CN109428722A - A kind of content delivery method and device - Google Patents
A kind of content delivery method and device Download PDFInfo
- Publication number
- CN109428722A CN109428722A CN201710762782.6A CN201710762782A CN109428722A CN 109428722 A CN109428722 A CN 109428722A CN 201710762782 A CN201710762782 A CN 201710762782A CN 109428722 A CN109428722 A CN 109428722A
- Authority
- CN
- China
- Prior art keywords
- algorithm
- electronic signature
- object content
- block chain
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
This application discloses a kind of content delivery methods, applied to the decentralization system based on block chain, which comprises receive the object content that target user issues to the decentralization system;Wherein, the private key that the object content is held based on the target user is signed electronically;Obtain the electronic signature algorithm used when signing electronically to the object content;Wherein, the decentralization system supports a variety of electronic signature algorithms;The electronic signature of the object content is verified based on the electronic signature algorithm and public key corresponding with the private key that the target user holds got, and includes the object content to the block chain after being verified.
Description
Technical field
This application involves computer application technology more particularly to a kind of content delivery methods and device.
Background technique
Block chain technology is that one kind by several calculatings equipment participates in " book keeping operation " jointly, and common maintenance portion completely divides
The emerging technology of cloth database.Since there is block chain technology decentralization, open and clear, every calculating equipment can participate in
It can be rapidly performed by the synchronous characteristic of data between data-base recording and respectively calculating equipment, taken using block chain technology
Decentralization system is built, and includes various execution programs in the distributed data base of block chain and is executed automatically, in crowd
It is widely applied in more fields;For example, P2P payment platform is built using block chain technology in financial technology field, and
Intelligent contract etc. is issued on block chain and executes program, can be realized under the premise of without bank and other financial mechanism
Point-to-point secure payment between different users.
Summary of the invention
The application proposes a kind of content delivery method, applied to the decentralization system based on block chain, the method packet
It includes:
Receive the object content that target user issues to the decentralization system;Wherein, the object content is based on
The private key that the target user holds is signed electronically;
Obtain the electronic signature algorithm used when signing electronically to the object content;Wherein, the decentralization
System supports a variety of electronic signature algorithms;
Based on the electronic signature algorithm and public key corresponding with the private key that the target user holds got to described
The electronic signature of object content is verified, and includes the object content to the block chain after being verified.
Optionally, the electronic signature algorithm used when the acquisition signs electronically to the object content, comprising:
Obtain the algorithm ID of the electronic signature algorithm used when signing electronically to the object content;
Corresponding electronic signature algorithm is inquired in the Algorithm mapping table for being distributed to the block chain based on the algorithm ID;
Wherein, a variety of electronic signature algorithms including decentralization system support in the Algorithm mapping table and corresponding calculation
Mapping relations between method ID.
Optionally, the algorithm of the electronic signature algorithm used when the acquisition signs electronically to the object content
ID, comprising:
The electronic signature algorithm used when signing electronically to the object content is obtained from the object content
Algorithm ID;Alternatively,
The electricity used when being signed electronically based on the information inquiry carried in the object content to the object content
The algorithm ID of sub- signature algorithm.
Optionally, the object content is the transaction content issued to the target account address of the block chain, or to institute
State the triggering command of the intelligent contract program publication in block chain;The algorithm ID is recorded in the transmission for issuing the object content
In the account address of square user;And/or in the account address of recipient's account of the object content.
Optionally, the account of the target user corresponds to multiple electronic signature algorithms.
Optionally, the account of the target user includes multiple sub- accounts;The account address of each sub- account is respectively different
Sign electronically algorithm.
Optionally, used electronic signature algorithm when signing electronically to the object content, be and the target
The corresponding electronic signature algorithm in the account address of the sender user of content;Alternatively, for recipient's account with the object content
The corresponding electronic signature algorithm in the account address at family.
The application also proposes a kind of content distribution apparatus, applied to the decentralization system based on block chain, described device
Include:
Receiving module receives the object content that target user issues to the decentralization system;Wherein, the target
Content is signed electronically based on the private key that the target user holds;
Module is obtained, the electronic signature algorithm used when signing electronically to the object content is obtained;Wherein, described
Decentralization system based on block chain supports a variety of electronic signature algorithms;
Authentication module, based on the electronic signature algorithm and public affairs corresponding with the private key that the target user holds got
Key verifies the electronic signature of the object content, and includes the object content to the block after being verified
Chain.
Optionally, the acquisition module:
Obtain the algorithm ID of the electronic signature algorithm used when signing electronically to the object content;
Corresponding electronic signature algorithm is inquired in the Algorithm mapping table for being distributed to the block chain based on the algorithm ID;
Wherein, a variety of electronic signature algorithms including decentralization system support in the Algorithm mapping table and corresponding calculation
Mapping relations between method ID.
Optionally, the object content is the transaction content issued to the target account address of the block chain, or to institute
State the triggering command of the intelligent contract program publication in block chain;The algorithm ID is recorded in the transmission for issuing the object content
In the account address of square user;And/or in the account address of recipient's account of the object content.
Optionally, the account of the target user corresponds to multiple electronic signature algorithms.
Optionally, the account of the target user includes multiple sub- accounts;The account address of each sub- account is respectively different
Sign electronically algorithm.
Optionally, used electronic signature algorithm when signing electronically to the object content, be and the target
The corresponding electronic signature algorithm in the account address of the sender user of content;Alternatively, for recipient's account with the object content
The corresponding electronic signature algorithm in the account address at family.
In this application, a kind of decentralization system of a variety of electronic signature algorithms of the support based on block chain is proposed.
