CN108009810A - A kind of Trusted Digital transaction in assets method - Google Patents

A kind of Trusted Digital transaction in assets method Download PDF

Info

Publication number
CN108009810A
CN108009810A CN201711443940.8A CN201711443940A CN108009810A CN 108009810 A CN108009810 A CN 108009810A CN 201711443940 A CN201711443940 A CN 201711443940A CN 108009810 A CN108009810 A CN 108009810A
Authority
CN
China
Prior art keywords
transaction
exchange
signature
user
hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711443940.8A
Other languages
Chinese (zh)
Inventor
王翠翠
朱佩江
陈升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unlimited (beijing) Technology Co Ltd
Original Assignee
Unlimited (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unlimited (beijing) Technology Co Ltd filed Critical Unlimited (beijing) Technology Co Ltd
Priority to CN201711443940.8A priority Critical patent/CN108009810A/en
Publication of CN108009810A publication Critical patent/CN108009810A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The present invention is a kind of Trusted Digital transaction in assets method, including 1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;2)Exchange's verification transaction request signature, handles transaction request;3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;4)Mutually card signature blocks return to the signature per transaction to exchange;5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;7)Mutually card signature blocks return to the block elevation information where the stored record corresponding to trading signature.Trusted Digital transaction in assets infrastructure of the present invention can meet billions of transactions demand per second, the risk of account book data is obtained after having prevented explosion Encryption Algorithm, overcome the intrinsic problem such as insider trading existing for centralization exchange, it is therefore prevented that customer transaction request is distorted by third party.

