and readable storage medium |
CN111177225A (en) * | 2020-01-02 | 2020-05-19 | 支付宝(杭州)信息技术有限公司 | Account state existence proving method and device and state inquiring method and device |
CN111177225B (en) * | 2020-01-02 | 2023-05-23 | 支付宝(杭州)信息技术有限公司 | Account state existence proving method and device and state inquiring method and device |
CN111401899A (en) * | 2020-03-17 | 2020-07-10 | 北京阿尔山区块链联盟科技有限公司 | Digital asset transfer method and device and server |
CN111401899B (en) * | 2020-03-17 | 2023-10-20 | 北京阿尔山区块链联盟科技有限公司 | Digital asset transfer method, device and server |
CN111523894A (en) * | 2020-05-06 | 2020-08-11 | 杭州复杂美科技有限公司 | Data delay publishing method, device and storage medium |
CN111833062A (en) * | 2020-09-21 | 2020-10-27 | 江苏傲为控股有限公司 | Credibility verification system for digital asset data packet |
CN112966237A (en) * | 2021-03-09 | 2021-06-15 | 安徽超清科技股份有限公司 | Block chain-based digital asset processing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108009810A (en) | A kind of Trusted Digital transaction in assets method | |
CN111008836B (en) | Privacy security transfer payment method, device, system and storage medium | |
CN108389047B (en) | Method for trading between parent chain and child chain in block chain and block chain network | |
Franco | Understanding Bitcoin: Cryptography, engineering and economics | |
US11316696B2 (en) | Hash subtrees for grouping components by component type | |
WO2020082868A1 (en) | Block chain-based claim settlement method and apparatus | |
CN107180350A (en) | A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system | |
CN106339939B (en) | Non-tamper-able distributed bill system based on secure hardware and transaction processing method | |
CN108764877B (en) | Digital asset right-confirming trading method based on block chain technology | |
CN109934711A (en) | The method and system of external warranty for the transaction of block chain | |
CN105844505A (en) | Method of carrying out digital currency trading through block chain technology | |
CN107615317A (en) | The system and method for block chain transaction record | |
CN107038578A (en) | Multi-signature exchange information processing method in data trade platform based on block chain | |
TW201944757A (en) | Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions | |
CN108737114A (en) | A kind of endorsement method and device of the block catenary system based on quantum key distribution | |
US20220327529A1 (en) | Advanced Transactional Protocols And Ecosystem For Smart Contract Authoring And Deployment | |
CN109313685A (en) | The encryption application of block catenary system | |
TWM543413U (en) | Web lending platform using technology of blockchain for deal | |
CN110135819A (en) | A kind of third party's trust data transaction system and method based on block chain | |
US20200320490A1 (en) | Method and system for conducting a transaction using private blockchain | |
CN109658130A (en) | It is recycled based on block chain and provides Coupon Method, device, equipment and storage medium | |
WO2020243961A1 (en) | Aggregated payment method and system for digital currencies, and edge server | |
Aggarwal et al. | Basics of blockchain | |
Zhao et al. | Research on a shared bicycle deposit management system based on blockchain technology | |
Singh et al. | Performance comparison of executing fast transactions in bitcoin network using verifiable code execution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180508 |