CN111539729A - Transaction signature checking method and device based on block chain - Google Patents

Transaction signature checking method and device based on block chain Download PDF

Info

Publication number
CN111539729A
CN111539729A CN202010432899.XA CN202010432899A CN111539729A CN 111539729 A CN111539729 A CN 111539729A CN 202010432899 A CN202010432899 A CN 202010432899A CN 111539729 A CN111539729 A CN 111539729A
Authority
CN
China
Prior art keywords
transaction
signature
initiator
block chain
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010432899.XA
Other languages
Chinese (zh)
Inventor
晏敏敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Liangzuo Technology Co Ltd
Original Assignee
Beijing Liangzuo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Liangzuo Technology Co Ltd filed Critical Beijing Liangzuo Technology Co Ltd
Priority to CN202010432899.XA priority Critical patent/CN111539729A/en
Publication of CN111539729A publication Critical patent/CN111539729A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction

Abstract

The embodiment of the application discloses a transaction signature verification method and device based on a block chain. The block chain adopts an authorization node as a common identification node, adopts a practical Byzantine common identification mechanism, a raft common identification mechanism and the like as common identification mechanisms, an account list without signature consisting of ore excavation accounts of the common identification nodes is arranged on the block chain, then the transaction created by the account without signature is not required, a signature field of the transaction is empty, when the signature of the transaction is verified, only an initiator of the transaction needs to be confirmed in the account list without signature, the signature of a block to which the transaction belongs is ensured to be effective through the common identification node, so that the repeated signature and signature verification are avoided under the condition of ensuring the safety of transaction data, and the efficiency of newly creating the transaction and outputting the block is improved.