Decentralization system after receiving target user and being distributed to the object content of block chain, it is available to the object content into
The electronic signature algorithm that uses when row electronic signature, be then based on the electronic signature algorithm got and with the target user
The corresponding public key of the private key held verifies the electronic signature of the object content, and will be in the target after being verified
Appearance is included to the block chain;Wherein, since above-mentioned decentralization system can support a variety of electronic signature algorithms, on the one hand make
Interface flexibility can be carried out using the system of different electronic signature algorithms by obtaining above-mentioned decentralization system;On the other hand, when upper
After stating any one the electronic signature algorithm failure supported in decentralization system, the electronic signature using the failure only will cause
The account of algorithm fails, and can't impact to the account for using other electronic signature algorithms not failed, so as to
Above-mentioned decentralization system is reduced only to support uniquely to sign electronically after algorithm failure, and caused by the wind that collapses of whole system
Danger.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in application can also be obtained according to these attached drawings other for those of ordinary skill in the art
Attached drawing.
Fig. 1 is the flow diagram that the application one implements a kind of content delivery method exemplified;
Fig. 2 is the logic diagram that the application one implements a kind of content distribution apparatus exemplified;
Fig. 3 is the hardware structure that the application one implements a kind of electronic equipment for carrying the content distribution apparatus exemplified
Figure.
Specific embodiment
Currently, generalling use ECC (Elliptic curve in the decentralization system built based on block chain technology
Cryptography, Elliptic Curve Cryptography) electronic signature algorithm of the serial algorithm as mainstream;For example, currently ripe by people
The bit coin transaction system built based on block chain technology known, just the electronic signature using ECC serial algorithm as mainstream is calculated
Method.
And it is based on existing ECC technology, as long as the length for the private key that user holds is fixed, then the private key can usually answer
In different electronic signature algorithms;Wherein, public key of the private key that user holds under different electronic signature algorithms is usual
Also not identical.
However, the decentralization system based on block chain usually only supports unique electronic signature algorithm at this stage, though
The private key that right user holds can be applied in different electronic signature algorithms, but the private key held due to user is in different electricity
Under sub- signature algorithm, corresponding public key will not be identical, therefore will lead to the system for supporting different electronic signature algorithms, can not
The problem of electronic signature of other side is mutually authenticated, between the different decentralization system of algorithm that signs electronically that will lead to support
It can not then be compatible with;
For example, in practical applications, every country has an electronic signature algorithm of national standard, and the people such as bit coin, ether mill
Between the electronic signature algorithm supported based on the transaction system that block chain technology is built, not by the electronic signature algorithm with national standard
Together;Therefore, in this case, the electronic signature algorithm that will lead to not be available national standard trades to bit coin, ether mill etc.
Electronic signature in the block chain of system is verified, to cause the block chain for transaction systems such as bit coin, ether mills
In electronic signature, do not have legal effect.
Moreover, for any one system, once unique electronic signature algorithm failure that system is supported, is
All accounts using the electronic signature algorithm will will all be faced with the risk of failure in system;For example, it is assumed that decentralization system
The unique electronic signature algorithm supported is broken through by hacker, then all accounts using the electronic signature algorithm in system, all
Security risk will be faced with.
In view of this, present applicant proposes a kind of decentralization systems of a variety of electronic signature algorithms of support based on block chain
System.Decentralization system is available in the target after receiving target user and being distributed to the object content of block chain
Hold the electronic signature algorithm used when being signed electronically, be then based on the electronic signature algorithm got and with the target
The corresponding public key of the private key that user holds verifies the electronic signature of the object content, and by the mesh after being verified
Mark content is included to the block chain;Since above-mentioned decentralization system can support a variety of electronic signature algorithms:
On the one hand, carry out above-mentioned decentralization system using the system of different electronic signature algorithms flexibly right
It connects;
On the other hand, it after any one the electronic signature algorithm failure supported in above-mentioned decentralization system, can only make
At the account failure of the electronic signature algorithm using the failure, and can't be to using other electronic signature algorithms not failed
Account impacts, after reducing the unique electronic signature algorithm failure supported due to above-mentioned decentralization system,
The risk of the collapse of whole system caused by and.
The application is described below by specific embodiment and in conjunction with specific application scenarios.
Referring to FIG. 1, Fig. 1 is a kind of content delivery method that one embodiment of the application provides, it is applied to be based on block chain
Decentralization system, execute following steps:
Step 101, the object content that target user issues to the decentralization system is received;Wherein, the target
Content is signed electronically based on the private key that the target user holds;
Step 102, the electronic signature algorithm used when signing electronically to the object content is obtained;Wherein, described
Decentralization system supports a variety of electronic signature algorithms;
Step 103, based on the electronic signature algorithm and public affairs corresponding with the private key that the target user holds got
Key verifies the electronic signature of the object content, and includes the object content to the block after being verified
Chain.
Above-mentioned decentralization system specifically can be one and be built based on block chain technology, the distribution of " decentralization "
Formula network system.
It wherein, may include several node devices in above-mentioned decentralization system, these node devices can be presented
A kind of " decentralization " characteristic of high degree of autonomy, and can be by carrying common recognition mechanism (such as the specific common recognition of block chain
Negotiation algorithm), the data that localization is generated, or the execution program of publication are distributed on the block chain, and are newly generated
" book keeping operation people " (being commonly called as " miner ") of new block include into the new block, while each node for accessing the block chain can be with
All the elements in the block are synchronized to its local, to constitute the distributed data base of the block chain.
In this way, user is not necessarily to disposing large-scale server cluster from the background as " data center ", and
Any form of headend equipment (such as mobile terminal, PC terminal) of user side, all can serve as above-mentioned decentralization system
In a node device.
Above-mentioned electronic signature algorithm may include any type of electronic signature algorithm, in this application without special
It limits, can be configured based on actual demand;For example, in practical applications, the above-mentioned electronics label for going centring system to support
Name algorithm, can cover the ECC serial algorithm of current mainstream, and the electronic signature of the national standard of RSA Algorithm and every country is calculated
Method.Those skilled in the art is known, and in ECC algorithm, the parameter on elliptic curve function chooses different numerical value, algorithm
Also it is not quite similar.