Description

A kind of Trusted Digital transaction in assets method
Technical field
The present invention relates to internet information alternating-current technique, more particularly, to one it is based on block chain, multicenter, can Across digital asset method of commerce merchandised, believable.
Background technology
Term is explained:
Block chain
Block chain is a kind of recording technique of decentralization, any number of nodes in participation system, in a period of time system The data of full detail exchange, recorded a block, while the fingerprint for generating the block is used for chain by the method for cryptography Connect next area's block sum check.All nodes that participate in of system assert record and verification jointly, it is common assert record whether be it is true, together When each node can replicate the copy for obtaining a complete documentation.Compared with traditional book keeping operation technology, its feature is as follows:
(1)The chain that system node is safeguarded jointly constantly increases, and is only possible to addition record, and the record occurred can not all be distorted;
(2)Decentralization, multicenter, can reach common understanding without the control of concentration in other words;
(3)Ensure that transaction can not be denied and destroyed by the mechanism of cryptography, and protect the privacy of user information and record;
In numerous block chain business applications, bit coin block platform chain its imitated by extensive infrastructure and powerful network Should, it is considered at last as the bottom of block chain field standard.
Merkle trees
Merkle trees are a kind of Hash binary trees, it is a kind of data for being used as quick conclusion and verification large-scale data integrality Structure.This binary tree includes cryptographic hash.Term " tree " is often used to description one kind in Computer Subject has branch Data structure, but tree be usually squeezed display, " root " the top of figure at the same time " leaf " in the lower part of figure.
In bit coin network, Merkle trees are used to conclude area's All Activity in the block, while generate whole hand over The digital finger-print easily gathered, and provide a kind of high effective way for verifying block and whether there is certain transaction.Generation one is complete Merkle trees are needed recursively to Hash node to carrying out Hash, and newly-generated Hash node is inserted into Merkle trees, Until only remaining a Hash node, which is exactly the root of Merkle trees.Used twice in the Merkle trees of bit coin SHA256 algorithms, therefore its cryptographic hashing algorithm is also referred to as double-SHA256.
2017, digital encryption token market welcome blowout growth, according to the statistics of coinmarketcap.com, Cut-off was to August in 2017 4 days, and Digital Radio encrypts token transactions currency type more than 1000 kinds, and total market capitalisation reaches 101,300,000,000 U.S. dollars, together Whole world turnover is also up to 2,300,000,000 U.S. dollars when smaller than growth by 773%, only 24, but digital encryption token market is asked there is also following Topic:
Transaction is highly concentrated in only a few exchange
Current exchange species is various, but Digital Radio encryption token transactions are but highly concentrated in the exchange of only a few. When bit coin August 4 days 24 is small exemplified by the turnover of the whole world, nine exchanges such as Bitfinex carry 90% bit coin transaction Volume.
Therefore, the trading processing speed of exchange, safety and reliability, which become, determines digital encryption token market development Key factor.
The security incident of conventional transaction institute takes place frequently
Conventional transaction faces problems with:
(1)User's fund trustship does not have credible security
Exchange all uses similar pattern at this stage:Franc or token are supplemented with money the silver of exchange by user required by transaction In row account or block chain address, then exchange carries out IOU book keeping operations in the private virtual Accounting system of oneself for user.With Family real trade is these IOU.In order to which IOU is exchanged into franc or block chain token, user needs to carry to exchange Now apply, after withdrawing deposit successfully, just calculate bona fide transaction and complete.In this process, exchange for user take care of assets ability and Credit is the risk of user's maximum.
(2)Insider trading
Except facing the problem of trading volume, malicious operation coin valency are forged by exchange, user also needs to undertake exchange network operator business Other risks that morals are brought, for example embezzle funds and cause to pay one's debts with all his assets.Due to the above problem, conventional transaction institute in recent years Security incident takes place frequently, on the one hand the event occurred reflects missing of the block chain token transactions in every country Regulation Policy, On the other hand it also demonstrate that the inherent risk of centralization exchange pattern.
The experience of decentralization transaction on exchange is poor, there are performance bottleneck
Open source community had had some trials that decentralization exchange is built based on block chain, such as auspicious ripple(Ripple), ratio Special stock(BitShares), Openledger, Banchor etc., but exchange's generally existing of decentralization completely is following Problem:
Trading experiencing is bad
It is simple to rely on design and adjustment common recognition algorithm, to improve the trading processing performance of block chain, it can not meet digital goods The characteristic of coin transaction scale of construction explosive growth
Magnanimity transaction data stores, and causes block chain too fat to move, and block chain infrastructure is had to " bear a heavy burden and move ahead "
The business and personal data stored in block, faces the risk of privacy leakage at any time.
The content of the invention
The purpose of the present invention is to propose to one it is based on block chain, multicenter, can be across numeral merchandised, believable Transaction in assets method.By establishing the digital asset transaction infrastructure of multicenter, multiple exchanges are transported in a manner of alliance OK, realize that high speed low delay is merchandised.The present invention is by block chain, mutually card signature technology combines, and changes traditional block chain " transaction Cochain deposits card and needs to be lined up " poorly efficient single thread mode, form a kind of new " multithreading " block chain infrastructure, support high The rapidly and efficiently processing of concurrent transaction, deposit card and verification, greatly reduces large-scale parallel trading volume and mass memory pair The pressure of block chain
In order to achieve the object of the present invention, following technical scheme is proposed:
A kind of Trusted Digital transaction in assets method, it is characterised in that the method includes the steps:
1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;
2)Exchange's verification transaction request signature, and transaction request is handled;
3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;
4)Mutually card signature blocks return to the signature per transaction to exchange;
5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;
6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;
7)Mutually card signature blocks return to the block elevation information where the stored record corresponding to trading signature.
