CN111695896A - Digital currency transaction method authorized by multiple keys - Google Patents

Digital currency transaction method authorized by multiple keys Download PDF

Info

Publication number
CN111695896A
CN111695896A CN201910194611.7A CN201910194611A CN111695896A CN 111695896 A CN111695896 A CN 111695896A CN 201910194611 A CN201910194611 A CN 201910194611A CN 111695896 A CN111695896 A CN 111695896A
Authority
CN
China
Prior art keywords
public key
terminal
transaction
key
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910194611.7A
Other languages
Chinese (zh)
Inventor
庄佑邦
欧仕迈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolbitx Ltd
Original Assignee
Coolbitx Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolbitx Ltd filed Critical Coolbitx Ltd
Priority to CN201910194611.7A priority Critical patent/CN111695896A/en
Publication of CN111695896A publication Critical patent/CN111695896A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a digital currency transaction method authorized by multiple keys, which comprises the following steps: providing user information to three terminals, generating a group of public key and secret key by the three terminals respectively, then obtaining a transaction public key formed by the three public keys by each terminal, setting the transaction public key as more than two electronic signatures corresponding to the secret keys to transfer digital money, then providing check information, comparing the check information with the user information to ensure that one terminal obtains more than two electronic signatures, and finally, matching the transaction public key with more than two electronic signatures to transfer the digital money.