Above-mentioned object content may include that can issue in block chain, carry out in the distributed data base of block chain
Any form of content of storage;
For example, above-mentioned object content specifically can be the target account address into the decentralization system based on block chain
The transaction content of publication;For example, above-mentioned object content specifically can be with so that above-mentioned decentralization system is P2P transaction platform as an example
It is the token transactions content of point-to-point publication between user.Alternatively, above-mentioned object content is specifically also possible to be distributed to block chain
In the triggering command of intelligent contract program included.
Wherein, above-mentioned intelligent contract program, can specifically refer to the distributed data base being included to block chain, and synchronous
The program code that any function may be implemented of each calculating equipment into block chain.And above-mentioned triggering command, specifically it can wrap
Containing any form of instruction for needing to be distributed to intelligent contract program and being triggered;For example, triggering intelligent contract program starting
Enabled instruction, the decision instruction that decision is carried out to the instruction flow of intelligent contract program or, triggering starts intelligent contract program
The function command for a certain function of carrying, or the destruction instruction of intelligent contract, etc..
Wherein, according to the common recognition mechanism of block chain, after the electric signing verification to above-mentioned object content passes through, above-mentioned mesh
Mark content will be released to the data buffer area of the block chain, and " miner " is waited (to undertake the node of bottom operation in block chain
Equipment) " dig mine success ", (i.e. " miner " is obtained by largely calculating success and includes number into the distributed data base of block chain
According to permission after) after included to the distributed data base of block chain.
In this application, the above-mentioned decentralization system based on block chain can support a variety of electronic signature algorithms.
In a kind of embodiment shown, it can be pre-created a tensor calculus method mapping table, and by above-mentioned decentralization system
The algorithm content (such as various parameters relevant to algorithm content) and corresponding calculation for a variety of electronic signature algorithms that system is supported
Method ID is recorded in the Algorithm mapping table, and creates the mapping relations of the two;Wherein, the algorithm recorded in the Algorithm mapping table
ID, the corresponding algorithm ID of electronic signature algorithm that as above-mentioned decentralization system is supported.
After the completion of the creation of above-mentioned Algorithm mapping table, further above-mentioned Algorithm mapping table can also be carried out in block chain
Publication, and finally include into the distributed data base of block chain.
Wherein, it should be noted that the electronic signature algorithm recorded in above-mentioned Algorithm mapping table, it in practical applications can be with
Dynamic update is carried out based on specific demand;
For example, can pre-define several authorized users in above-mentioned block chain, these authorized users are to have to area
The distributed data base of block chain is modified the user of renewal authority;When above-mentioned decentralization system is to the need of electronic signature algorithm
It asks and changes, these authorized users can obtain corresponding permission above-mentioned based on the private key and corresponding public key held
It deletes, add in Algorithm mapping table, updating corresponding electronic signature algorithm.
Certainly, in addition to the algorithm content of a variety of electronic signature algorithms described above that can be supported decentralization system
It, in practical applications, can also be by above-mentioned decentralization system branch and other than algorithm ID is recorded in above-mentioned Algorithm mapping table
The algorithm content and algorithm ID for a variety of electronic signature algorithms held are directly written in the bottom code of block chain, in this application
Without being particularly limited to.
In this application, in the initial state, user can initiate to register to above-mentioned decentralization system;Wherein, it initiates
The concrete mode of registration, in this application without being particularly limited to;For example, in one implementation, user can pass through to
Decentralization system submit personally identifiable information (such as user identification card number or business entity unified social credibility code
Etc. the information for capableing of unique identification user identity), Xiang Shangshu decentralization system initiates registration.
After the completion of registration, the user account and relevant input password that user can be completed based on registration are logged on
Decentralization system is stated, and the portable intelligent hardware that the user account that registration is completed is held with user is bound.
Above-mentioned portable intelligent hardware specifically can be one for carrying out asymmetric encryption communication, electronic signature and right
The portable intelligent hardware of user identity progress digital authenticating;For example, specifically to can be USB key hard for the portable intelligent hardware
Part.
Wherein, the electronic signature algorithm of private-public key pair built-in can be generated for user in the portable intelligent hardware.
In a kind of embodiment shown, when user uses the portable intelligent hardware for the first time, by the portable intelligent
Hardware may be communicatively coupled authoring system representated by the credit public key of the decentralization system maintenance (such as ca authentication center),
The portable intelligent hardware can call built-in electronic signature algorithm, generate a private key for the user and correspond to the private
The public key of key, and the public key based on generation is that the user generates an account address (such as wallet address), and by the account
Address and the electronic signature algorithm of the user are bound.
Wherein, account address usually can be and carry out the cryptographic Hash that multiple Hash calculation obtains based on public key.
Above-mentioned private key will be stored in hardware as private data to be held by individual subscriber, user's account of public key and user's registration completion
Number will be uploaded to the block chain storage trusted public keys representated by authoring system (such as ca authentication center).
Certainly, in practical applications, the same user may undertake multiple user roles simultaneously, and need to be based on to hold
Multiple private keys, complete corresponding operation under different user roles;In this case, the account of the user specifically may be used
To be divided into multiple sub- accounts;Each sub- account can respectively correspond the private key and public key that one is held.At this point, each son
Account will be respectively provided with a corresponding account address, and each account address can bind a corresponding electronic signature respectively
Algorithm.Certainly, each sub- account can also correspond to the same private key, but be distinguished according to different electronic signature algorithms.
Wherein, in a kind of embodiment shown, electronic signature algorithm with the account address binding of each sub- account can
With different.
