CN106789041A - A kind of credible block chain method of decentralization certificate - Google Patents

A kind of credible block chain method of decentralization certificate Download PDF

Info

Publication number
CN106789041A
CN106789041A CN201710080268.4A CN201710080268A CN106789041A CN 106789041 A CN106789041 A CN 106789041A CN 201710080268 A CN201710080268 A CN 201710080268A CN 106789041 A CN106789041 A CN 106789041A
Authority
CN
China
Prior art keywords
user
block chain
decentralization
personally identifiable
identifiable information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710080268.4A
Other languages
Chinese (zh)
Other versions
CN106789041B (en
Inventor
顾峻
王胜利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Source For A Long Time Mdt Infotech Ltd
Original Assignee
Jiangsu Source For A Long Time Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Source For A Long Time Mdt Infotech Ltd filed Critical Jiangsu Source For A Long Time Mdt Infotech Ltd
Priority to CN201710080268.4A priority Critical patent/CN106789041B/en
Publication of CN106789041A publication Critical patent/CN106789041A/en
Application granted granted Critical
Publication of CN106789041B publication Critical patent/CN106789041B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of credible block chain method of decentralization certificate, the first block of block chain is produced by system, and user A adds block chain to system application, the public key of oneself and personally identifiable information private key is digitally signed and submits to system checking;Rear system private-key digital signature is verified, publicity is carried out;When user B will add block chain, user B applies to user A, and with private key be digitally signed for oneself public key and personally identifiable information by user B, submits to user A checkings;Rear user A private-key digital signatures are verified, publicity is carried out;When thering is new user to add block chain again, apply for that after being verified, new user can add the block chain to any bit existing subscriber in block chain.The method of the present invention, as long as user trusts certain user in block chain, it is possible to ensure the other users that this user is confirmed, user can just obtain the public key of any object in block chain from publicity column, the object is given by data encryption.