Description

Transaction signature checking method and device based on block chain
Technical Field
The application relates to the technical field of block chains, in particular to a transaction signature checking method and device based on a block chain.
Background
The block chain network, also called distributed ledger network, is characterized by decentralization, openness and transparency and traceable data history. In the field of blockchain technology, accounts and transactions are essential elements. An account corresponds to a set of keys generated using an asymmetric cryptographic algorithm, the account holder signs transactions using the private key portion of the key, each transaction must contain a signature of the account that created the transaction, so the transaction initiated by the account address is actually the transaction initiated by the holder of the key. Due to the decentralized nature of the prior art blockchain technology, transactions performed in the blockchain also need to be known by nodes in the blockchain before being stored in the blockchain (i.e., uplink). The signature and the verification of the transaction both need to consume precious system resources, and restrict the block output speed. The mining accounts of the consensus nodes of some block chains are often accounts for creating a large number of transactions, and the accounts of the consensus nodes need to sign the transactions and the blocks containing the transactions, thereby repeatedly consuming system resources for signature and signature verification. Therefore, an invention is needed to reduce the work of signature under the condition of ensuring the safety of transaction data, further reduce the work of signature verification and improve the efficiency of newly creating transactions and exporting blocks.
Disclosure of Invention
The embodiment of the application provides a transaction signature checking method and device based on a block chain, so that repeated signature and signature checking work is reduced, and the efficiency of newly creating a transaction and outputting a block is improved.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
the transaction verification method based on the block chain provided by the embodiment of the application comprises the following steps:
if the signature of the transaction is null, judging whether the initiator of the transaction is in a non-signature account list of the block chain;
and if the initiator of the transaction is not in the exempt account list of the blockchain, rejecting the transaction, otherwise, the transaction signature passes the verification.
The nodes participating in the consensus accounting in the block chain are all authorized nodes, and the available consensus mechanisms of the block chain comprise a practical Byzantine consensus mechanism and a raft consensus mechanism.
Wherein the account of the endorsement-free account list is a mining account of a node participating in consensus accounting in the blockchain.
Preferably, the transaction includes a label-free indicia.
Preferably, the transaction may be modified by an out-of-block node of the block chain before adding a new block for consensus, the modification comprising replacing a valid random number, replacing a current timestamp.
Preferably, the consensus nodes of the blockchain ensure authenticity of the identity of the initiator of the transaction during synchronization using an anti-counterfeiting mechanism, wherein the mechanism includes that the consensus nodes of the blockchain only receive the transaction provided by other consensus nodes for the initiator to be the mining account, the initiator of the transaction provides a hash signature for a hash list of batch transactions including the transaction, and only the block-out node of the blockchain is responsible for providing the transaction of the initiator to be the mining account.
Preferably, the blockchain consensus node receives a transaction pre-verification of the identity of the client, provided by the client, of the mining account of the consensus node from the initiator.
Preferably, the block head of the block to which the transaction belongs includes a list of the account free numbers used for all transactions in the block.
The embodiment of the present application further provides a trade is tested and is signed device based on block chain, which is characterized in that, include:
the list module is used for recording a list of the non-signed accounts on the block chain;
a verification module to verify that an initiator of the transaction is in a check-free account list of the blockchain;
a transaction module for adding a label-free tag to the transaction;
and the modification module is used for modifying the transaction by the block-out node before uplink, wherein the modification comprises the replacement of an effective random number and the replacement of a current timestamp.
The authority module is used for receiving the identity authority of the client which is verified before the initiator provides the transaction for the mining account of the consensus node;
the anti-counterfeiting module is used for ensuring the authenticity of the identity of the initiator of the transaction, and comprises that the common identification nodes of the block chain only receive the transaction of the initiator for the mining account provided by other common identification nodes, the initiator of the transaction provides a hash signature for a hash list of batch transactions containing the transaction, and only the block outlet node of the block chain is responsible for providing the transaction of the initiator for the mining account.
According to the transaction verification method and device provided by the invention, on one hand, an authorization node is adopted as a common identification node for a block chain, a practical Byzantine common identification mechanism, a raft common identification mechanism and the like are adopted as common identification mechanisms, a signing-free account list consisting of mining accounts of the common identification nodes is arranged on the block chain, then a signature is not required for a transaction created by the signing-free account, a signature field of the transaction is empty, only a sponsor of the transaction needs to be confirmed in the signing-free account list when the signature of the transaction is verified, the signature of the block to which the transaction belongs is ensured to be effective through the common identification node, on the other hand, the identity of a client is verified before the initiator provided by the client is the transaction of the mining accounts of the common identification nodes, and only the initiator provided by other common identification nodes is received to be the transaction of the mining accounts of the common identification nodes during synchronous transaction of the common identification nodes, The initiator provides a hash signature containing a hash list of batch transactions, and the mining account of the block-out node completely undertakes the work of the transactions, and the measures prevent people from forging the transactions, so that repeated signature and signature verification are avoided under the condition of ensuring the safety of data transactions, and the efficiency of newly creating transactions and block-out is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a schematic diagram of a transaction signature verification method based on a blockchain according to an embodiment of the present application;