Usual this mode only can be right after the electronic signature algorithm failure of any one sub- account (for example being cracked)
Unique corresponding sub- account impacts, and fails without an electronic signature algorithm, causes to calculate using the electronic signature
The problem of multiple sub- accounts of method all fail;At this point, the user still can continue to use the electronic signature of other sub- accounts
Algorithm, to execute corresponding permission operation;For example, in the transaction system built based on block chain, when one of them sub- account
Electronic signature algorithm be cracked after, only will cause the sub- account failure using the electronic signature algorithm, this user can make
With the corresponding electronic signature algorithm of other sub- accounts, by virtual resource (such as the virtual fund, bit under the sub- account of the failure
Coin, ether coin etc.), it is transferred quickly to other safe sub- accounts.
It certainly, in practical applications, can also complete phase with the electronic signature algorithm of the account address binding of each sub- account
Together or part is identical, in this application without being particularly limited to.
In the above-mentioned P2P block chain network for needing real-name authentication, when the authoring system receives user by above-mentioned portable
After the user account that the public key of formula Intelligent hardware upload and registration are completed, it can establish the user account of registration completion and be somebody's turn to do
Binding relationship between public key, and the binding relationship is stored in the user identity certificate being generated for user;Wherein, Yong Huchi
Some private keys will be not included in user identity certificate as private data.
In addition to this, in practical applications, user can also pass through above-mentioned portable intelligent hardware, Xiang Shangshu authoring system
The other informations such as title, personal information, the address of user are to above-mentioned authorized organization, to add in above-mentioned user identity certificate
Enter more subscriber identity informations.
In this example, after user identity certificate has been generated for user in CA mechanism, it can be used and represent the credible of CA mechanism
The corresponding private key of public key, signs electronically to the user identity certificate, then will be under the user identity certificate after electronic signature
It is sent to above-mentioned Intelligent hardware, is stored in the secure storage environment of above-mentioned Intelligent hardware.
In above-mentioned block chain decentralization system, it can be pre-configured with a trusted public keys list, in the trusted public keys
It may include the public key of several believable third party CA mechanisms, and electronic signature algorithm corresponding with each public key in list.
When user uses above-mentioned Intelligent hardware for the first time, the node device docked in above-mentioned decentralization system with the Intelligent hardware can
With based on the public key and corresponding electronic signature algorithm in above-mentioned trusted public keys list, in above-mentioned user identity certificate
Electronic signature is verified, and can then read user's account that above-mentioned registration is completed from the user identity certificate if the verification passes
Binding relationship number between above-mentioned public key stores in the security context of above-mentioned Intelligent hardware.At this point, what user's registration was completed
User account and above-mentioned Intelligent hardware binding success.
In this application, after the portable intelligent hardware binding success for the user account and user that user's registration is completed,
The subsequent user can be executed instruction by the Intelligent hardware to the publication of block chain, and based on the private being stored in the Intelligent hardware
Key executes instruction this and signs electronically.
Wherein, used algorithm when signing electronically is executed instruction to this, can be and issues what this was executed instruction
The electronic signature algorithm of the user account address binding of user, with being also possible to the account of the recipient's account executed instruction with this
The electronic signature algorithm of location binding.I.e. for the Intelligent hardware that user holds, a variety of electronic signature algorithms can also be supported.
For example, in the case where the account of user is divided into the scene of multiple sub- accounts, since the account address of each sub- account can
To bind a corresponding electronic signature algorithm respectively, then when signing to above-mentioned token transactions content, using with hair
The electronic signature algorithm of the account address binding of any sub- account of the user of the cloth transaction content, alternatively, using in the transaction
The electronic signature algorithm of the account address binding of any sub- account of the recipient user of appearance carries out electronics label to the transaction content
Name, can be seen as effectively signing.
Wherein, user issues the concrete mode executed instruction to block chain by above-mentioned Intelligent hardware, in this application not
It is defined;
For example, being that the intelligent contract program issued on block chain for being contracted online is with above-mentioned target program
Example accesses the business page corresponding with above-mentioned target program, and at this in the decentralization system in any node equipment
When having initiated primary signing confirmation on the business page, can further it be performed on the node device by above-mentioned Intelligent hardware
Primary signing confirmation operation (the signing confirmation operation is operation of electronic signature);It is clicked on the Intelligent hardware for example, can be
ACK button operation;Then, it triggers above-mentioned Intelligent hardware and submits one to be used to contract based on the private key that user holds
Confirmation, and executing instruction for electronic signature is carried, then this is executed instruction and is issued on block chain.
Certainly, it will be appreciated by those skilled in the art that, scheme of the present invention is equally applicable to recognize without real name
The block catenary system of card carries out identity identification and certificate distribution without public key authorization mechanism (such as center CA), block is used only
Catenary system Accounting system mounted (soft account) or the Accounting system (hardware account or hardware wallet) of hardware setting equally may be used
Realize the application of a variety of electronic signature algorithms.
It in this application, first can be with after block chain, which receives target user, is distributed to the object content of above-mentioned block chain
The electronic signature algorithm used when signing electronically to the object content is obtained, the electronic signature got is then based on and calculates
Method, and public key corresponding with the private key that the user holds verify the electronic signature of the object content.
Wherein, any node in above-mentioned block chain calculates equipment and adopts when obtaining and signing electronically to the object content
When electronic signature algorithm, when can obtain the electronic signature algorithm used when signing electronically to the object content first
Algorithm ID, be then based on the algorithm ID got and further inquired from the above-mentioned Algorithm mapping table for being distributed to block chain
Electronic signature algorithm corresponding with algorithm ID.