Description

A kind of credible block chain method of decentralization certificate
Technical field
The present invention relates to a kind of credible block chain method of decentralization certificate, belong to field of information security technology.
Background technology
Current PKI public-key cryptography infrastructures, are to trust architectural mechanisms with hierarchy type, and the user on internet only needs The certificate for being sent of the third-party institution is trusted, as center, it is possible to reach the mutual confidence-building mechanism on internet.
The framework of third party's faith mechanism, there is obstruction on the internet, and use is supplied to from government, bank or enterprise Family can use third party's faith mechanism, but on the internet, each user is scattered, it is difficult to one trust machine of construction System.
The content of the invention
The technical problems to be solved by the invention are the defects for overcoming prior art, there is provided a kind of decentralization certificate is credible Block chain method.
In order to solve the above technical problems, the present invention provides the first block of block chain by a system S with trusted public keys Produce, user A initiates to add block chain application to system S applications, and by the public key PUB of oneselfAAnd personally identifiable information is with holding Some private keys are digitally signed SignA, system S is submitted to, the personally identifiable information and numeral of system S checking users A are signed Name SignA;After confirmation is errorless, system S is verified to user A, by the personally identifiable information and public key of user A PUBA, produce Hash hash values containing formula HashAAnd produce digital signature Sign with the private key of oneselfS, it is put into publicity column publicity;
When user B will add this block chain, user B to user A application initiate this block chain application, user B by oneself Public key PUBBAnd personally identifiable information is digitally signed Sign with the private key heldB, submit to user A, user A checking users B Personally identifiable information and digital signature SignB;After confirmation is errorless, user A is verified to user B, will use The personally identifiable information and public key PUB of family BB, produce Hash hash values containing formula HashBAnd produce numeral to sign with the private key of oneself Name SignA, it is put into publicity column publicity;
When there is new user C to add this block chain again, apply to any existing subscriber in block chain, it is existing by this After user's checking passes through, new user C just adds the block chain, block chain is constantly launched with tree-like manner.
User in block chain obtains the public key of any user object in block chain from publicity column, and this is given by data encryption User object.
Verification process when new user C adds this block chain adds verification process during block chain identical with above-mentioned user B.
During the personally identifiable information of system S checking users A, by the personal identification of third-party authentication platform validation user A Information.
The personally identifiable information of user includes mail and/or phone number.
Publicity column is arranged on public network.
System S to after being verified of user A, by the personally identifiable information of user A and public key PUBA, produce Hash Hash values containing formula HashAAnd produce digital signature Sign with the private key of oneselfS, along with timestamp, it is put into publicity column publicity.
User A to after being verified of user B, by the personally identifiable information of user B and public key PUBB, produce Hash Hash values containing formula HashBAnd produce digital signature Sign with the private key of oneselfA, along with timestamp, it is put into publicity column publicity.
All users hold the safety means that can produce public private key pair, and private key by its safe preservation.
The beneficial effect that the present invention is reached:
The method of the present invention, as long as user trusts certain user in block chain, according to the digital signature of this user, it is possible to protect Hinder the other users that this user is confirmed, user can just obtain the public key of any object in block chain from publicity column on public network, The object is given by data safety encryption.
The method according to the invention, the user on internet, it is not necessary to can just be reached by third party's trust center mutually Believable benefit, if believe oneself trust friend, it is possible to string circles of trust, on the internet, no matter buy and sell thing or It is to be traded, has a believable identity to originate.
Brief description of the drawings
Fig. 1 is flow chart of the method for the present invention;
Fig. 2 is the flow chart that user B adds block chain by user A in Fig. 1.
Specific embodiment
The invention will be further described below in conjunction with the accompanying drawings.Following examples are only used for clearly illustrating the present invention Technical scheme, and can not be limited the scope of the invention with this.
As depicted in figs. 1 and 2, the first block of trusted public keys block chain is produced by system S, and user A applies sending out to system S This block chain application is played, the public key PUB that the safety means that user A holds oneself are producedAAnd personally identifiable information(Mailbox Or cell-phone number etc.), Sign is digitally signed with the private key heldA, submit to system S, the individual of system S checking users A The digital signature of identity information and checking user A.After confirmation is errorless, system S is verified to user A, will use The personally identifiable information and public key PUB of family AA, produce Hash hash values containing formula HashA, system S produces number with oneself private key Word signature SignS, and plus timestamp, the publicity column publicity on public network is put into, using user A as user trusty, by it Information is published to the second block of block chain, block chain is launched with tree-like manner.
Specifically, during the personally identifiable information of system S checking users A, can be by third-party authentication platform validation user A Personally identifiable information, comprising mail verify or mobile phone verify by way of, or other mutual concessions mode.When Authentication failed returns to application status;The public key and digital signature of user A offers are verified again after being proved to be successful, after authentication failed Application status are returned to, after being proved to be successful, by associated personal identification's information of user A(Mailbox or cell-phone number etc.)And public key PUBA, produce Hash hash values containing formula HashA, system S produces digital signature Sign with oneself private keyS, and plus timestamp, It is put into the publicity column publicity on public network.
When user B will add this block chain, user B can initiate this block chain application to user A applications, use The public key PUB that the safety means that family B holds oneself are producedBAnd personally identifiable information(Such as mailbox or cell-phone number), with holding Some private keys are digitally signed SignB, user A is submitted to, the personally identifiable information of user A checking users B and checking are used The digital signature Sign of family BB.After confirmation is errorless, user A is verified to user B, by the personal identification of user B Information and public key PUBB, produce Hash hash values containing formula HashB, user A produces digital signature Sign with oneself private keyA, And plus timestamp, the publicity column publicity on public network is put into, using user B as user trusty, its information is published to area 3rd block of block chain, makes block chain continue to launch with tree-like manner.
Specifically, during the personally identifiable information of user A checking users B, can be by third-party authentication platform validation user B Personally identifiable information, comprising mail checking or mobile phone verification mode, or other mutual concessions mode, as long as user A can confirm that the true identity of user B.When failing the authentication, error message is returned;After being proved to be successful, user A is tested again Public key and digital signature that card user B is provided, when error message is returned after authentication failed, after being proved to be successful, by the individual of user B People's identity information(Such as mailbox or cell-phone number)With public key PUBB, produce Hash hash values containing formula HashB, user A with oneself Private key produces digital signature SignA, and plus timestamp, it is put into the publicity column publicity on public network.
When user C will add this block chain, can to this block chain any user apply, its verification process with it is upper Stating user B adds verification process during block chain identical, and after the user's checking passes through, user C can just add the block Chain, makes block chain constantly launch with tree-like manner.As shown in figure 1, in the present embodiment, when user C will add this block chain, can be with Apply for that after user A is verified, user C can just add the block chain to user A.In other embodiments, user When C will add this block chain, it is also possible to apply to user B, or directly to system S applications, empirical tests add this area after passing through Block chain.
All users in the present invention hold a safety means, and the safety means can produce public private key pair, private key Can be by the preservation of safety.
The method of the present invention, as long as user trusts certain user in block chain, according to the digital signature of this user, so that it may To ensure the other users that this user is confirmed, user can just obtain the public affairs of any object in block chain from publicity column on public network Key, the object is given by data safety encryption.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, on the premise of the technology of the present invention principle is not departed from, some improvement and deformation can also be made, these improve and deform Also should be regarded as protection scope of the present invention.

