CN111401888A - Method and device for generating multiple signature wallets - Google Patents

Method and device for generating multiple signature wallets Download PDF

Info

Publication number
CN111401888A
CN111401888A CN202010141188.7A CN202010141188A CN111401888A CN 111401888 A CN111401888 A CN 111401888A CN 202010141188 A CN202010141188 A CN 202010141188A CN 111401888 A CN111401888 A CN 111401888A
Authority
CN
China
Prior art keywords
public
participant
public key
generating
multiple signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010141188.7A
Other languages
Chinese (zh)
Other versions
CN111401888B (en
Inventor
杨帅
黄何
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Tongchuang Jialian Technology Co ltd
Original Assignee
Hainan Xinruan Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Xinruan Software Co ltd filed Critical Hainan Xinruan Software Co ltd
Priority to CN202010141188.7A priority Critical patent/CN111401888B/en
Publication of CN111401888A publication Critical patent/CN111401888A/en
Application granted granted Critical
Publication of CN111401888B publication Critical patent/CN111401888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures

Abstract

The application discloses a method and a device for generating a multiple signature wallet, wherein the method comprises the following steps: acquiring the number of participants of the multiple signature addresses; generating a public and private key pair of a sponsor, the public and private key pair comprising a public key and a private key; receiving a public key for each participant; generating multiple signature addresses according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature addresses, the public key of the initiator and the public keys of all participants; and the terminals of the participants receive the notification information, verify the ownership of the public keys of the participants, and add the multiple signature addresses into the multiple signature wallets if the verification is passed. In the embodiment of the application, the multiple signature addresses are automatically pushed to the terminals of the participants, so that the management difficulty can be reduced, and the usability of the multiple signature addresses is greatly improved.