2nd, according to the method described in claim 1, it is characterized in that, the step 1)Carrying out signature using private key has friendship Easily ask for an autograph tamper-proof mechanisms, and the user in exchange stores its private key by digital wallet;Transmitted by user to transaction Transaction request message is signed by private key, when transaction request received by transaction, verifies whether it is that user sends, and is prevented Stop transaction request to be distorted by third party.
The step 2)It is to carry out following workflow by mutually demonstrate,proving signature blocks:
1) Hash:Hash is carried out to transaction data, the cryptographic Hash of generation represents the transaction in itself during follow-up;
2) it polymerize:The Hash tree formed in each cycle represents the All Activity of stage signature;
3) card is deposited:The root of the Hash tree formed in each cycle is published to block chain and carries out depositing card;
All Activity in cycle is carried out mutual signed certificate name by exchange's timing so that and All Activity can carry out depositing card and verification, Transaction privacy is protected at the same time, reduces system pressure.
The step 5)The transaction trusted voucher for the cryptographic Hash of each transaction, all existence anduniquess correspond to therewith " hash chain ", it comprises a series of cryptographic Hash and its meter needed for constructing Hash root vertex as transaction Hash value node Calculate path;The trusted voucher that mutually return of card signature blocks is each merchandised is transferred to transaction platform and user terminal is deposited jointly Storage;Hash chain, the encryption certificate for time of signing, transaction cryptographic Hash submitter's identity are contained in trusted voucher, user is merchandising In every transaction can obtain trusted voucher, the credibility of transaction can be verified in infrastructure by voucher.
The effect of the present invention:
1)Due to the born single thread of block chain, its maximum challenge is scalability --- expanded with O (n) scales complexity Exhibition, it is meant that its complexity can be with number of transaction linear increase.In contrast, by being breathed out to the All Activity in the cycle Uncommon signature and polymerization, the block chain infrastructure based on mutual signed certificate name will extend in O (t) complexities --- linearly over time Increase, and independently of number of transaction so that Trusted Digital transaction in assets infrastructure can meet billions of transaction need per second Ask;
2)Trusted Digital transaction in assets infrastructure is by mutually demonstrate,proving signature technology, by exchange's submission to owning in each cycle Transaction hash signature and polymerize, the root finally produced is published to block chain and carries out depositing card, with traditional decentralization transaction Compared, and the source data of transaction need not be preserved, the size of the block for block chain of not only having abridged, has also prevented explosion encryption The risk of account book data is obtained after algorithm;
3)Based on Trusted Digital transaction in assets infrastructure, every transaction of the user in exchange can obtain trusted voucher, The credibility of transaction can be verified in infrastructure by voucher, it is intrinsic to overcome insider trading etc. existing for centralization exchange Problem;
4)Compared to the exchange of conventional center, the exchange user on Trusted Digital transaction in assets infrastructure is submitting During transaction request, transaction request information can be signed by private key for user, it is therefore prevented that customer transaction request is distorted by third party.
Brief description of the drawings
Fig. 1 Hash tree polymerization process examples;
Fig. 2 is the mutual card signature framework of the present invention;
Fig. 3 is the Trusted Digital transaction in assets infrastructure overall workflow of the present invention.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with the drawings and specific embodiments, The present invention is described in more detail.
(One)Mutually card signature blocks
Mutually card signature blocks use Hash tree(Merkle trees)Polymerization technique, any one data submitted in system can " tracing to its source ".As shown in Figure 1, user sends the cryptographic Hash of a transaction, it is assumed that it is X1, all requests quilt received A Hash tree is polymerized to, returns to the fullpath then contained in the signature of user from leaf node to root node.In order to Prove X3Integrality, it is necessary to utilize X4 、X12And X58Root cryptographic Hash is regenerated, to prove that X3 take part in the life of root node Into.
Trusted voucher
It is in this way, corresponding " hash chain " for the cryptographic Hash of each transaction, all existence anduniquess(Sign):Contain by Transaction Hash value node constructs a series of cryptographic Hash needed for Hash root vertex and its calculates path.Mutually card signature blocks are returned Return that the trusted voucher each merchandised is transferred to transaction platform and user terminal is stored jointly.Hash is contained in trusted voucher Chain, the encryption certificate for time of signing, transaction cryptographic Hash submitter's identity.
Mutually card signature framework
By using Hash tree polymerization technique, quick conclusion and verification of the signature blocks completion to extensive transaction data are mutually demonstrate,proved, Any one transaction submitted to mutual card signature blocks " can trace to its source ".
As shown in Fig. 2, mutually the workflow of card signature blocks is divided into three steps:Hash, polymerization and issue
1) Hash:Hash is carried out to transaction data, the cryptographic Hash of generation represents the transaction in itself during follow-up;
2) it polymerize:The Hash tree formed in each cycle represents the All Activity of stage signature.
3) card is deposited:The root of the Hash tree formed in each cycle is published to block chain and carries out depositing card.
Exchange's timing(Such as once per second)All Activity in cycle is subjected to mutual signed certificate name so that All Activity can carry out Card and verification are deposited, while protects transaction privacy, reduces system pressure.
(Two)Trusted Digital transaction in assets infrastructure overall workflow
Trusted Digital transaction in assets infrastructure overall workflow is as shown in Figure 3:
1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;
2)Exchange's verification transaction request signature, and transaction request is handled;
3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;
4)Mutually card signature blocks return to the signature per transaction to exchange;
5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;
6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;
7)The mutually information such as block height where the stored record corresponding to card signature blocks return trading signature.
Particular embodiments described above, has carried out the purpose of the present invention, technical solution and beneficial effect further Describe in detail, it should be understood that the foregoing is merely the specific embodiment of the present invention, be not intended to limit the invention, Within the spirit and principles of the invention, any modification, equivalent substitution, improvement and etc. done, should be included in the present invention's Within protection domain.