Claims (9)

1. a kind of credible block chain method of decentralization certificate, it is characterized in that, the first block of block chain has credible public affairs by one The system S of key is produced, and user A initiates to add block chain application to system S applications, and by the public key PUB of oneselfAAnd personal identification Information is digitally signed Sign with the private key heldA, submit to system S, the personally identifiable information of system S checking users A with And digital signature SignA;After confirmation is errorless, system S is verified to user A, by the personally identifiable information of user A And public key PUBA, produce Hash hash values containing formula HashAAnd produce digital signature Sign with the private key of oneselfS, it is put into publicity column Publicity;
When user B will add this block chain, user B to user A application initiate this block chain application, user B by oneself Public key PUBBAnd personally identifiable information is digitally signed Sign with the private key heldB, submit to user A, user A checking users B Personally identifiable information and digital signature SignB;After confirmation is errorless, user A is verified to user B, will use The personally identifiable information and public key PUB of family BB, produce Hash hash values containing formula HashBAnd produce numeral to sign with the private key of oneself Name SignA, it is put into publicity column publicity;
When there is new user C to add this block chain again, apply to any existing subscriber in block chain, it is existing by this After user's checking passes through, new user C just adds the block chain, block chain is constantly launched with tree-like manner.
2. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, the use in block chain Family obtains the public key of any user object in block chain from publicity column, and the user object is given by data encryption.
3. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, new user C is added Verification process during this block chain adds verification process during block chain identical with above-mentioned user B.
4. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, system S checkings are used During the personally identifiable information of family A, by the personally identifiable information of third-party authentication platform validation user A.
5. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, a person of user Part information includes mail and/or phone number.
6. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, publicity column is arranged on On public network.
7. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, system S is to user A Be verified after, by the personally identifiable information of user A and public key PUBA, produce Hash hash values containing formula HashAAnd use oneself Private key produce digital signature SignS, along with timestamp, it is put into publicity column publicity.
8. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, user A is to user B Be verified after, by the personally identifiable information of user B and public key PUBB, produce Hash hash values containing formula HashBAnd with certainly Oneself private key produces digital signature SignA, along with timestamp, it is put into publicity column publicity.
9. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, all users hold There are the safety means that can produce public private key pair, and private key by its safe preservation.
CN201710080268.4A 2017-02-15 2017-02-15 A kind of credible block chain method of decentralization certificate Expired - Fee Related CN106789041B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710080268.4A CN106789041B (en) 2017-02-15 2017-02-15 A kind of credible block chain method of decentralization certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710080268.4A CN106789041B (en) 2017-02-15 2017-02-15 A kind of credible block chain method of decentralization certificate