Description

Method and device for generating multiple signature wallets
Technical Field
The present application relates to the field of digital asset transactions, and in particular, to a method and apparatus for generating a multiple signature wallet.
Background
Multiple signature addresses are one specific type of digital signature that would allow more than two users to sign a document as a group. A simple analogy is to consider a safe with two locks and two keys. One key is held by Alice and the other is mastered by Bob. The only rule for opening the safe is that both persons provide keys at the same time, and the safe cannot be opened when only one key is available. That is, the multi-signed address where the funds are stored is also only accessible by using 2 or more re-signatures. Thus, an additional layer of security may be created for the user's digital funds.
The current multiple signature address creation mode has the defects that the technical threshold is higher, and certain code knowledge needs to be mastered. Meanwhile, there is a problem that it is difficult to distribute and manage the control private key. Therefore, how to solve the usability of the multiple signature addresses becomes a problem to be solved urgently in the industry.
Disclosure of Invention
The application provides a method and a device for generating a multiple signature wallet, which aim to solve the problem that multiple signature addresses are difficult to apply in the prior art.
In a first aspect, the present application provides a method of generating a multiple signature wallet, the method comprising:
acquiring the number of participants of the multiple signature addresses;
generating a public and private key pair of a sponsor, the public and private key pair comprising a public key and a private key;
receiving a public key for each participant;
generating multiple signature addresses according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature addresses, the public key of the initiator and the public keys of all participants;
and the terminals of the participants receive the notification information, verify the ownership of the public keys of the participants, and add the multiple signature addresses into the multiple signature wallets if the verification is passed.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the multiple signed address conforms to a BIP48 protocol.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the public key of each participant and the public key of the initiator generate the multiple signature address through a hash operation.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the verifying ownership of the public key of the participant includes:
receiving a password input by a user, and judging whether the password is the same as a local password or not;
if the private keys are the same, acquiring the private key of the participant, and generating a target public key according to the private key of the participant;
and judging whether the target public key is the same as the public key of the participant, and if so, passing the verification.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, the generating a public-private key pair of an initiator includes: and generating a public and private key pair conforming to the BIP44 protocol according to the running elliptic curve encryption algorithm.
In a second aspect, the present application provides an apparatus for generating a multiple signature wallet, the apparatus comprising:
the acquiring unit is used for acquiring the number of the participants of the multiple signature addresses;
the device comprises a first generation unit, a second generation unit and a third generation unit, wherein the first generation unit is used for generating a public and private key pair of a sponsor, and the public and private key pair comprises a public key and a private key;
a receiving unit for receiving a public key of each participant;
the second generating unit is used for generating a multiple signature address according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature address, the public key of the initiator and the public keys of all participants;
and the joining unit is used for receiving the notification information by the terminals of the participants, verifying the ownership of the public key of the participants, and joining the multiple signature addresses into the multiple signature wallets if the verification is passed.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the multiple-signature address conforms to a BIP48 protocol.
With reference to the second aspect, in a second possible implementation manner of the second aspect, the public key of each participant and the public key of the initiator generate the multiple signature address through a hash operation.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the step of verifying ownership of the public key of the participant includes:
receiving a password input by a user, and judging whether the password is the same as a local password or not;
if the private keys are the same, acquiring the private key of the participant, and generating a target public key according to the private key of the participant;
and judging whether the target public key is the same as the public key of the participant, and if so, passing the verification.
With reference to the second aspect, in a fourth possible implementation manner of the second aspect, the generating a public-private key pair of the initiator includes: and generating a public and private key pair conforming to the BIP44 protocol according to the running elliptic curve encryption algorithm.
According to the technical scheme, the method and the device for generating the multiple signature wallets comprise the following steps: acquiring the number of participants of the multiple signature addresses; generating a public and private key pair of a sponsor, the public and private key pair comprising a public key and a private key; receiving a public key for each participant; generating multiple signature addresses according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature addresses, the public key of the initiator and the public keys of all participants; and the terminals of the participants receive the notification information, verify the ownership of the public keys of the participants, and add the multiple signature addresses into the multiple signature wallets if the verification is passed. In the embodiment of the application, the multiple signature addresses are automatically pushed to the terminals of the participants, so that the management difficulty can be reduced, and the usability of the multiple signature addresses is greatly improved.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flow chart of a first embodiment of a method of generating a multiple signature wallet provided herein;
fig. 2 is a flowchart of a fourth embodiment of a method for generating a multiple signature wallet provided herein;
fig. 3 is a schematic structural diagram of a block grouping generation apparatus in a promiscuous mode according to the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
The current multiple signature address creation mode has the defects that the technical threshold is higher, and certain code knowledge needs to be mastered. Meanwhile, there is a problem that it is difficult to distribute and manage the control private key. Therefore, how to solve the usability of the multiple signature addresses becomes a problem to be solved urgently in the industry.
Referring to fig. 1, a first embodiment of a method for generating a multiple-signature wallet provided by the present application is applied to the field of cryptographic money wallets, and the method includes a process of generating a multiple-signature address and adding the multiple-signature address to the multiple-signature wallet, and specifically, the method includes:
s100, acquiring the number of the participants of the multiple signature addresses; specifically, the initiator may set the number of participants who generate the multiple signature addresses through the terminal of the initiator, for example, the number of participants may be two, three, four, or the like. The terminal may be a mobile terminal, such as a mobile phone.
S200, generating a public and private key pair of an initiator, wherein the public and private key pair comprises a public key and a private key; it should be noted that the private key of the initiator is stored in the terminal of the initiator.
And S300, receiving the public key of each participant. Specifically, the generation process of the public and private key pair of the participant is the same as that of the public and private key pair of the initiator, the public and private key pair of the participant is generated at the terminal of the participant, the public key of the participant is sent to the terminal of the initiator, and the private key of the participant is stored at the terminal of the participant.
S400, generating a multiple signature address according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature address, the public key of the initiator and the public keys of all participants;