fig. 2 is a schematic diagram of a transaction signature verification device based on a block chain according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a transaction signature verification method and device based on a block chain.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
It should be noted that, the nodes participating in the consensus accounting in the blockchain are all authorized nodes, and the available consensus mechanisms of the blockchain include a practical byzantine consensus mechanism and a raft consensus mechanism. The invention does not support the mechanisms such as workload certification mechanism, rights and interests certification mechanism, etc., and the mechanisms do not limit the number of the consensus nodes and do not need additional authorization or permission before any node joins the consensus accounting. On the contrary, in the consensus mechanism adopted by the invention, the number of the consensus nodes is limited, and the consensus accounting can be participated only after authorization or permission.
Note that the account of the endorsement-free account list is a mining account of a node participating in the consensus accounting in the blockchain, so that although the transaction is not signed by the endorsement-free account, the security of the transaction is also confirmed by signing the block to which the transaction belongs.
Fig. 1 is a schematic diagram of a transaction signature verification method based on a blockchain according to an embodiment of the present application.
S101, checking whether the transaction signature is null.
If the signature of the transaction is not null, the signature is verified by adopting the common method, and the description of the invention is not repeated.
If the signature of the transaction is null, the next step is taken.
S102, confirming whether the initiator of the transaction is in the free-sign account list.
The transaction contains an initiator field through which the transaction was created by who is directly obtained.
And if the value of the initiator of the transaction is null, reporting an error by default and rejecting the transaction.
And acquiring a sign-free account list of the block chain, judging whether the initiator of the transaction is in the sign-free account list, if not, reporting an error and rejecting the transaction.
Preferably, the transaction includes a label-free indicia. The non-signed mark can distinguish the transaction with the common signature from the transaction, and the target chain can omit the verification signature according to the non-signed mark and defaults that the transaction signature passes the verification in the cross-chain process of the transaction data. Therefore, the transaction can be effectively prevented from being judged as an invalid transaction by the target chain. Further, preferably, if no label-free indicia is included, an error is reported and the transaction is denied.
And S103, signature verification of the transaction is passed.
If the initiator of the transaction is in the endorsement-free account list, the signature verification of the transaction is passed.
Preferably, the block head of the block to which the transaction belongs includes a list of the account free numbers used for all transactions in the block. Thus, when a block is received, the non-signed account used in the block can be obtained from the block head, and the non-signed account list does not need to be confirmed in the block chain.
It should be noted that the transaction may be modified by the out-of-block node of the block chain before adding a new block for consensus, the modification including replacing the valid nonce, replacing the current timestamp. Generally, transactions will contain random numbers and time stamps, and these data are added by the blockchain to determine the proper sequence of transactions, without affecting the specific services involved in the transactions. In some high concurrency scenarios, random number collision and timestamp collision may occur, and at this time, the transaction may be modified by the block-out node, so as to ensure that no random number collision and timestamp collision occur in the high concurrency scenarios.
It should be noted that since the transaction is not signed, it is desirable to provide an effective anti-counterfeiting mechanism for the method.
Preferably, the blockchain consensus node receives a transaction pre-verification of the identity of the client, provided by the client, of the mining account of the consensus node from the initiator. This prevents the occurrence of a situation in which the transaction is disguised from the source.
Preferably, the consensus nodes of the blockchain ensure authenticity of the identity of the initiator of the transaction during synchronization using an anti-counterfeiting mechanism, wherein the mechanism includes that the consensus nodes of the blockchain only receive the transaction provided by other consensus nodes for the initiator to be the mining account, the initiator of the transaction provides a hash signature for a hash list of batch transactions including the transaction, and only the blockchain exit node is responsible for providing the transaction of the initiator to be the mining account. This prevents the propagation of masquerading the transaction from the propagation path, helping the consensus node to distinguish between true and false transactions.
Optionally, the consensus node of the block chain only receives the transaction of the initiator for the mining account provided by the other consensus node, and the consensus node guarantees the transaction synchronized to the other node by itself.
Optionally, the initiator of the transaction provides a hash signature over a hash list of batch transactions comprising the transaction, such that it can be confirmed by the signature whether the transaction is in the batch, thus obviating the need for a guarantee by the node, but requiring synchronization of the batch transactions as a whole between nodes, and in addition, since the chunking node may modify some fields of the transaction, the hash may be calculated by omitting those fields that may be modified.
Optionally, only the block chaining node is responsible for providing the transaction of the initiator for the mining account, so that only the block chaining node is responsible for and guarantees to create the transaction, and the anti-counterfeiting process is simplified.
Fig. 2 is a schematic diagram of a transaction signature verification device based on a block chain according to an embodiment of the present application.
The list module 11 is configured to record a list of the endorsement-free accounts on the blockchain;
a verification module 12 for verifying that the initiator of the transaction is in the checking-free account list of the blockchain;
a transaction module 13 for adding a label-free tag to the transaction;
a modification module 14, configured to modify the transaction by the egress node before uplink, where the modification includes replacing a valid nonce and replacing a current timestamp;
the authority module 15 is configured to receive an identity authority of a client that is certified before an initiator provides a transaction for a mining account of the consensus node;