Claims (4)

  1. A kind of 1. Trusted Digital transaction in assets method, it is characterised in that the method includes the steps:
    1)User submits transaction request to exchange, and wherein transaction request information is signed using private key;
    2)Exchange's verification transaction request signature, and transaction request is handled;
    3)The cryptographic Hash that every transaction of interior generation per second is submitted by mutually demonstrate,proving signature interface by exchange;
    4)Mutually card signature blocks return to the signature per transaction to exchange;
    5)Exchange returns to transaction trusted voucher to user, wherein containing transaction details and trading signature;
    6)User merchandises according to trusted voucher to mutual card signature blocks inquiry;
    7)Mutually card signature blocks return to the block elevation information where the stored record corresponding to trading signature.
  2. 2. the according to the method described in claim 1, it is characterized in that, step 1)Carrying out signature using private key has transaction please Draw lots before idols a tamper-proof mechanisms, the user in exchange stores its private key by digital wallet;Transaction transmitted by from user to transaction Request message is signed by private key, when transaction request received by transaction, verifies whether it is that user sends, it is therefore prevented that Transaction request is distorted by third party.
  3. 3. the according to the method described in claim 2, it is characterized in that, step 2)It is as follows by mutually demonstrate,proving signature blocks progress Workflow:
    1) Hash:Hash is carried out to transaction data, the cryptographic Hash of generation represents the transaction in itself during follow-up;
    2) it polymerize:The Hash tree formed in each cycle represents the All Activity of stage signature;
    3) card is deposited:The root of the Hash tree formed in each cycle is published to block chain and carries out depositing card;
    All Activity in cycle is carried out mutual signed certificate name by exchange's timing so that and All Activity can carry out depositing card and verification, Transaction privacy is protected at the same time, reduces system pressure.
  4. 4. the according to the method described in claim 1, it is characterized in that, step 5)The transaction trusted voucher for each The cryptographic Hash of transaction, all existence anduniquess are corresponding " hash chain ", and it comprises construct Kazakhstan by transaction Hash value node A series of cryptographic Hash and its calculating path needed for uncommon root vertex;Mutually card signature blocks return to the trusted voucher each merchandised and pass It is defeated to be stored jointly to transaction platform and user terminal;Contained in trusted voucher hash chain, sign the time encryption certificate, Transaction cryptographic Hash submitter's identity, every transaction of the user in exchange can obtain trusted voucher, can be in base by voucher The credibility of transaction is verified on Infrastructure.
CN201711443940.8A 2017-12-27 2017-12-27 A kind of Trusted Digital transaction in assets method Pending CN108009810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711443940.8A CN108009810A (en) 2017-12-27 2017-12-27 A kind of Trusted Digital transaction in assets method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711443940.8A CN108009810A (en) 2017-12-27 2017-12-27 A kind of Trusted Digital transaction in assets method

Publications (1)

Publication Number Publication Date
CN108009810A true CN108009810A (en) 2018-05-08

Family

ID=62061662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711443940.8A Pending CN108009810A (en) 2017-12-27 2017-12-27 A kind of Trusted Digital transaction in assets method

Country Status (1)