it should be noted that, in the embodiment of the present application, the public key of each participant, the public key of the initiator, and the number of people are processed, and then the multiple signature addresses are generated. The multiple signature addresses may be used for reception of digital assets. The multiple signature addresses generated by the public keys of multiple persons can ensure the safety of the digital assets corresponding to the multiple signature addresses. And after the generation of the multiple signature addresses is finished, automatically sending notification information to the terminals of all participants. The notification information comprises the multiple signature addresses, the public key of the initiator and the public keys of all participants, and the public key of the initiator and the public keys of all participants are sent to the terminal of each participant, so that the participants can record and generate the public keys of the multiple signature addresses conveniently, all the participants and the initiator can manage each other conveniently, and the availability of the multiple signature addresses is improved.
And S500, the terminals of the participants receive the notification information, the ownership of the public key of the participants is verified, and if the authentication is passed, the multiple signature addresses are led into the multiple signature wallets. In the embodiment of the application, the ownership of the public key of the participant is verified by using the private key stored in the participant terminal, and specifically, the private key is stored in the security sandbox. The embodiment of the application can transfer the digital assets at different terminals at any time by means of the private key. It is also noted that the multiple signature wallets are pre-existing.
As can be seen from the above embodiments, a first embodiment of the method for generating a multiple signature wallet of the present application includes: acquiring the number of participants of the multiple signature addresses; generating a public and private key pair of a sponsor, the public and private key pair comprising a public key and a private key; receiving a public key for each participant; generating multiple signature addresses according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature addresses, the public key of the initiator and the public keys of all participants; and the terminals of the participants receive the notification information, verify the ownership of the public keys of the participants, and add the multiple signature addresses into the multiple signature wallets if the verification is passed. In the embodiment of the application, the multiple signature addresses are automatically pushed to the terminals of the participants, so that the management difficulty can be reduced, and the usability of the multiple signature addresses is greatly improved.
A second embodiment of a method for generating a multi-signature wallet is provided, the multi-signature address conforming to the BIP48 protocol. In particular, the method conforms to the bip48 specification, and all user actions are based on cryptographic principles.
In a third embodiment of the method for generating a multiple signature wallet provided by the present application, the public key of each participant and the public key of the initiator generate multiple signature addresses through hash operations. Specifically, the hash operation is to convert an input (also called a pre-mapped pre-image) of an arbitrary length into an output of a fixed length by a hash algorithm, and the output is a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length.
Referring to fig. 2, in a fourth embodiment of the method for generating a multiple signature wallet provided by the present application, the step of verifying ownership of the public key of the participant comprises:
s501, receiving a password input by a user, and judging whether the password is the same as a local password;
s502, if the private keys are the same, obtaining the private key of the participant, and generating a target public key according to the private key of the participant;
s503, judging whether the target public key is the same as the public key of the participant, and if so, passing the verification.
Specifically, the private key is stored in a secure sandbox, and the local password is set by the user and used for verifying whether the user can open the secure sandbox. If the password input by the user is the same as the local password, the security sandbox can be opened to obtain the private key of the participant in the security sandbox. In some embodiments, a private key of a participant is used to generate a corresponding target public key through elliptic curve multiplication m × G, the target public key is used for comparison with a public key of the participant in the notification message sent by the initiator terminal, if the target public key is the same as the public key of the participant, the verification is passed, and the multiple signature address can be added into the multiple signature wallet; if the target public key and the participant's public key are different, the verification fails and the multiple signature address cannot be added to the multiple signature wallet.
As can be seen from the above embodiments, in a fourth embodiment of the method for generating a multiple-signature wallet of the present application, and in a third embodiment of the method for generating a multiple-signature wallet, the step of verifying ownership of the public key of the participant comprises: receiving a password input by a user, and judging whether the password is the same as a local password or not; if the private keys are the same, acquiring the private key of the participant, and generating a target public key according to the private key of the participant; and judging whether the target public key is the same as the public key of the participant, and if so, passing the verification. In the embodiment of the application, the ownership of the public key of the participant is verified through the private key, so that the safety of the participant in operating the multiple signature addresses can be ensured.
In a fifth embodiment of the method for generating a multiple-signature wallet, the step of generating a public-private key pair of an originator comprises: and generating a public and private key pair conforming to the BIP44 protocol according to the running elliptic curve encryption algorithm.
Referring to fig. 3, the present application provides an apparatus for generating a multiple signature wallet, the apparatus comprising:
an acquisition unit 100 for acquiring the number of persons who participate in the multiple signature addresses;
a first generating unit 200, configured to generate a public and private key pair of a sponsor, where the public and private key pair includes a public key and a private key;
a receiving unit 300 for receiving a public key of each participant;
a second generating unit 400, configured to generate a multiple signature address according to the public key of each participant and the public key of the initiator, and send notification information to the terminal of each participant, where the notification information includes the multiple signature address, the public key of the initiator, and the public keys of all participants;
and the joining unit 500 is used for receiving the notification information by the terminals of the participants, verifying the ownership of the public keys of the participants, and joining the multiple signature addresses into the multiple signature wallets if the verification is passed.
In another embodiment of the present application, a loading apparatus for promiscuous mode block packets is provided, wherein the multiple signature addresses conform to the BIP48 protocol.
In another embodiment of the present application, a loading apparatus for block grouping in promiscuous mode is provided, wherein the public key of each participant and the public key of the initiator generate multiple signature addresses by a hash operation.
In another embodiment of the present application, the method for verifying ownership of a public key of a participant comprises:
receiving a password input by a user, and judging whether the password is the same as a local password or not;
if the private keys are the same, acquiring the private key of the participant, and generating a target public key according to the private key of the participant;
and judging whether the target public key is the same as the public key of the participant, and if so, passing the verification.
In another embodiment of the present application provides a loading device of promiscuous mode block grouping, the step of generating a public-private key pair of an originator comprises: and generating a public and private key pair conforming to the BIP44 protocol according to the running elliptic curve encryption algorithm.
In a specific implementation, the present application further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments of the method for prompting a process of transferring a digital asset address provided by the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a Read-only Memory (ROM) or a Random Access Memory (RAM).
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The same and similar parts in the various embodiments in this specification may be referred to each other. In particular, for the embodiments of the secure network middleware for identity authentication and the implementation method and apparatus thereof, since they are substantially similar to the embodiments of the method, the description is simple, and for the relevant points, reference may be made to the description in the embodiments of the method.
The above-described embodiments of the present application do not limit the scope of the present application.