the anti-counterfeiting module 16 is configured to ensure authenticity of an initiator identity of the transaction, and includes that the consensus node of the blockchain only receives the transaction provided by other consensus nodes for the mining account by the initiator, the initiator of the transaction provides a hash signature for a hash list of batch transactions including the transaction, and only the blockchain block node is responsible for providing the transaction for the mining account by the initiator.
It should be noted that the enterprise-created blockchain generally belongs to a federation chain and a private chain, and a small number of public chains are used. In the blockchain, the frequency of transactions created by the own account of the enterprise is far greater than that of the transactions created by other accounts, and the own account can also be used as a mining account of the block-out node of the blockchain. It is important to improve the efficiency of creating transactions and the efficiency of exporting blocks by these large users of transactions without affecting the efficiency of signing the transactions.
According to the transaction verification method and device provided by the invention, on one hand, an authorization node is adopted as a common identification node for a block chain, a practical Byzantine common identification mechanism, a raft common identification mechanism and the like are adopted as common identification mechanisms, a signing-free account list consisting of mining accounts of the common identification nodes is arranged on the block chain, then a signature is not required for a transaction created by the signing-free account, a signature field of the transaction is empty, only a sponsor of the transaction needs to be confirmed in the signing-free account list when the signature of the transaction is verified, the signature of the block to which the transaction belongs is ensured to be effective through the common identification node, on the other hand, the identity of a client is verified before the initiator provided by the client is the transaction of the mining accounts of the common identification nodes, and only the initiator provided by other common identification nodes is received to be the transaction of the mining accounts of the common identification nodes during synchronous transaction of the common identification nodes, The initiator provides a hash signature containing a hash list of batch transactions, and the mining account of the block-out node completely undertakes the work of the transactions, and the measures prevent people from forging the transactions, so that repeated signature and signature verification are avoided under the condition of ensuring the safety of data transactions, and the efficiency of newly creating transactions and block-out is improved.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data.
Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
In the description of the present application, "a plurality" means two or more unless otherwise specified.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product.
Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A transaction signature verification method based on a block chain is characterized by comprising the following steps:
if the signature of the transaction is null, judging whether the initiator of the transaction is in a non-signature account list of the block chain;
and if the initiator of the transaction is not in the exempt account list of the blockchain, rejecting the transaction, otherwise, the transaction signature passes the verification.
2. The blockchain-based transaction signature verification method of claim 1, further comprising:
the nodes participating in consensus accounting in the block chain are all authorized nodes, and the available consensus mechanisms of the block chain comprise a practical Byzantine consensus mechanism and a raft consensus mechanism.
3. The blockchain-based transaction signature verification method of claim 1, further comprising:
the account of the endorsement-free account list is a mining account of a node participating in consensus accounting in the blockchain.
4. The blockchain-based transaction signature verification method of claim 1, further comprising:
the transaction includes a label-free indicia.
5. The blockchain-based transaction signature verification method of claim 1, further comprising:
the transaction may be modified by an out-of-block node of the block chain before adding a new block for consensus, the modification including replacing a valid nonce, replacing a current timestamp.
6. The blockchain-based transaction signature verification method of claim 1, further comprising:
the common identification nodes of the block chain ensure the authenticity of the identity of the initiator of the transaction in the synchronization process by using an anti-counterfeiting mechanism, wherein the mechanism comprises that the common identification nodes of the block chain only receive the transaction of the initiator for the mining account provided by other common identification nodes, the initiator of the transaction provides a hash signature for a hash list of batch transactions containing the transaction, and only the block chain block exit node is responsible for providing the transaction of the initiator for the mining account.
7. The blockchain-based transaction signature verification method of claim 1, further comprising:
the block chain consensus node receives a transaction pre-verification identity of a client, provided by a client, of an initiator for a mining account of the consensus node.
8. The blockchain-based transaction signature verification method of claim 1, further comprising:
the block head of the block to which the transaction belongs comprises a free account list used for all transactions in the block.
9. A trade signature verification device based on a block chain is characterized by comprising:
the list module is used for recording a list of the non-signed accounts on the block chain;
a verification module to verify that an initiator of the transaction is in a check-free account list of the blockchain;
a transaction module to add a label-free tag to the transaction.
10. The blockchain-based transaction signature verification device according to claim 9, comprising:
a modification module, configured to modify the transaction by the egress node before uplink, where the modification includes replacing an effective random number and replacing a current timestamp;
the authority module is used for receiving the identity authority of the client which is verified before the initiator provides the transaction for the mining account of the consensus node;
the anti-counterfeiting module is used for ensuring the authenticity of the identity of the initiator of the transaction, and comprises that the common identification nodes of the block chain only receive the transaction of the initiator for the mining account provided by other common identification nodes, the initiator of the transaction provides a hash signature for a hash list of batch transactions containing the transaction, and only the block outlet node of the block chain is responsible for providing the transaction of the initiator for the mining account.
CN202010432899.XA 2020-05-21 2020-05-21 Transaction signature checking method and device based on block chain Pending CN111539729A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010432899.XA CN111539729A (en) 2020-05-21 2020-05-21 Transaction signature checking method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010432899.XA CN111539729A (en) 2020-05-21 2020-05-21 Transaction signature checking method and device based on block chain