Wherein, in this application, when the electronic signature algorithm used when obtaining and signing electronically to the object content
Algorithm ID when, can specifically be realized by following two mode:
In a kind of embodiment shown, target user, can be by electronics label when issuing object content to block chain
Name algorithm ID is filled in the object content, thus when block chain receives above-mentioned object content, it can be directly out of this target
The algorithm ID of the electronic signature algorithm used when signing electronically to the object content is obtained in appearance.
Wherein, it should be noted that electronics is carried out to the object content when block chain is got from above-mentioned object content
After the algorithm ID of the electronic signature algorithm used when signature, it is based on holding if subsequent above-mentioned target user needs to issue to block chain
The same private key having using it is same electronic signature algorithm signed electronically after object content, then in subsequent issued
In object content, algorithm ID can be no longer carried.I.e. in this application, for the effective private key that user holds,
As long as electronic signature algorithm used by the object content to publication does not change always, then subsequent be based on the private in publication
Key signed electronically after object content when, can no longer need in the object content carry algorithm ID.Certainly, if with
The private key that family is held updates, or the electronic signature algorithm used changes, in the object content of subsequent issued still
Need to carry algorithm ID.In a kind of scene shown, above-mentioned object content specifically can be the target being distributed in block chain
The token transactions content of account address;Wherein, above-mentioned target account address specifically can be payee address (such as payee
Wallet address).
In this case, user can will carry out electronics label after by signing electronically to above-mentioned transaction content
The algorithm ID of used electronic signature algorithm, is recorded in the account address for issuing the target user of the transaction content when name;
And/or in the account address of recipient's account of the object content (in i.e. above-mentioned target account address);
Wherein, which kind of account address above-mentioned algorithm ID specifically carries in, in practical applications, can be based in above-mentioned go
The content publication format for the standard that heart system is supported or actual demand flexibly select, can be only in above-mentioned mesh
It marks and carries algorithm ID in the account address of the initiator user of content, it can also be only the recipient user's of above-mentioned object content
Algorithm ID is carried in account address, alternatively, same in the account address of the initiator user of above-mentioned object content and recipient user
When carry algorithm ID, in this application without being particularly limited to.
In specific implementation, then the format for the account address that can be supported in advance block chain is extended, in account
An algorithm id field is expanded in location;For example, in one implementation, one can be expanded from the format of account address
The field of a 4 byte is used for filling algorithm ID.After user signs electronically to the transaction content, electronics can will be carried out
Used electronic signature algorithm carries in above-mentioned algorithm id field simultaneously when signature.
Correspondingly, obtain sign electronically to the transaction content when use electronic signature algorithm ID when, due to upper
Account address would generally be carried by stating in transaction content, thus above-mentioned calculating equipment can be carried from above-mentioned transaction content it is corresponding
Account address in algorithm id field in, reading used electronic signature algorithm when signing electronically to the transaction content
Algorithm ID.For example, algorithm can be read from the account address for being filled with algorithm ID in extended field according to agreement
ID.
For example, by taking the bit coin transaction system based on block chain as an example, when needs complete a ratio in the transaction system
Special coin transaction, user can be by creating a transaction list, then using the private key held to this in relevant transaction interface
Trading card is signed electronically and then is distributed to block chain;The electronic signature sign test of the transaction list is passed through when block chain receives
Afterwards, which can be included to the distributed data base of block chain and completes to trade;
Wherein, in bit coin transaction system, transaction forms data generally includes input (in) and exports (out) two parts;
Input indicates the revenue source of this transaction, and output indicates expenditure.In input, it will usually carry the initiator of the transaction content
The account address of user and the electronic signature of initiator user;In the output, it will usually carry the bit coin number of this transaction
The account address of amount and recipient.Therefore, in such a case, it is possible to account entrained in input and output
Location format is extended, to carry electronic signature algorithm ID corresponding with account address;For example, initiation that can only in input
Algorithm ID is carried in the account address of square user, can also carry algorithm in the account address of recipient user only in the output
ID, alternatively, in account address in outputting and inputting while carrying algorithm ID.
Certainly, other than except through the mode described above that algorithm ID can be recorded in account address, in reality
In, format can also be issued by the content for the standard supported block chain and be extended, expanded in object content
Then one algorithm id field carries the algorithm ID of electronic signature algorithm used when signing electronically to instruction upper
It states in object content, is distributed to block chain together.
For example, generally including payee address in the transaction content that user issues to block chain, requestee address, being based on
The fields such as the electronic signature of private key submission and public key corresponding with the private key that user holds.It, can be in transaction when realizing
Field extension is carried out on the basis of these information carried in appearance, also regard above-mentioned algorithm ID as an independent field, is carried
In above-mentioned transaction content.In another scene shown, above-mentioned object content is specifically also possible to be distributed to above-mentioned block
The triggering command for the intelligent contract program included in chain.
In this case, recipient's account address of above-mentioned object content, specifically can be the intelligence contract program
Account address.Similar, when signing electronically to above-mentioned object content, used algorithm ID still, can be carried upper
It states in the account address of the initiator user of object content, can also only be carried in the account address of above-mentioned intelligent contract program
Algorithm ID, alternatively, carrying calculation simultaneously in the account address of the initiator user of above-mentioned object content and above-mentioned intelligent contract program
Method ID, specific implementation process repeat no more, and those skilled in the art can be with reference to the record of embodiment before.
Object content is certain, in practical applications, when above-mentioned object content is to be distributed to the intelligence included in above-mentioned block chain
The triggering command of energy contract program, other than the embodiment illustrated above for carrying algorithm ID in account address, also still
It can so be carried algorithm ID as independent field in the mesh in such a way that the field to above-mentioned object content is extended
In the reference format for marking content, specific implementation process is repeated no more.
In the another embodiment shown, target user is when issuing object content to block chain, in above-mentioned target
Algorithm ID can not also be carried in appearance.