Claims (10)

1. A method of generating a multiple signature wallet, the method comprising:
acquiring the number of participants of the multiple signature addresses;
generating a public and private key pair of a sponsor, the public and private key pair comprising a public key and a private key;
receiving a public key for each participant;
generating multiple signature addresses according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature addresses, the public key of the initiator and the public keys of all participants;
and the terminals of the participants receive the notification information, verify the ownership of the public keys of the participants, and add the multiple signature addresses into the multiple signature wallets if the verification is passed.
2. The method of claim 1, wherein the multiple signed address conforms to the BIP48 protocol.
3. The method of claim 1, wherein the public key of each participant and the public key of the initiator are hashed to generate the multiple-signature address.
4. The method of claim 1, wherein the step of verifying ownership of the participant's public key comprises:
receiving a password input by a user, and judging whether the password is the same as a local password or not;
if the private keys are the same, acquiring the private key of the participant, and generating a target public key according to the private key of the participant;
and judging whether the target public key is the same as the public key of the participant, and if so, passing the verification.
5. The method of claim 1, wherein the step of generating a public-private key pair for the originator comprises: and generating a public and private key pair conforming to the BIP44 protocol according to the running elliptic curve encryption algorithm.
6. An apparatus for generating a multiple signature wallet, the apparatus comprising:
the acquiring unit is used for acquiring the number of the participants of the multiple signature addresses;
the device comprises a first generation unit, a second generation unit and a third generation unit, wherein the first generation unit is used for generating a public and private key pair of a sponsor, and the public and private key pair comprises a public key and a private key;
a receiving unit for receiving a public key of each participant;
the second generating unit is used for generating a multiple signature address according to the public key of each participant and the public key of the initiator, and sending notification information to the terminal of each participant, wherein the notification information comprises the multiple signature address, the public key of the initiator and the public keys of all participants;
and the joining unit is used for receiving the notification information by the terminals of the participants, verifying the ownership of the public key of the participants, and joining the multiple signature addresses into the multiple signature wallets if the verification is passed.
7. The apparatus of claim 6, wherein the multi-signature address conforms to the BIP48 protocol.
8. The apparatus of claim 6, wherein the public key of each participant and the public key of the initiator are hashed to generate the multiple-signature address.
9. The apparatus of claim 6, wherein the step of verifying ownership of the participant's public key comprises:
receiving a password input by a user, and judging whether the password is the same as a local password or not;
if the private keys are the same, acquiring the private key of the participant, and generating a target public key according to the private key of the participant;
and judging whether the target public key is the same as the public key of the participant, and if so, passing the verification.
10. The apparatus of claim 6, wherein the step of generating a public-private key pair for the originator comprises: and generating a public and private key pair conforming to the BIP44 protocol according to the running elliptic curve encryption algorithm.
CN202010141188.7A 2020-03-05 2020-03-05 Method and device for generating multi-signature wallet Active CN111401888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010141188.7A CN111401888B (en) 2020-03-05 2020-03-05 Method and device for generating multi-signature wallet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010141188.7A CN111401888B (en) 2020-03-05 2020-03-05 Method and device for generating multi-signature wallet