Country Link
CN (1) CN108009810A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960826A (en) * 2018-06-29 2018-12-07 杭州复杂美科技有限公司 A kind of trading group, trading group building method, storage medium, equipment and system
CN109064169A (en) * 2018-07-13 2018-12-21 杭州复杂美科技有限公司 Method of commerce, equipment and storage medium
CN109257334A (en) * 2018-08-21 2019-01-22 广州杰赛科技股份有限公司 A kind of data chain loading system, method and storage medium based on block chain
CN109598149A (en) * 2018-11-20 2019-04-09 阿里巴巴集团控股有限公司 The method and apparatus of business processing
CN109636605A (en) * 2018-12-13 2019-04-16 南京区盟链信息科技有限公司 A kind of monitoring and managing method and system of digital asset exchange
CN109636391A (en) * 2018-12-20 2019-04-16 姚前 The confirmation method and system of assets under a kind of chain to trustship cochain
CN109685665A (en) * 2018-12-20 2019-04-26 姚前 The system and method for assets trustship transfer under a kind of chain
CN109840769A (en) * 2019-01-21 2019-06-04 中国联合网络通信集团有限公司 Card method and device, system and storage medium are deposited based on block chain
CN109872142A (en) * 2019-02-21 2019-06-11 缀初网络技术(上海)有限公司 A kind of digital asset method of commerce and its storage medium based on trusted third party
CN110020764A (en) * 2018-10-25 2019-07-16 阿里巴巴集团控股有限公司 Method for managing resource, device, equipment and computer readable storage medium
CN110060064A (en) * 2019-04-26 2019-07-26 深圳市网心科技有限公司 A kind of Transaction Information verification method and relevant apparatus
WO2020029755A1 (en) * 2018-08-07 2020-02-13 北京三快在线科技有限公司 Transaction verification method and apparatus, storage medium, and electronic device
CN111177225A (en) * 2020-01-02 2020-05-19 支付宝(杭州)信息技术有限公司 Account state existence proving method and device and state inquiring method and device
CN111210345A (en) * 2018-11-21 2020-05-29 深圳市文鼎创数据科技有限公司 Signature method and device based on block chain network transaction and terminal equipment
CN111401899A (en) * 2020-03-17 2020-07-10 北京阿尔山区块链联盟科技有限公司 Digital asset transfer method and device and server
CN111402040A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Asset management method and system
CN111523894A (en) * 2020-05-06 2020-08-11 杭州复杂美科技有限公司 Data delay publishing method, device and storage medium
CN111833062A (en) * 2020-09-21 2020-10-27 江苏傲为控股有限公司 Credibility verification system for digital asset data packet
CN112380573A (en) * 2019-07-29 2021-02-19 创新先进技术有限公司 Digital signature method, device and equipment in block chain type account book
WO2021036810A1 (en) * 2019-08-23 2021-03-04 深圳前海微众银行股份有限公司 Evidence verification method, system, apparatus and device, and readable storage medium
CN112966237A (en) * 2021-03-09 2021-06-15 安徽超清科技股份有限公司 Block chain-based digital asset processing method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150356523A1 (en) * 2014-06-07 2015-12-10 ChainID LLC Decentralized identity verification systems and methods
CN106157040A (en) * 2016-07-12 2016-11-23 詹博凯 A kind of collaborative method of commerce based on intelligent mobile terminal and system
CN107171812A (en) * 2017-07-18 2017-09-15 光载无限(北京)科技有限公司 It is a kind of based on block chain without key signature infrastructure construction method
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN107240001A (en) * 2017-06-06 2017-10-10 北京汇通金财信息科技有限公司 Transaction method and system for digital assets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150356523A1 (en) * 2014-06-07 2015-12-10 ChainID LLC Decentralized identity verification systems and methods
CN106157040A (en) * 2016-07-12 2016-11-23 詹博凯 A kind of collaborative method of commerce based on intelligent mobile terminal and system
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN107240001A (en) * 2017-06-06 2017-10-10 北京汇通金财信息科技有限公司 Transaction method and system for digital assets
CN107171812A (en) * 2017-07-18 2017-09-15 光载无限(北京)科技有限公司 It is a kind of based on block chain without key signature infrastructure construction method