Description

Digital currency transaction method authorized by multiple keys
Technical Field
The present invention relates to a digital money transaction method capable of reducing the stealing of digital assets, and more particularly to a digital money transaction method capable of transferring digital money only after acquiring more than two electronic signatures.
Background
With the advance of technology, many transaction and payment methods are replaced by Integrated Circuit (IC) cards, in which a memory is disposed to store information of a card holder, and the IC cards are widely used in various fields, such as money drawing cards, financial cards, credit cards, telephone cards, value cards, etc., which are common IC cards at present, and the commonly used IC cards can be roughly classified into contact type interfaces, non-contact type interfaces and composite type interfaces according to the methods of storing and reading data.
Taking a financial card with credit card and debit card functions as an example, before a financial card is used to perform a transaction or service through an automatic teller machine, the automatic teller machine requires a cardholder to input a preset password to obtain the right to use the financial card, so even if the financial card is lost or stolen, a non-genuine cardholder cannot steal cash through the automatic teller machine because the non-genuine cardholder does not know the preset password, but the automatic teller machine only determines whether to perform cash withdrawal according to the preset password, but the automatic teller machine cannot determine whether the financial card is a correct original cardholder, and further the non-genuine cardholder knows the preset password, the automatic teller machine still performs cash withdrawal to allow the non-genuine cardholder to steal cash, and when the cardholder disappears by using the financial card, the cardholder is required to sign a bill of the cardholder on a transaction name, further, when the financial card is lost or stolen, it is easily signed or stolen by an unauthorized card holder to cause property loss.
In addition, as the technology of wireless transmission is changing day by day, a part of ICs adopt the wireless transmission technology of Radio frequency (RFID/Radio-frequency identification), and the Radio frequency technology is most often applied to consumption transactions with small amount of money, such as taking public transportation vehicles like buses and rapid transportation, however, in order to pursue speed and convenience, the small amount of money consumption is not required to input a password or a name of a card holder while the transaction is being performed, so that an unappealing card holder who picks up an IC card can directly perform consumption transaction as long as the IC card consumed by using wireless sensing is lost or stolen until the IC card is deactivated or the amount of money stored inside is consumed.
Furthermore, for the sake of speed and convenience, the IC card for door access system can be easily accessed into the area with door access control only by holding the correct IC card, so that when the IC card for door access system is lost or stolen, the non-owner of the IC card can directly access the area with door access control through the picked IC card.
As can be seen from the above description, as long as the IC card is lost and picked up by the non-original card holder, the non-original card holder can steal the digital assets through the picked-up IC card, thereby causing financial loss of the original card holder.
Disclosure of Invention
The invention mainly aims to transfer digital currency only by acquiring more than two electronic signatures, so that even if a stealer steals one of the keys, the stealer still cannot transfer the digital currency through the stolen key, and the stealer can be prevented from stealing the digital currency.
To achieve the above object, the present invention relates to a method for digital currency transaction with multiple key authorization, comprising the following steps: a public key establishment step: providing user information representing user identity, and a first terminal, a second terminal and a third terminal respectively form a group of keys of public keys corresponding to the user data, so that the first terminal has a first key and a first public key, the second terminal has a second key and a second public key, and the third terminal has a third key and a third public key; a transaction public key establishment step: the first terminal, the second terminal and the third terminal obtain a transaction public key generated by combining the first public key, the second public key and the third public key, and the transaction public key can authorize the transfer of digital money according to more than two of a first electronic signature corresponding to the first key, a second electronic signature corresponding to the second key and a third electronic signature corresponding to the third key; a step of checking the key: providing check information with user personal data, checking that the check information accords with the user information, and when the check information accords with the user information, one of the first terminal, the second terminal and the third terminal has more than two of the first electronic signature, the second electronic signature and the third electronic signature; and a money transfer step: and more than two of the first electronic signature, the second electronic signature and the third electronic signature can authorize the transaction public key to transfer the digital currency of the transaction public key according to the transaction information.
In a preferred embodiment, in the public key establishing step, the user information is transmitted to the first terminal, the second terminal and the third terminal, and after the first terminal, the second terminal and the third terminal receive the user information, the first terminal, the second terminal and the third terminal respectively form the set of public key and the set of secret key.
However, in the transaction public key establishing step, the first terminal obtains the second public key and the third public key, so that the first terminal has the first public key, the second public key and the third public key, and the first terminal combines the first public key, the second public key and the third public key to generate the transaction public key and transmits the transaction public key to the second terminal and the third terminal.
In another preferred embodiment, in the public key establishing step, the first terminal, the second terminal and the third terminal respectively have at least one set of initial public keys that are not configured, and the initial public keys are configured and converted into the public keys and the secret keys according to the user information.