Publications (2)

Publication Number Publication Date
CN111401888A true CN111401888A (en) 2020-07-10
CN111401888B CN111401888B (en) 2023-07-07

Family

ID=71430529

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010141188.7A Active CN111401888B (en) 2020-03-05 2020-03-05 Method and device for generating multi-signature wallet

Country Status (1)

Country Link
CN (1) CN111401888B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184960A (en) * 2020-09-28 2021-01-05 杭州安恒信息技术股份有限公司 Intelligent lock control method and device, intelligent lock system and storage medium
CN114169888A (en) * 2021-12-07 2022-03-11 北京众信星空网络技术有限公司 Universal type multi-signature supporting encryption currency custody method

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533661A (en) * 2016-10-25 2017-03-22 北京大学 Online generation method for cryptographic currency address based on combined public key
CN106533678A (en) * 2016-07-06 2017-03-22 天津米游科技有限公司 Multi-signature-based login method and system thereof
US20170228727A1 (en) * 2016-02-10 2017-08-10 Align Commerce Corporation Conditional payment processing using multi-signature addresses
CN107710258A (en) * 2015-03-27 2018-02-16 黑金币公司 System and method for personal identification and checking
US20180240107A1 (en) * 2015-03-27 2018-08-23 Black Gold Coin, Inc. Systems and methods for personal identification and verification
CN108776896A (en) * 2018-06-04 2018-11-09 中钞信用卡产业发展有限公司杭州区块链技术研究院 Digital cash wallet business management method based on multi-signature and system
US20190080318A1 (en) * 2017-05-05 2019-03-14 Beijing Coldlar Information Technology Co., Ltd. Virtual currency storage and transaction system and using method thereof
CN109478307A (en) * 2016-07-29 2019-03-15 区块链控股有限公司 Method and system for realizing block chain
CN109615515A (en) * 2018-12-05 2019-04-12 腾讯科技(深圳)有限公司 Credits voucher transfer method, device, electronic equipment and storage medium
CN109801071A (en) * 2019-01-17 2019-05-24 厦门美图之家科技有限公司 Password remapping method and device
CN110070447A (en) * 2019-03-15 2019-07-30 深圳壹账通智能科技有限公司 Target based on intelligent contract and multi-signature is raised capital's method, medium and equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107710258A (en) * 2015-03-27 2018-02-16 黑金币公司 System and method for personal identification and checking
US20180240107A1 (en) * 2015-03-27 2018-08-23 Black Gold Coin, Inc. Systems and methods for personal identification and verification
US20170228727A1 (en) * 2016-02-10 2017-08-10 Align Commerce Corporation Conditional payment processing using multi-signature addresses
CN106533678A (en) * 2016-07-06 2017-03-22 天津米游科技有限公司 Multi-signature-based login method and system thereof
CN109478307A (en) * 2016-07-29 2019-03-15 区块链控股有限公司 Method and system for realizing block chain
CN106533661A (en) * 2016-10-25 2017-03-22 北京大学 Online generation method for cryptographic currency address based on combined public key
US20190080318A1 (en) * 2017-05-05 2019-03-14 Beijing Coldlar Information Technology Co., Ltd. Virtual currency storage and transaction system and using method thereof
CN108776896A (en) * 2018-06-04 2018-11-09 中钞信用卡产业发展有限公司杭州区块链技术研究院 Digital cash wallet business management method based on multi-signature and system
CN109615515A (en) * 2018-12-05 2019-04-12 腾讯科技(深圳)有限公司 Credits voucher transfer method, device, electronic equipment and storage medium
CN109801071A (en) * 2019-01-17 2019-05-24 厦门美图之家科技有限公司 Password remapping method and device
CN110070447A (en) * 2019-03-15 2019-07-30 深圳壹账通智能科技有限公司 Target based on intelligent contract and multi-signature is raised capital's method, medium and equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙国梓等: ""区块链技术安全威胁分析"", 《南京邮电大学学报(自然科学版)》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184960A (en) * 2020-09-28 2021-01-05 杭州安恒信息技术股份有限公司 Intelligent lock control method and device, intelligent lock system and storage medium
CN114169888A (en) * 2021-12-07 2022-03-11 北京众信星空网络技术有限公司 Universal type multi-signature supporting encryption currency custody method
CN114169888B (en) * 2021-12-07 2022-06-28 北京众信星空网络技术有限公司 Universal type cryptocurrency custody method supporting multiple signatures