Publications (2)

Publication Number Publication Date
CN106789041A true CN106789041A (en) 2017-05-31
CN106789041B CN106789041B (en) 2019-07-12

Family

ID=58957096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710080268.4A Expired - Fee Related CN106789041B (en) 2017-02-15 2017-02-15 A kind of credible block chain method of decentralization certificate

Country Status (1)

Country Link
CN (1) CN106789041B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231239A (en) * 2017-06-27 2017-10-03 中国联合网络通信集团有限公司 Create generation block method for anti-counterfeit and device
CN107508859A (en) * 2017-07-20 2017-12-22 北京交通大学 Vehicle communication method based on block chain technology in vehicular ad hoc network
CN107993069A (en) * 2017-12-13 2018-05-04 清华大学 A kind of online transaction method and system based on block chain network
CN108052530A (en) * 2017-11-10 2018-05-18 杭州云象网络技术有限公司 A kind of decentralization CA construction methods and its system based on alliance's chain
CN108124505A (en) * 2017-12-19 2018-06-05 深圳前海达闼云端智能科技有限公司 Method and device for acquiring trusted node, storage medium and block link node
CN108712257A (en) * 2018-04-03 2018-10-26 阿里巴巴集团控股有限公司 The authentication method and device, electronic equipment of transregional piece of chain
CN108763303A (en) * 2018-04-20 2018-11-06 广东省科技基础条件平台中心 Platform verification method, device, computer equipment and storage medium
CN109150546A (en) * 2018-09-07 2019-01-04 全链通有限公司 The method for realizing the registration of block chain system of real name based on phone number
CN109242467A (en) * 2018-09-17 2019-01-18 金蝶软件(中国)有限公司 Network-building method, device, computer equipment and storage medium based on block chain
WO2019033822A1 (en) * 2017-08-16 2019-02-21 中国移动通信有限公司研究院 Methods for generating and authenticating digital certificate, communication device, and storage medium
WO2019076019A1 (en) * 2017-10-18 2019-04-25 克洛斯比尔有限公司 Method and device for electronic signature
CN110071808A (en) * 2019-04-09 2019-07-30 郭浩 A kind of the secure digital identity verification method and device of block chain user
WO2019195940A1 (en) * 2018-04-12 2019-10-17 ISARA Corporation Constructing a multiple-entity root of trust
CN110430201A (en) * 2019-08-09 2019-11-08 北京智汇信元科技有限公司 A kind of distribution identity documents generate, verification method and system
US10567174B2 (en) 2018-05-10 2020-02-18 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
WO2020134942A1 (en) * 2018-12-25 2020-07-02 阿里巴巴集团控股有限公司 Identity verification method and system therefor
CN111385755A (en) * 2020-03-18 2020-07-07 成都西加云杉科技有限公司 Bandwidth resource sharing method, device, equipment and readable storage medium
CN112118231A (en) * 2020-08-21 2020-12-22 浙江数秦科技有限公司 Trusted identity management method based on block chain technology
US10958450B1 (en) 2020-10-15 2021-03-23 ISARA Corporation Constructing a multiple-entity root certificate data block chain
TWI732247B (en) * 2019-07-16 2021-07-01 中華電信股份有限公司 Method to display the validation of certificate at signing time
TWI733125B (en) * 2018-08-14 2021-07-11 開曼群島商創新先進技術有限公司 Multi-party safe calculation method and device, and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714996A (en) * 2009-12-31 2010-05-26 中兴通讯股份有限公司 Authentication system and method based on peer-to-peer computing network
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN106301792A (en) * 2016-08-31 2017-01-04 江苏通付盾科技有限公司 Ca authentication management method based on block chain, Apparatus and system
CN106385315A (en) * 2016-08-30 2017-02-08 北京三未信安科技发展有限公司 Digital certificate management method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714996A (en) * 2009-12-31 2010-05-26 中兴通讯股份有限公司 Authentication system and method based on peer-to-peer computing network
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN106385315A (en) * 2016-08-30 2017-02-08 北京三未信安科技发展有限公司 Digital certificate management method and system
CN106301792A (en) * 2016-08-31 2017-01-04 江苏通付盾科技有限公司 Ca authentication management method based on block chain, Apparatus and system