However, in the transaction public key establishing step, the first terminal, the second terminal and the third terminal respectively obtain the first public key, the second public key and the third public key, and the first terminal, the second terminal and the third terminal respectively combine the first public key, the second public key and the third public key to form the transaction public key.
In the two embodiments, the method for digital currency transaction with multiple key authorization further comprises: a public key reconstruction step: one of the first terminal, the second terminal and the third terminal forms a fourth secret key and a fourth public key corresponding to the user information; an alternative step: combining two of the first public key, the second public key and the third public key with the fourth public key to form a reproduced transaction public key for hosting the transaction public key, and transferring the digital currency of the transaction public key to the reproduced transaction public key.
It can be seen from the above description that the present invention is characterized in that the first terminal, the second terminal and the third terminal have a secret key and a public key respectively, and all the public keys are combined to form the transaction public key, and the transaction public key requires more than two electronic signatures to transfer digital money.
Drawings
FIG. 1 is a flow chart illustrating a digital currency transaction method according to a first preferred embodiment of the present invention;
FIG. 2 is a block diagram of a digital currency transaction system;
FIGS. 3A-3C are schematic diagrams of the public key establishment procedure of FIG. 1;
FIG. 4 is a schematic diagram illustrating the transaction public key establishment step of FIG. 1;
FIG. 5 is a schematic diagram of the key verification step of FIG. 1;
FIG. 6 is a schematic view of the note transfer step of FIG. 1;
FIG. 7 is a diagram illustrating the public key establishment procedure in the second preferred embodiment;
FIG. 8 is a diagram illustrating a transaction public key establishment procedure in a second preferred embodiment;
FIG. 9 is a diagram illustrating the key verification process in the third preferred embodiment;
FIG. 10 is a diagram illustrating a money transfer step in the third preferred embodiment;
FIG. 11 is a flow chart illustrating a digital currency transaction method according to a fourth preferred embodiment of the present invention;
FIG. 12 is a diagram illustrating the public key re-establishment procedure in the fourth preferred embodiment;
FIG. 13 is a schematic diagram of an alternative step in the fourth preferred embodiment;
FIG. 14 is a schematic illustration of digital currency transfer of a transaction public key to a reproduced transaction public key.
Description of reference numerals: 1-digital currency transaction method; 10-public key establishment step; 11-transaction public key establishment step; 12-checking the key; 13-money transfer step; 14-public key re-establishment step; 15-replacement step; 2-a digital currency transaction system; 20-a first terminal; 21-a second terminal; 211-collation database; 212-a user database; 22-a third terminal; 221-alignment database; 23-the internet; 24-transaction block chain; 25-storing the carrier; 251-a microprocessor; 252-a memory; 253-a security chip; 253 a-processing unit.
Detailed Description
The invention will be further described with reference to specific embodiments and drawings, the advantages and features of which will become apparent as the description proceeds.
Referring to fig. 1 and 2, in a first preferred embodiment, the digital currency transaction method 1 of the present invention is used with a digital currency transaction system 2, as shown in fig. 2, the digital currency transaction system 2 has a first terminal 20, a second terminal 21 and a third terminal 22, the first terminal 20 is a mobile phone, a computer or a tablet for users, the second terminal 21 is a hosting unit capable of managing public keys, the third terminal 22 is a trust unit capable of managing public keys, however, the first terminal 20 is a mobile phone, a computer or a tablet, the second terminal 21 is a hosting unit, and the third terminal 22 is a trust unit, which is just for convenience of description, that is, the first terminal 20 can be a hosting unit, the second terminal 21 can be a trust unit, and the third terminal 22 can be a mobile phone, a computer or a tablet.
In this embodiment, the first terminal 20, which is a mobile phone, a computer or a tablet, can be actively connected to the internet 23, and the internet 23 is simultaneously connected to the second terminal 21, the third terminal 22 and a transaction blockchain 24, so that all the first terminals 20 can be connected to the second terminal 21, the third terminal 22 and the transaction blockchain 24 through the internet 23.
The second terminal 21, which is the hosting entity, has a checking database 211 for storing information content and can provide a storage carrier 25, and the third terminal 22, which is the trust entity, has a comparison database 221 for storing information content, the transaction blockchain 24 stores public keys of a plurality of different users, wherein each public key has digital currency and a transaction address, in this embodiment, the storage carrier 25 cannot be directly and actively connected to the internet 23, but each storage carrier 25 can be selectively connected or disconnected to one of the plurality of first terminals 20, and when the storage carrier 25 is connected to the first terminal 20, the storage carrier 25 can be connected to the internet 23 via electronic means, wherein the storage carrier 25 is provided with a microprocessor 251 capable of processing information, a memory 252 capable of storing information, and a security chip 253 for storing important information, the memory 252 and the secure chip 253 are both electrically connected to the microprocessor 251, wherein the secure chip 253 has a processing unit 253a capable of processing information, and in this embodiment, the storage carrier 25 is an Integrated Circuit (IC) card.
Referring to fig. 1 and fig. 3A, in the specific application, a public key establishment step 10 is first performed, in which a user inputs user information representing the user identity to the first terminal 20, and the first terminal 20 transmits the user information to the second terminal 21, so that the second terminal 21 establishes a user database 212 stored in the second terminal 21 according to the user information, stores the user information in the check database 211, and the second terminal 21 establishes a second key for authorizing digital money transfer and a second public key corresponding to the second key according to the user database 212.