Publications (1)

Publication Number Publication Date
CN111539729A true CN111539729A (en) 2020-08-14

Family

ID=71977932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010432899.XA Pending CN111539729A (en) 2020-05-21 2020-05-21 Transaction signature checking method and device based on block chain

Country Status (1)

Country Link
CN (1) CN111539729A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150148A (en) * 2020-09-24 2020-12-29 普华云创科技(北京)有限公司 Enterprise asset protection method and system based on block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145768A (en) * 2016-03-01 2017-09-08 华为技术有限公司 Copyright managing method and system
CN108898031A (en) * 2018-07-17 2018-11-27 济南浪潮高新科技投资发展有限公司 A kind of block chain design method of the Proxy Signature based on ECC algorithm
CN109194482A (en) * 2018-08-03 2019-01-11 中山大学 A kind of block chain common recognition method proved based on prestige
CN109426952A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of block chain framework
CN110557247A (en) * 2019-07-16 2019-12-10 如般量子科技有限公司 Identity-based quantum computation resistant blockchain method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145768A (en) * 2016-03-01 2017-09-08 华为技术有限公司 Copyright managing method and system
CN109426952A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of block chain framework
CN108898031A (en) * 2018-07-17 2018-11-27 济南浪潮高新科技投资发展有限公司 A kind of block chain design method of the Proxy Signature based on ECC algorithm
CN109194482A (en) * 2018-08-03 2019-01-11 中山大学 A kind of block chain common recognition method proved based on prestige
CN110557247A (en) * 2019-07-16 2019-12-10 如般量子科技有限公司 Identity-based quantum computation resistant blockchain method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HOWSON,P等: "Cryptocarbon:the promises and pitfalls of forest protection on a blockchain" *
刘江;霍如;李诚成;邹贵今;黄韬;刘韵洁;: "基于命名数据网络的区块链信息传输机制" *
潘吉飞;黄德才;: "区块链技术对人工智能的影响" *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112150148A (en) * 2020-09-24 2020-12-29 普华云创科技(北京)有限公司 Enterprise asset protection method and system based on block chain technology

Similar Documents

Publication Publication Date Title
CN107395557B (en) Service request processing method and device
CN108055125B (en) Method and device for encrypting and decrypting product information
TWI698820B (en) Consensus verification method and device
CN112215601B (en) Service processing method, device and equipment based on block chain
CN110046996B (en) Data processing method and device
CN110166442B (en) Data processing method and device based on block chain
CN111753335B (en) Editing method and device for block content
CN111767578B (en) Data inspection method, device and equipment
CN110298755B (en) Block chain transaction method and device
CN113114476B (en) Privacy evidence storing method and device based on contract
CN110246039B (en) Transaction monitoring method and device based on alliance chain and electronic equipment
CN111131171A (en) Node authentication method and device based on block chain network
CN113704775A (en) Service processing method based on distributed digital identity and related device
CN112256800A (en) Vector commitment-based alliance link data processing method, device and equipment
CN111770112A (en) Information sharing method, device and equipment
CN113935737B (en) Random number generation method and device based on block chain
CN115296794A (en) Key management method and device based on block chain
CN114358764A (en) Privacy calculation method based on intelligent contracts in block chain and related equipment
CN111539729A (en) Transaction signature checking method and device based on block chain
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
US20190251532A1 (en) Systems and methods for providing distributed licensing and subscription management
CN111931196A (en) Method, equipment and medium for realizing zero knowledge proof based on block chain intelligent contract
CN115150103B (en) Block chain-based digital certificate offline verification method, device and equipment
Ganguly Zero-Knowledge Proofs Origination and Early Twenty-First Century Use Cases
CN113761496A (en) Identity verification method and device based on block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200814

WD01 Invention patent application deemed withdrawn after publication