Also Published As

Publication number Publication date
CN111401888B (en) 2023-07-07

Similar Documents

Publication Publication Date Title
CN109583887B (en) Block chain transaction method and device
CN110958110B (en) Block chain private data management method and system based on zero knowledge proof
EP4220515A1 (en) Blockchain-implemented method and system
CN108352015A (en) The anti-loss storage of Secure for the system combination wallet management system based on block chain and encryption key transfer
CN110289968B (en) Private key recovery method, collaborative address creation method, collaborative address signature device and storage medium
CN112119611A (en) Computer-implemented system and method for performing atomic exchanges using blockchains
KR20170057549A (en) Large simultaneous digital signature service system based on hash function and method thereof
CN106576043A (en) Virally distributable trusted messaging
CN111125781B (en) File signature method and device and file signature verification method and device
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
CN113743939A (en) Identity authentication method, device and system based on block chain
CN111429138A (en) Block link point data safety interaction method and first interaction node
US20210241270A1 (en) System and method of blockchain transaction verification
CN113468601B (en) Data privacy fusion method and device
CN112003696A (en) SM9 key generation method, system, electronic equipment, device and storage medium
CN111737715A (en) Decentralized electronic contract online signing method and system
CN110690969B (en) Method and system for achieving bidirectional SSL/TLS authentication through multiparty cooperation
CN111401888B (en) Method and device for generating multi-signature wallet
CN113095826A (en) Covert communication method and system based on block chain multi-signature
CN111177699B (en) Data extraction method, secret key generation method, unlocking method and device
CN113468580B (en) Multi-party collaborative signature method and system
CN115868141A (en) Techniques for single-round multi-party computation of digital signatures
CN113328854A (en) Service processing method and system based on block chain
KR102517001B1 (en) System and method for processing digital signature on a blockchain network
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230418

Address after: No. 681, 6th Floor, Building 1, No. 158 West Fourth Ring North Road, Haidian District, Beijing, 100142

Applicant after: Beijing Gengjin Technology Co.,Ltd.

Address before: 571924 building 8830, Walker Park, Hainan Ecological Software Park, Haikou old town high tech industry demonstration zone, Hainan Province

Applicant before: HAINAN XINRUAN SOFTWARE Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230803

Address after: No. 1303, 13th Floor, Building 1, No. 166 Tianfu Second Street, Chengdu High tech Zone, China (Sichuan) Pilot Free Trade Zone, Chengdu, Sichuan, 610095

Patentee after: Chengdu Tongchuang Jialian Technology Co.,Ltd.

Address before: No. 681, 6th Floor, Building 1, No. 158 West Fourth Ring North Road, Haidian District, Beijing, 100142

Patentee before: Beijing Gengjin Technology Co.,Ltd.

TR01 Transfer of patent right