Referring to fig. 3B, the second terminal 21 stores the second secret key in the user database 212 and transmits the user information and the second public key to the third terminal 22, and the third terminal 22 stores the user information in the comparison database 221 and establishes a third secret key for authorizing the digital money transfer and a third public key corresponding to the third secret key according to the user information and the second public key, wherein the third terminal 22 stores the third secret key and manages the third secret key.
Referring to fig. 3C, then, the third terminal 22 transmits the second public key and the third public key to the second terminal 21, the second terminal 21 stores the second public key and the third public key in the memory 252 of the storage carrier 25, and provides the storage carrier 25 with the second public key and the third public key to the user, next, the first terminal 20 establishes a first secret key for authorizing digital money to be transferred and a first public key corresponding to the first secret key according to the user information after the user obtains the storage carrier 25, wherein the first terminal 20 transmits the first secret key to the storage carrier 25, so that the security chip 253 of the storage carrier 25 stores the first secret key, and in addition, the first terminal 20 transmits the first public key to the storage carrier 25, the second terminal 21 and the third terminal 22, so that the memory 252 of the storage carrier 25, the user database 212 of the second terminal 21 and the third terminal 22 all store the first public key, thereby, the public key establishment step 10 is completed.
Referring to fig. 1 and 4, a transaction public key establishing step 11 is performed next, when the memory 252 of the storage carrier 25 stores the first public key, the second public key and the third public key, the microprocessor 251 of the storage carrier 25 combines the first public key, the second public key and the third public key to form a transaction public key with digital money, and the microprocessor 251 sets the transaction public key to a transaction mode requiring at least two electronic signatures corresponding to the keys to transfer the digital money, and then the microprocessor 251 transmits the transaction public key showing the transaction mode to the first terminal 20, and the first terminal 20 transmits the transaction public key to the second terminal 21, the third terminal 22 and the transaction block chain 24, so that the first terminal 20, the second terminal 21, the third terminal 22 and the transaction block chain 24 can store the transaction public key.
Referring to fig. 1 and 5, when the user wants to transfer digital money, the first terminal 20 receives a check message with user personal data inputted by the user, the first terminal 20 transmits the check message to the second terminal 21, when the second terminal 21 receives the check message, the second terminal 21 determines whether the check message matches the user information stored in the check database 211, when the second terminal 21 determines that the content of the check message matches the content of the user information, the second terminal 21 converts the second key to form a second electronic signature transmitted to the first terminal 20, when the first terminal 20 receives the second electronic signature, the first terminal 20 requests the storage carrier 25 to use the first key, so that the microprocessor 251 of the storage carrier 25 obtains the first key from the memory 252 of the storage carrier 25, and converts the first key to form a first electronic signature that is transmitted to the first terminal 20, so that the first terminal 20 has both the first electronic signature and the second electronic signature, thereby completing a key verification step 12.
Referring to fig. 1 and fig. 6, finally, a money transfer step 13 is performed, in which the user forms a transaction message including a transaction address and a transaction amount through the first terminal 20, and the first terminal 20 forms an authorized transaction message with the first electronic signature, the second electronic signature and the transaction message, and transmits the authorized transaction message to the transaction block chain 24, so that the transaction block chain 24 verifies the first electronic signature and the second electronic signature to confirm correctness of the first key and the second key, and the transaction block chain 24 can transfer the digital money of the transaction public key according to the information content of the authorized transaction message.
Referring to fig. 7 and 8, in the second preferred embodiment, the digital money transaction method 1 of the present invention also has a public key establishment step 10, a transaction public key establishment step 11, a key verification step 12 and a money transfer step 13, and the difference from the first preferred embodiment lies in the public key establishment step 10 and the transaction public key establishment step 11, and the flow of the steps of the key verification step 12 and the money transfer step 13 are the same as the first preferred embodiment, and thus will not be described repeatedly.
As shown in fig. 7, the first terminal 20 configured as a mobile phone, a computer or a tablet has at least one set of unset first initial public key stored therein, the second terminal 21 configured as a hosting unit has at least one set of unset second initial public key stored therein, and the third terminal 22 configured as a trusted unit has at least one set of unset third initial public key stored therein, wherein when the first, second and third terminals 20, 21 and 22 receive the user information respectively, the first terminal 20 can set one of the first initial public keys according to the user information so that the first initial public key is converted into the first public key and the first secret key, and the second terminal 21 also sets one of the second initial public keys according to the user information so that the second initial public key is converted into the second public key and the second secret key, similarly, the third terminal 22 sets one of the third initial public keys according to the user information, so that the third initial public key is converted into the third public key and the third secret key, thereby completing the public key establishing step 10.
When the first terminal 20 forms the first public key, as shown in fig. 8, the first terminal 20 transfers the first public key to the second terminal 21 and the third terminal 22, and, when the second terminal 21 forms the second public key, the second terminal 21 transfers the second public key to the first terminal 20 and the third terminal 22, and, after the third terminal 22 forms the third public key, the third terminal 22 transmits the third public key to the first terminal 20 and the second terminal 21, further, when the first, second and third terminals 20, 21 and 22 respectively have the first public key, the second public key and the third public key, the first, second and third terminals 20, 21, 22 will respectively combine the first public key, the second public key and the third public key with each other to form the transaction public key, and the transaction public key establishing step 11 is completed when the first, second and third terminals 20, 21 and 22 all have the transaction public key.