In this case, above-mentioned algorithm ID can be closed with the specific information (such as public key) carried in above-mentioned object content
Connection is stored in an independent list, can also be from being based on the mesh so that above-mentioned block chain is when receiving above-mentioned object content
The specific information carried in mark content inquires the electronic signature used when signing electronically to the object content from the list
The algorithm ID of algorithm is then based on algorithm ID and further finds out electricity corresponding with algorithm ID in above-mentioned Algorithm mapping table
Sub- signature algorithm.
For example, since user is distributed to the object content in block chain, it will usually carry the public key information of user, therefore can
A mapping table is pre-created, the public key of user and the mapping relations of electronic signature algorithm ID corresponding with public key are stored;Into
And after block chain receives the object content of user's publication, it can read public key from the object content, then will read
Public key searches corresponding electronic signature algorithm ID as search index from above-mentioned mapping table.
In this application, when in block chain any node calculate equipment by search procedure illustrated above, finally look into
It has found when above-mentioned target user signs electronically to above-mentioned object content after used electronic signature algorithm, then it can be with base
Electronic signature in the corresponding public key of private key that the electronic signature algorithm and above-mentioned target user are held, to the object content
It is verified;If the verification passes, then verification result can be broadcasted into block chain, and in the distributed data base of block chain
When generating new block, it is embodied in the new block.Certainly, if authentication failed, the object content will not be broadcasted and
It includes.
After successfully including above-mentioned object content to block chain, the node device in subsequent block chain can be from block chain
Distributed data base in call these object contents included, completing subsequent processing;For example, working as above-mentioned target
Content is the transaction content for being distributed to target account address, after the transaction content is successfully included to block chain, subsequent block chain
In node device can call these transaction contents to carry out transaction verification, and complete after transaction verification passes through this friendship
Easily, transaction results are issued to block chain;For another example, after above-mentioned object content is to be distributed to the triggering command of intelligent contract program,
The triggering command is called and executed to the subsequent intelligence contract program, then issues implementing result to block chain.
By above embodiments as it can be seen that by supporting a variety of electronic signatures to calculate in the decentralization system based on block chain
On the one hand method allows above-mentioned decentralization system to carry out interface flexibility using the system of different electronic signature algorithms;
For example, for the transaction system of the decentralization based on block chain civil for bit coin, ether mill etc.,
If system can support the electronic signature algorithm of the national standard of country variant simultaneously, the electronic signature of national standard can be used
Algorithm verifies the electronic signature in the block chain of the civil transaction systems such as bit coin, ether mill, to allow bit
Electronic signature in the block chain of the civil transaction systems such as coin, ether mill also has legal effect.
On the other hand, it after any one the electronic signature algorithm failure supported in above-mentioned decentralization system, can only make
At the account failure of the electronic signature algorithm using the failure, and can't be to using other electronic signature algorithms not failed
Account impacts, and only supports uniquely to sign electronically after algorithm failure so as to reduce above-mentioned decentralization system, and makes
At whole system collapse risk.
For example, by taking the transaction system for the decentralization built based on block chain as an example, if the system supports a variety of electronics
Signature algorithm, when any of them electronic signature algorithm broken through by hacker after, using it is other electronic signature algorithms account simultaneously
Security risk will not be faced;Moreover, in such a case, it is possible to by using the money in the account of the electronic signature algorithm of failure
Gold is quickly transferred in the account using other electronic signature algorithms, and then the risk for avoiding whole system from collapsing.
Corresponding with above method embodiment, present invention also provides the embodiments of device.
Fig. 2 is referred to, the application proposes a kind of content distribution apparatus 20, applied to the decentralization system based on block chain
In;
Wherein, Fig. 3 is referred to, as hardware structure involved in the electronic equipment for carrying the content distribution apparatus 20
In, generally include processor, memory, nonvolatile memory, network interface and internal bus etc.;Taking software implementation as an example,
The content distribution apparatus 20 is it is generally understood that the computer program of load in memory, shape after being run by processor
At the logic device that combines of software and hardware, the content distribution apparatus 20 includes:
Receiving module 201 receives the object content that target user issues to the decentralization system;Wherein, described
Object content is signed electronically based on the private key that the target user holds;
Module 202 is obtained, the electronic signature algorithm used when signing electronically to the object content is obtained;Wherein,
The decentralization system supports a variety of electronic signature algorithms;
Authentication module 203, based on the electronic signature algorithm that gets and corresponding with the private key that the target user holds
Public key the electronic signature of the target instruction target word object content is verified, and the object content is received after being verified
It records to the block chain.
In the present embodiment, the acquisition module 202:
Obtain the algorithm ID of the electronic signature algorithm used when signing electronically to the object content;
Corresponding electronic signature algorithm is inquired in the Algorithm mapping table for being distributed to the block chain based on the algorithm ID;
Wherein, a variety of electronic signature algorithms including decentralization system support in the Algorithm mapping table and corresponding calculation
Mapping relations between method ID.
In the present embodiment, the acquisition module 202 further,
The electronic signature algorithm used when signing electronically to the object content is obtained from the object content
Algorithm ID;Alternatively,
The electricity used when being signed electronically based on the information inquiry carried in the object content to the object content
The algorithm ID of sub- signature algorithm.
In the present embodiment, the object content is the transaction content issued to the target account address of the block chain,
Or the triggering command of the intelligent contract program publication into the block chain;The algorithm ID is recorded in the publication object content
Sender user account address in;And/or in the account address of recipient's account of the object content.
In the present embodiment, the account of the target user corresponds to multiple electronic signature algorithms.
In the present embodiment, the account of the target user includes multiple sub- accounts;Distinguish the account address of each sub- account
Different electronic signature algorithms.
In the present embodiment, used electronic signature algorithm when signing electronically to the object content, for institute
State the corresponding electronic signature algorithm in account address of the sender user of object content;Alternatively, to be connect with the object content
The corresponding electronic signature algorithm in the account address of debit's account.