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231239A (en) * 2017-06-27 2017-10-03 中国联合网络通信集团有限公司 Create generation block method for anti-counterfeit and device
CN107231239B (en) * 2017-06-27 2019-06-25 中国联合网络通信集团有限公司 Create generation block method for anti-counterfeit and device
CN107508859A (en) * 2017-07-20 2017-12-22 北京交通大学 Vehicle communication method based on block chain technology in vehicular ad hoc network
CN107508859B (en) * 2017-07-20 2020-02-21 北京交通大学 Vehicle communication method based on block chain technology in vehicle-mounted self-organizing network
WO2019033822A1 (en) * 2017-08-16 2019-02-21 中国移动通信有限公司研究院 Methods for generating and authenticating digital certificate, communication device, and storage medium
CN109412792A (en) * 2017-08-16 2019-03-01 中国移动通信有限公司研究院 Generation, authentication method, communication equipment and the storage medium of digital certificate
CN109687967B (en) * 2017-10-18 2022-02-08 克洛斯比尔有限公司 Electronic signature method and device
US11258613B2 (en) 2017-10-18 2022-02-22 Crosbil Ltd. Method and device for electronic signature
WO2019076019A1 (en) * 2017-10-18 2019-04-25 克洛斯比尔有限公司 Method and device for electronic signature
CN109687967A (en) * 2017-10-18 2019-04-26 克洛斯比尔有限公司 Electric endorsement method and equipment
CN108052530A (en) * 2017-11-10 2018-05-18 杭州云象网络技术有限公司 A kind of decentralization CA construction methods and its system based on alliance's chain
CN108052530B (en) * 2017-11-10 2020-12-11 杭州云象网络技术有限公司 Decentralized CA construction method and system based on alliance chain
CN107993069A (en) * 2017-12-13 2018-05-04 清华大学 A kind of online transaction method and system based on block chain network
CN108124505A (en) * 2017-12-19 2018-06-05 深圳前海达闼云端智能科技有限公司 Method and device for acquiring trusted node, storage medium and block link node
WO2019119278A1 (en) * 2017-12-19 2019-06-27 深圳前海达闼云端智能科技有限公司 Method and apparatus for acquiring trusted node, and storage medium and blockchain node
CN108712257A (en) * 2018-04-03 2018-10-26 阿里巴巴集团控股有限公司 The authentication method and device, electronic equipment of transregional piece of chain
US10805088B2 (en) 2018-04-03 2020-10-13 Alibaba Group Holding Limited Cross-blockchain authentication method, apparatus, and electronic device
CN108712257B (en) * 2018-04-03 2020-04-17 阿里巴巴集团控股有限公司 Cross-block-chain authentication method and device and electronic equipment
WO2019195940A1 (en) * 2018-04-12 2019-10-17 ISARA Corporation Constructing a multiple-entity root of trust
EP3759640A4 (en) * 2018-04-12 2021-11-24 Isara Corporation Constructing a multiple-entity root of trust
US11615060B2 (en) 2018-04-12 2023-03-28 ISARA Corporation Constructing a multiple entity root of trust
CN108763303A (en) * 2018-04-20 2018-11-06 广东省科技基础条件平台中心 Platform verification method, device, computer equipment and storage medium
US10567174B2 (en) 2018-05-10 2020-02-18 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
TWI701933B (en) * 2018-05-10 2020-08-11 香港商阿里巴巴集團服務有限公司 Block chain data processing method, device, processing equipment and system
US10693649B2 (en) 2018-05-10 2020-06-23 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
TWI733125B (en) * 2018-08-14 2021-07-11 開曼群島商創新先進技術有限公司 Multi-party safe calculation method and device, and electronic equipment
CN109150546A (en) * 2018-09-07 2019-01-04 全链通有限公司 The method for realizing the registration of block chain system of real name based on phone number
CN109242467A (en) * 2018-09-17 2019-01-18 金蝶软件(中国)有限公司 Network-building method, device, computer equipment and storage medium based on block chain
TWI737001B (en) * 2018-12-25 2021-08-21 開曼群島商創新先進技術有限公司 Identity verification method and system
WO2020134942A1 (en) * 2018-12-25 2020-07-02 阿里巴巴集团控股有限公司 Identity verification method and system therefor
CN110071808A (en) * 2019-04-09 2019-07-30 郭浩 A kind of the secure digital identity verification method and device of block chain user
TWI732247B (en) * 2019-07-16 2021-07-01 中華電信股份有限公司 Method to display the validation of certificate at signing time
CN110430201A (en) * 2019-08-09 2019-11-08 北京智汇信元科技有限公司 A kind of distribution identity documents generate, verification method and system
CN111385755A (en) * 2020-03-18 2020-07-07 成都西加云杉科技有限公司 Bandwidth resource sharing method, device, equipment and readable storage medium
CN112118231B (en) * 2020-08-21 2022-06-10 浙江数秦科技有限公司 Trusted identity management method based on block chain technology
CN112118231A (en) * 2020-08-21 2020-12-22 浙江数秦科技有限公司 Trusted identity management method based on block chain technology
US10958450B1 (en) 2020-10-15 2021-03-23 ISARA Corporation Constructing a multiple-entity root certificate data block chain