Referring to fig. 9 and 10, in the third preferred embodiment, the difference from the first preferred embodiment is the key verification step 12 and the money transfer step 13, as shown in fig. 9, when it is found that the digital asset of unknown origin is transferred to the transaction public key, the second terminal 21, which is set as the hosting unit, transfers the user information stored in the checking database 211 to the third terminal 22, which is set as the trusted unit, and after the third terminal 22 checks that the user information stored in the checking database 211 corresponds to the user information in the comparison database 221, the third terminal 22 converts the third key to form a third electronic signature transferred to the second terminal 21, so that the second terminal 21 has both the second key and the third electronic signature, thereby completing the key verification step 12.
Referring to fig. 10, in the money transfer step 13, the second terminal 21, which is set as the escrow unit, forms the frozen information of the frozen digital money flowing, and then performs the second key to form a second electronic signature, and the second terminal 21 forms the second electronic signature, the third electronic signature and the freeze information into the transaction limiting information, and transmits the limited transaction information to transaction blockchain 24, so that transaction blockchain 24 will convert the second and third electronic signatures to obtain the information content of the second and third keys, the transaction blockchain 24 can then no longer provide the transaction public key in accordance with the limited transaction information, and then the digital currency of the transaction public key is transferred to a frozen account, so that the digital currency of the transaction public key cannot be transferred away by a stealer, and the risk of property loss is reduced.
Referring to fig. 11, in the fourth preferred embodiment, the difference from the first preferred embodiment is that the digital currency transaction method 1 further has a public key re-establishing step 14 and an alternative step 15, referring to fig. 11 and 12, after completing the transaction public key establishing step 11, in addition to the ability to perform the verify key step 12, a public key reconstruction step 14 can also be performed, as shown, when the user forgets the first key, the user inputs the user information to the first terminal 20, so that the first terminal 20 establishes a fourth key different from the first key and a fourth public key corresponding to the fourth key according to the user information, the first terminal 20 further transmits the fourth public key to the storage carrier 25, so that the memory 252 of the storage carrier 25 removes the first public key and stores the fourth public key, thereby completing the public key re-establishment step 14.
However, it is only convenient to describe that the first terminal 20 generates the fourth secret key and the fourth public key according to the user information, that is, if the second terminal 21, which is set as a trustee, loses the second secret key or the third terminal 22, which is set as a trust unit, loses the third secret key, the second terminal 21 and the third terminal 22 can also form the fourth secret key and the fourth public key according to the user information, wherein when the second terminal 21 forms the fourth public key, the second terminal 21 further removes the second public key, and conversely, when the third terminal 22 forms the fourth public key, the third terminal 22 further removes the third public key.
Referring to fig. 11 and 13, when the public key re-establishment step 14 is completed, the memory 252 of the storage carrier 25 has the second public key, the third public key and the fourth public key, and the microprocessor 251 of the storage carrier 25 combines the second public key, the third public key and the fourth public key to form a reproduced transaction public key, and the microprocessor 251 sets the reproduced transaction public key to a transaction mode requiring at least two electronic signatures corresponding to the keys to transfer digital money, and then the microprocessor 251 transmits the reproduced transaction public key presenting the transaction mode to the first terminal 20, and the first terminal 20 transmits the reproduced transaction public key to the second terminal 21, the third terminal 22 and the transaction block chain 24, so that all four of the first terminal 20, the second terminal 21, the third terminal 22 and the transaction block chain 24 can store the reproduced transaction public key
Referring to fig. 14, the first terminal 20 receives the check information formed by the user input, and the first terminal 20 transmits the check information to the second terminal 21 and the third terminal 22, and when the second and third terminals 21, 22 receive the check information, the second terminal 21 confirms whether the check information matches the user information stored in the check database 211, and the third terminal 22 confirms whether the check information matches the user information stored in the comparison database 221, and when the second and third terminals 21, 22 both confirm that the information content of the check information matches the information content of the user information, the second terminal 21 converts the second key to form the second electronic signature and transmits the second electronic signature to the first terminal 20, and the third terminal 22 converts the third key to form the third electronic signature, and the third electronic signature is transmitted to the first terminal 20, the first terminal 20 transmits the second and third electronic signatures to the transaction block chain 24, and the transaction block chain 24 verifies the second and third electronic signatures to obtain the authorization content of the second and third keys, so that the transaction block chain 24 can transfer the digital currency of the transaction public key to the reproduced transaction public key to complete the replacement step 15.
The foregoing description and examples are exemplary only, and are not intended to limit the scope of the invention in any way. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention, and that such changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (6)