System that the above various embodiments illustrates, module can specifically realize by computer chip or entity, or by having
The product of certain function is realized.It is a kind of typically to realize that equipment is computer or server.Wherein, the specific shape of computer
Formula can be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media
Player, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment
In any several equipment combination.As seen through the above description of the embodiments, those skilled in the art can understand
Recognize that the application can realize by means of software and necessary general hardware platform in ground.Based on this understanding, this Shen
Substantially the part that contributes to existing technology can be embodied in the form of software products technical solution please in other words,
The computer software product can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make
It obtains a computer equipment (can be personal computer, server or the network equipment etc.) and executes each embodiment of the application
Or method described in certain parts of embodiment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality
For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method
Part explanation.The apparatus embodiments described above are merely exemplary, wherein described be used as separate part description
Module may or may not be physically separated, the function of each module can be existed when implementing application scheme
It is realized in same or multiple software and/or hardwares.Some or all of mould therein can also be selected according to the actual needs
Block achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are without creative efforts
To understand and implement.
The above is only the specific embodiment of the application, it is noted that for the ordinary skill people of the art
For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered
It is considered as the protection scope of the application.
Claims (10)
1. a kind of content delivery method, which is characterized in that applied to the decentralization system based on block chain, the method packet
It includes:
Receive the object content that target user issues to the decentralization system;Wherein, the object content is based on described
The private key that target user holds is signed electronically;
Obtain the electronic signature algorithm used when signing electronically to the object content;Wherein, the decentralization system
Support a variety of electronic signature algorithms;
Based on the electronic signature algorithm and public key corresponding with the private key that the target user holds got to the target
The electronic signature of content is verified, and includes the object content to the block chain after being verified.
2. the method according to claim 1, wherein when the acquisition signs electronically to the object content
The electronic signature algorithm of use, comprising:
Obtain the algorithm ID of the electronic signature algorithm used when signing electronically to the object content;
Corresponding electronic signature algorithm is inquired in the Algorithm mapping table for being distributed to the block chain based on the algorithm ID;Its
In, it include a variety of electronic signature algorithms and corresponding algorithm that the decentralization system is supported in the Algorithm mapping table
Mapping relations between ID.
3. according to the method described in claim 2, it is characterized in that, when the acquisition signs electronically to the object content
The algorithm ID of the electronic signature algorithm of use, comprising:
The algorithm of the electronic signature algorithm used when signing electronically to the object content is obtained from the object content
ID;Alternatively,
The electronics label used when being signed electronically based on the information inquiry carried in the object content to the object content
The algorithm ID of name algorithm.
4. according to the method described in claim 3, it is characterized in that, the object content is the target account to the block chain
The transaction content of address publication, or the triggering command of the intelligent contract program publication into the block chain;The algorithm ID note
It records in the account address of sender user for issuing the object content;And/or recipient's account of the object content
In account address.
5. being calculated the method according to claim 1, wherein the account of the target user corresponds to multiple electronic signatures
Method.
6. according to the method described in claim 5, it is characterized in that, the account of the target user includes multiple sub- accounts;Respectively
The respectively different electronic signature algorithm in the account address of sub- account.
7. the method according to claim 1, wherein used when signing electronically to the object content
Sign electronically algorithm, is electronic signature algorithm corresponding with the account address of the sender user of the object content;Alternatively, being
Electronic signature algorithm corresponding with the account address of recipient's account of the object content.
8. a kind of content distribution apparatus, which is characterized in that applied to the decentralization system based on block chain, described device packet
It includes:
Receiving module receives the object content that target user issues to the decentralization system;Wherein, the object content
The private key held based on the target user is signed electronically;
Module is obtained, the electronic signature algorithm used when signing electronically to the object content is obtained;Wherein, described to be based on
The decentralization system of block chain supports a variety of electronic signature algorithms;
Authentication module, based on the electronic signature algorithm and public key pair corresponding with the private key that the target user holds got
The electronic signature of the object content is verified, and includes the object content to the block chain after being verified.
9. device according to claim 8, which is characterized in that the acquisition module:
Obtain the algorithm ID of the electronic signature algorithm used when signing electronically to the object content;
Corresponding electronic signature algorithm is inquired in the Algorithm mapping table for being distributed to the block chain based on the algorithm ID;Its
In, it include a variety of electronic signature algorithms and corresponding algorithm that the decentralization system is supported in the Algorithm mapping table
Mapping relations between ID.