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960826A (en) * 2018-06-29 2018-12-07 杭州复杂美科技有限公司 A kind of trading group, trading group building method, storage medium, equipment and system
CN109064169A (en) * 2018-07-13 2018-12-21 杭州复杂美科技有限公司 Method of commerce, equipment and storage medium
CN109064169B (en) * 2018-07-13 2020-11-06 杭州复杂美科技有限公司 Transaction method, apparatus and storage medium
WO2020029755A1 (en) * 2018-08-07 2020-02-13 北京三快在线科技有限公司 Transaction verification method and apparatus, storage medium, and electronic device
CN109257334A (en) * 2018-08-21 2019-01-22 广州杰赛科技股份有限公司 A kind of data chain loading system, method and storage medium based on block chain
CN109257334B (en) * 2018-08-21 2021-04-09 广州杰赛科技股份有限公司 Block chain-based data uplink system, method and storage medium
CN110020764A (en) * 2018-10-25 2019-07-16 阿里巴巴集团控股有限公司 Method for managing resource, device, equipment and computer readable storage medium
CN109598149A (en) * 2018-11-20 2019-04-09 阿里巴巴集团控股有限公司 The method and apparatus of business processing
CN109598149B (en) * 2018-11-20 2020-04-07 阿里巴巴集团控股有限公司 Service processing method and device
CN111210345B (en) * 2018-11-21 2023-02-17 深圳市文鼎创数据科技有限公司 Signature method and device based on block chain network transaction and terminal equipment
CN111210345A (en) * 2018-11-21 2020-05-29 深圳市文鼎创数据科技有限公司 Signature method and device based on block chain network transaction and terminal equipment
CN109636605A (en) * 2018-12-13 2019-04-16 南京区盟链信息科技有限公司 A kind of monitoring and managing method and system of digital asset exchange
CN109685665A (en) * 2018-12-20 2019-04-26 姚前 The system and method for assets trustship transfer under a kind of chain
CN109636391A (en) * 2018-12-20 2019-04-16 姚前 The confirmation method and system of assets under a kind of chain to trustship cochain
CN109685665B (en) * 2018-12-20 2020-09-29 姚前 System and method for under-chain asset hosting transfer
CN111402040A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Asset management method and system
CN109840769A (en) * 2019-01-21 2019-06-04 中国联合网络通信集团有限公司 Card method and device, system and storage medium are deposited based on block chain
CN109872142A (en) * 2019-02-21 2019-06-11 缀初网络技术(上海)有限公司 A kind of digital asset method of commerce and its storage medium based on trusted third party
CN110060064A (en) * 2019-04-26 2019-07-26 深圳市网心科技有限公司 A kind of Transaction Information verification method and relevant apparatus
CN112380573A (en) * 2019-07-29 2021-02-19 创新先进技术有限公司 Digital signature method, device and equipment in block chain type account book
WO2021036810A1 (en) * 2019-08-23 2021-03-04 深圳前海微众银行股份有限公司 Evidence verification method, system, apparatus and device, and readable storage medium
CN111177225A (en) * 2020-01-02 2020-05-19 支付宝(杭州)信息技术有限公司 Account state existence proving method and device and state inquiring method and device
CN111177225B (en) * 2020-01-02 2023-05-23 支付宝(杭州)信息技术有限公司 Account state existence proving method and device and state inquiring method and device
CN111401899A (en) * 2020-03-17 2020-07-10 北京阿尔山区块链联盟科技有限公司 Digital asset transfer method and device and server
CN111401899B (en) * 2020-03-17 2023-10-20 北京阿尔山区块链联盟科技有限公司 Digital asset transfer method, device and server
CN111523894A (en) * 2020-05-06 2020-08-11 杭州复杂美科技有限公司 Data delay publishing method, device and storage medium
CN111833062A (en) * 2020-09-21 2020-10-27 江苏傲为控股有限公司 Credibility verification system for digital asset data packet
CN112966237A (en) * 2021-03-09 2021-06-15 安徽超清科技股份有限公司 Block chain-based digital asset processing method

Similar Documents

Publication Publication Date Title
CN108009810A (en) A kind of Trusted Digital transaction in assets method
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
Franco Understanding Bitcoin: Cryptography, engineering and economics
US11316696B2 (en) Hash subtrees for grouping components by component type
WO2020082868A1 (en) Block chain-based claim settlement method and apparatus
CN107180350A (en) A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN106339939B (en) Non-tamper-able distributed bill system based on secure hardware and transaction processing method
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
CN109934711A (en) The method and system of external warranty for the transaction of block chain
CN105844505A (en) Method of carrying out digital currency trading through block chain technology
CN107615317A (en) The system and method for block chain transaction record
CN107038578A (en) Multi-signature exchange information processing method in data trade platform based on block chain
TW201944757A (en) Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions
CN108737114A (en) A kind of endorsement method and device of the block catenary system based on quantum key distribution
US20220327529A1 (en) Advanced Transactional Protocols And Ecosystem For Smart Contract Authoring And Deployment
CN109313685A (en) The encryption application of block catenary system
TWM543413U (en) Web lending platform using technology of blockchain for deal
CN110135819A (en) A kind of third party's trust data transaction system and method based on block chain
US20200320490A1 (en) Method and system for conducting a transaction using private blockchain
CN109658130A (en) It is recycled based on block chain and provides Coupon Method, device, equipment and storage medium
WO2020243961A1 (en) Aggregated payment method and system for digital currencies, and edge server
Aggarwal et al. Basics of blockchain
Zhao et al. Research on a shared bicycle deposit management system based on blockchain technology
Singh et al. Performance comparison of executing fast transactions in bitcoin network using verifiable code execution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180508