1. A method for multiple key authorized digital currency transactions, comprising the steps of:
a public key establishment step: providing user information representing user identity, and forming a group of public keys and secret keys corresponding to the user data by a first terminal, a second terminal and a third terminal respectively, so that the first terminal has a first secret key and a first public key, the second terminal has a second secret key and a second public key, and the third terminal has a third secret key and a third public key;
a transaction public key establishment step: the first terminal, the second terminal and the third terminal obtain a transaction public key generated by combining the first public key, the second public key and the third public key, and the transaction public key can authorize the transfer of digital money according to more than two of a first electronic signature corresponding to the first key, a second electronic signature corresponding to the second key and a third electronic signature corresponding to the third key;
a step of checking the key: providing check information with user personal data, checking that the check information accords with the user information, and acquiring more than two of the first electronic signature, the second electronic signature and the third electronic signature by one of the first terminal, the second terminal and the third terminal when the check information accords with the user information; and
a money transfer step: and forming transaction information, and obtaining more than two of the first electronic signature, the second electronic signature and the third electronic signature so that the transaction public key can transfer the digital currency of the transaction public key according to the transaction information.
2. The multiple key authorized digital currency transaction method according to claim 1, characterized in that: the multiple key authorized digital currency transaction method further comprises the following steps:
a public key reconstruction step: one of the first terminal, the second terminal and the third terminal forms a fourth secret key and a fourth public key corresponding to the user information;
an alternative step: combining two of the first public key, the second public key and the third public key with the fourth public key to form a reproduced transaction public key, and obtaining a key corresponding to two of the first public key, the second public key and the third public key, so that the digital money of the transaction public key can be transferred to the reproduced transaction public key. .
3. The multiple key authorized digital currency transaction method according to claim 1, characterized in that: in the public key establishing step, the user information is transmitted to the first terminal, the second terminal and the third terminal, and after the first terminal, the second terminal and the third terminal receive the user information, the first terminal, the second terminal and the third terminal respectively form the group of public keys and the group of secret keys.
4. The method of claim 1, wherein in the step of establishing the public key, the first terminal, the second terminal and the third terminal respectively have at least one set of unset initial public keys, and the initial public keys are configured and converted into the public key and the secret key according to the user information.
5. The method of claim 1, wherein in the step of establishing the transaction public key, the first terminal obtains the second public key and the third public key, so that the first terminal has the first public key, the second public key and the third public key, and the first terminal combines the first public key, the second public key and the third public key to generate the transaction public key and transmits the transaction public key to the second terminal and the third terminal.
6. The multiple key authorized digital currency transaction method according to claim 1, characterized in that: in the transaction public key establishing step, the first terminal, the second terminal and the third terminal respectively obtain the first public key, the second public key and the third public key, and the first terminal, the second terminal and the third terminal respectively combine the first public key, the second public key and the third public key to form the transaction public key.
CN201910194611.7A 2019-03-14 2019-03-14 Digital currency transaction method authorized by multiple keys Pending CN111695896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910194611.7A CN111695896A (en) 2019-03-14 2019-03-14 Digital currency transaction method authorized by multiple keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910194611.7A CN111695896A (en) 2019-03-14 2019-03-14 Digital currency transaction method authorized by multiple keys