10. according to the method described in claim 9, it is characterized in that, the acquisition module further,
The algorithm of the electronic signature algorithm used when signing electronically to the object content is obtained from the object content
ID;Alternatively,
The electronics label used when being signed electronically based on the information inquiry carried in the object content to the object content
The algorithm ID of name algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710762782.6A CN109428722A (en) | 2017-08-30 | 2017-08-30 | A kind of content delivery method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710762782.6A CN109428722A (en) | 2017-08-30 | 2017-08-30 | A kind of content delivery method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109428722A true CN109428722A (en) | 2019-03-05 |
Family
ID=65503935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710762782.6A Pending CN109428722A (en) | 2017-08-30 | 2017-08-30 | A kind of content delivery method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109428722A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071808A (en) * | 2019-04-09 | 2019-07-30 | 郭浩 | A kind of the secure digital identity verification method and device of block chain user |
CN111008827A (en) * | 2019-11-25 | 2020-04-14 | 深圳前海微众银行股份有限公司 | Cross-chain transaction signature method and device |
CN111369254A (en) * | 2020-03-28 | 2020-07-03 | 北京俩撇科技有限公司 | Method and device for creating block chain account |
CN112543103A (en) * | 2019-09-23 | 2021-03-23 | 百度在线网络技术(北京)有限公司 | Account address generation method and verification method, device, equipment and medium |
WO2022078398A1 (en) * | 2020-10-14 | 2022-04-21 | 深圳壹账通智能科技有限公司 | Blockchain-based sub-account transaction processing method and system, device and medium |
CN114401100A (en) * | 2021-10-02 | 2022-04-26 | 杭州荔藤网络科技有限公司 | Cross-application platform login method and system for block chain account |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016179334A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity management service using a block chain |
CN106487801A (en) * | 2016-11-03 | 2017-03-08 | 江苏通付盾科技有限公司 | Information Authentication method and device based on block chain |
CN106487821A (en) * | 2017-01-04 | 2017-03-08 | 北京天云智汇科技有限公司 | A kind of digital signature method based on internet block chain technology |
CN106503098A (en) * | 2016-10-14 | 2017-03-15 | 中金云金融(北京)大数据科技股份有限公司 | It is built in the block chain cloud service frame system of Paas service layers |
US20170109735A1 (en) * | 2015-07-14 | 2017-04-20 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
CN106909852A (en) * | 2017-03-06 | 2017-06-30 | 广东工业大学 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
CN106910072A (en) * | 2017-02-15 | 2017-06-30 | 捷德(中国)信息科技有限公司 | Digital cash management method and system |
CN107094077A (en) * | 2017-04-21 | 2017-08-25 | 杭州秘猿科技有限公司 | A kind of license chain Accounting system for not limiting signature algorithm |
-
2017
- 2017-08-30 CN CN201710762782.6A patent/CN109428722A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016179334A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity management service using a block chain |
US20170109735A1 (en) * | 2015-07-14 | 2017-04-20 | Fmr Llc | Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems |
CN106503098A (en) * | 2016-10-14 | 2017-03-15 | 中金云金融(北京)大数据科技股份有限公司 | It is built in the block chain cloud service frame system of Paas service layers |
CN106487801A (en) * | 2016-11-03 | 2017-03-08 | 江苏通付盾科技有限公司 | Information Authentication method and device based on block chain |
CN106487821A (en) * | 2017-01-04 | 2017-03-08 | 北京天云智汇科技有限公司 | A kind of digital signature method based on internet block chain technology |
CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
CN106910072A (en) * | 2017-02-15 | 2017-06-30 | 捷德(中国)信息科技有限公司 | Digital cash management method and system |
CN106909852A (en) * | 2017-03-06 | 2017-06-30 | 广东工业大学 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
CN107094077A (en) * | 2017-04-21 | 2017-08-25 | 杭州秘猿科技有限公司 | A kind of license chain Accounting system for not limiting signature algorithm |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071808A (en) * | 2019-04-09 | 2019-07-30 | 郭浩 | A kind of the secure digital identity verification method and device of block chain user |
CN112543103A (en) * | 2019-09-23 | 2021-03-23 | 百度在线网络技术(北京)有限公司 | Account address generation method and verification method, device, equipment and medium |
CN111008827A (en) * | 2019-11-25 | 2020-04-14 | 深圳前海微众银行股份有限公司 | Cross-chain transaction signature method and device |
CN111369254A (en) * | 2020-03-28 | 2020-07-03 | 北京俩撇科技有限公司 | Method and device for creating block chain account |
WO2022078398A1 (en) * | 2020-10-14 | 2022-04-21 | 深圳壹账通智能科技有限公司 | Blockchain-based sub-account transaction processing method and system, device and medium |
CN114401100A (en) * | 2021-10-02 | 2022-04-26 | 杭州荔藤网络科技有限公司 | Cross-application platform login method and system for block chain account |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7269944B2 (en) | A multi-authorization system that uses M out of N keys to generate transaction addresses | |
EP3721578B1 (en) | Methods and systems for recovering data using dynamic passwords | |
TWI694709B (en) | Blockchain-based electronic signature method and device, and electronic equipment | |
CN109428722A (en) | A kind of content delivery method and device | |
CN107358440B (en) | Method and system for customized tracking of digital currency | |
TW202001654A (en) | Block chain-based content verification method and device, and electronic device | |
US20180349894A1 (en) | System of hardware and software to prevent disclosure of personally identifiable information, preserve anonymity and perform settlement of transactions between parties using created and stored secure credentials | |
CN106161359A (en) | The method and device of certification user, the method and device of registration wearable device | |
CA2914956C (en) | System and method for encryption | |
CN105991287A (en) | Signature data generation and fingerprint authentication request method and device | |
WO2020107232A1 (en) | Blockchain-based hardware wallet, transaction system, and storage medium | |
US20200082388A1 (en) | Authenticating server and method for transactions on blockchain | |
KR102248270B1 (en) | Node device constituting a block-chain network and an operation method of the node device | |
CN108092778B (en) | Method and system for inquiring related account based on digital currency wallet | |
CN109241726A (en) | A kind of user authority control method and device | |
KR102383492B1 (en) | Method for managing user key using smart contract on blockchain | |
TWM589842U (en) | Mobile trading desk with real-name phone | |
WO2019212829A1 (en) | Techniques for performing secure operations | |
CN109388923B (en) | Program execution method and device | |
US20230360007A1 (en) | System and method for secure and traceable fund transfer operation through a distributed ledger | |
CN110619566A (en) | On-chain pledge asset return system and method through on-chain digital currency settlement | |
KR20190132160A (en) | Method for Providing Cryptocurrency Trading Platform by using Smart Contract | |
CN107947934A (en) | The fingerprint recognition Verification System and method of mobile terminal based on banking system | |
TWI758648B (en) | Mobile trading counter implemented by real-name phone, and trading method by using the same | |
KR20240014317A (en) | The ownership proof system of personal signature through NFT issuance about personal signature data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190305 |
|
RJ01 | Rejection of invention patent application after publication |