Also Published As

Publication number Publication date
CN106789041B (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN106789041B (en) A kind of credible block chain method of decentralization certificate
AU2019240671B2 (en) Methods for secure cryptogram generation
US11070564B2 (en) Electronic interaction authentication and verification, and related systems, devices, and methods
CA3014748C (en) Personal device security using elliptic curve cryptography for secret sharing
CA2838675C (en) Implicitly certified digital signatures
JP6543040B2 (en) System and method for remote access, remote digital signature
US8533482B2 (en) Method for generating a key pair and transmitting a public key or request file of a certificate in security
CN107196966A (en) The identity identifying method and system of multi-party trust based on block chain
CA3169568A1 (en) Key exchange through partially trusted third party
CN108768652A (en) It is a kind of can the attack of anti-quantum alliance's block chain bottom encryption method
JP2012055000A (en) Method and system of managing and filtering electronic message using cryptographic technique
JP2003234729A (en) Revocation and updating of token in public key infrastructure system
GB2487503A (en) Authentication of digital files and associated identities using biometric information
US20190149523A1 (en) Anonymous communication system and method for subscribing to said communication system
CA2838322A1 (en) Secure implicit certificate chaining
CN113824564A (en) Online signing method and system based on block chain
US11245514B1 (en) Blockchain delegation
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
US20230188345A1 (en) System and methods for interactive document sharing and authentication with privacy guarantee
Chauhan et al. Digital signature with message security process
WO2019174404A1 (en) Digital group signature method, device and apparatus, and verification method, device and apparatus
CN106973067A (en) A kind of platform environment integrality detection method and device
JP2009239496A (en) Data communication method using key encryption method, data communication program, data communication program storage medium, and data communication system
NL2021222B1 (en) Method for secure encrypted digital services
US20050262346A1 (en) Self-service provisioning of digital certificates

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190712

CF01 Termination of patent right due to non-payment of annual fee