Publications (1)

Publication Number Publication Date
CN111695896A true CN111695896A (en) 2020-09-22

Family

ID=72475190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910194611.7A Pending CN111695896A (en) 2019-03-14 2019-03-14 Digital currency transaction method authorized by multiple keys

Country Status (1)

Country Link
CN (1) CN111695896A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101097646A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Public-key updating method and bank card terminal based on the method
CN103493460A (en) * 2011-04-04 2014-01-01 邦提恩科斯公司 Method and system for authenticating entities by means of terminals
CN104954123A (en) * 2014-03-28 2015-09-30 中国银联股份有限公司 Intelligent POS terminal main key updating system and updating method
TWI646481B (en) * 2018-02-01 2019-01-01 開曼群島商庫幣科技有限公司 Pairing authentication method for electronic transaction device
TWI651672B (en) * 2018-02-07 2019-02-21 開曼群島商庫幣科技有限公司 Digital asset transaction method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101097646A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Public-key updating method and bank card terminal based on the method
CN103493460A (en) * 2011-04-04 2014-01-01 邦提恩科斯公司 Method and system for authenticating entities by means of terminals
CN104954123A (en) * 2014-03-28 2015-09-30 中国银联股份有限公司 Intelligent POS terminal main key updating system and updating method
TWI646481B (en) * 2018-02-01 2019-01-01 開曼群島商庫幣科技有限公司 Pairing authentication method for electronic transaction device
TWI651672B (en) * 2018-02-07 2019-02-21 開曼群島商庫幣科技有限公司 Digital asset transaction method

Similar Documents

Publication Publication Date Title
US20190122212A1 (en) Methods and systems for provisioning payment credentials
US10275758B2 (en) System for secure payment over a wireless communication network
US20180225654A1 (en) Biometric authentication of mobile financial transactions by trusted service managers
CN106415611B (en) Self-authentication chip
US5721781A (en) Authentication system and method for smart card transactions
US20150220932A1 (en) Biometric authentication of mobile financial transactions by trusted service managers
EP3098786A1 (en) Emv transactions in mobile terminals
CN113924588A (en) Device and payment system for sending electronic money data records directly to another device
CN112889241A (en) Verification service for account verification
US20200320527A1 (en) Method for digital currency transaction with authorization of multiple private keys
US11315122B2 (en) Authentication method for e-wallet carrier
US6662151B1 (en) System for secured reading and processing of data on intelligent data carriers
US10555173B2 (en) Pairing authentication method for electronic transaction device
TWI695614B (en) Method for digital currency transaction with authorization of multiple private key
CN111695896A (en) Digital currency transaction method authorized by multiple keys
TWI646481B (en) Pairing authentication method for electronic transaction device
CN111695897A (en) Multiple confirmation method for digital asset transaction
KR102046708B1 (en) Pairing authentication method for electronic transaction device
CN104023142B (en) A kind of mobile phone sending note coin
JP6559831B1 (en) Pairing authentication method for electronic transaction equipment
JP6845888B2 (en) Authentication method for electronic wallet media
US20230336349A1 (en) Comprehensive storage application provisioning using a provisioning software development kit (sdk)
JP2020174324A (en) Digital currency trading method with multiple private key authorization
CN117999553A (en) Multiple interaction processing
CN103761655A (en) Assignment method, anti-counterfeiting device and anti-counterfeiting system based on near-field communication technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240112