CN106789041A - A kind of credible block chain method of decentralization certificate - Google Patents
A kind of credible block chain method of decentralization certificate Download PDFInfo
- Publication number
- CN106789041A CN106789041A CN201710080268.4A CN201710080268A CN106789041A CN 106789041 A CN106789041 A CN 106789041A CN 201710080268 A CN201710080268 A CN 201710080268A CN 106789041 A CN106789041 A CN 106789041A
- Authority
- CN
- China
- Prior art keywords
- user
- block chain
- decentralization
- personally identifiable
- identifiable information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000012795 verification Methods 0.000 claims description 7
- 238000012790 confirmation Methods 0.000 claims description 6
- 238000010200 validation analysis Methods 0.000 claims description 4
- 238000004321 preservation Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of credible block chain method of decentralization certificate, the first block of block chain is produced by system, and user A adds block chain to system application, the public key of oneself and personally identifiable information private key is digitally signed and submits to system checking;Rear system private-key digital signature is verified, publicity is carried out;When user B will add block chain, user B applies to user A, and with private key be digitally signed for oneself public key and personally identifiable information by user B, submits to user A checkings;Rear user A private-key digital signatures are verified, publicity is carried out;When thering is new user to add block chain again, apply for that after being verified, new user can add the block chain to any bit existing subscriber in block chain.The method of the present invention, as long as user trusts certain user in block chain, it is possible to ensure the other users that this user is confirmed, user can just obtain the public key of any object in block chain from publicity column, the object is given by data encryption.
Description
Technical field
The present invention relates to a kind of credible block chain method of decentralization certificate, belong to field of information security technology.
Background technology
Current PKI public-key cryptography infrastructures, are to trust architectural mechanisms with hierarchy type, and the user on internet only needs
The certificate for being sent of the third-party institution is trusted, as center, it is possible to reach the mutual confidence-building mechanism on internet.
The framework of third party's faith mechanism, there is obstruction on the internet, and use is supplied to from government, bank or enterprise
Family can use third party's faith mechanism, but on the internet, each user is scattered, it is difficult to one trust machine of construction
System.
The content of the invention
The technical problems to be solved by the invention are the defects for overcoming prior art, there is provided a kind of decentralization certificate is credible
Block chain method.
In order to solve the above technical problems, the present invention provides the first block of block chain by a system S with trusted public keys
Produce, user A initiates to add block chain application to system S applications, and by the public key PUB of oneselfAAnd personally identifiable information is with holding
Some private keys are digitally signed SignA, system S is submitted to, the personally identifiable information and numeral of system S checking users A are signed
Name SignA;After confirmation is errorless, system S is verified to user A, by the personally identifiable information and public key of user A
PUBA, produce Hash hash values containing formula HashAAnd produce digital signature Sign with the private key of oneselfS, it is put into publicity column publicity;
When user B will add this block chain, user B to user A application initiate this block chain application, user B by oneself
Public key PUBBAnd personally identifiable information is digitally signed Sign with the private key heldB, submit to user A, user A checking users B
Personally identifiable information and digital signature SignB;After confirmation is errorless, user A is verified to user B, will use
The personally identifiable information and public key PUB of family BB, produce Hash hash values containing formula HashBAnd produce numeral to sign with the private key of oneself
Name SignA, it is put into publicity column publicity;
When there is new user C to add this block chain again, apply to any existing subscriber in block chain, it is existing by this
After user's checking passes through, new user C just adds the block chain, block chain is constantly launched with tree-like manner.
User in block chain obtains the public key of any user object in block chain from publicity column, and this is given by data encryption
User object.
Verification process when new user C adds this block chain adds verification process during block chain identical with above-mentioned user B.
During the personally identifiable information of system S checking users A, by the personal identification of third-party authentication platform validation user A
Information.
The personally identifiable information of user includes mail and/or phone number.
Publicity column is arranged on public network.
System S to after being verified of user A, by the personally identifiable information of user A and public key PUBA, produce Hash
Hash values containing formula HashAAnd produce digital signature Sign with the private key of oneselfS, along with timestamp, it is put into publicity column publicity.
User A to after being verified of user B, by the personally identifiable information of user B and public key PUBB, produce Hash
Hash values containing formula HashBAnd produce digital signature Sign with the private key of oneselfA, along with timestamp, it is put into publicity column publicity.
All users hold the safety means that can produce public private key pair, and private key by its safe preservation.
The beneficial effect that the present invention is reached:
The method of the present invention, as long as user trusts certain user in block chain, according to the digital signature of this user, it is possible to protect
Hinder the other users that this user is confirmed, user can just obtain the public key of any object in block chain from publicity column on public network,
The object is given by data safety encryption.
The method according to the invention, the user on internet, it is not necessary to can just be reached by third party's trust center mutually
Believable benefit, if believe oneself trust friend, it is possible to string circles of trust, on the internet, no matter buy and sell thing or
It is to be traded, has a believable identity to originate.
Brief description of the drawings
Fig. 1 is flow chart of the method for the present invention;
Fig. 2 is the flow chart that user B adds block chain by user A in Fig. 1.
Specific embodiment
The invention will be further described below in conjunction with the accompanying drawings.Following examples are only used for clearly illustrating the present invention
Technical scheme, and can not be limited the scope of the invention with this.
As depicted in figs. 1 and 2, the first block of trusted public keys block chain is produced by system S, and user A applies sending out to system S
This block chain application is played, the public key PUB that the safety means that user A holds oneself are producedAAnd personally identifiable information(Mailbox
Or cell-phone number etc.), Sign is digitally signed with the private key heldA, submit to system S, the individual of system S checking users A
The digital signature of identity information and checking user A.After confirmation is errorless, system S is verified to user A, will use
The personally identifiable information and public key PUB of family AA, produce Hash hash values containing formula HashA, system S produces number with oneself private key
Word signature SignS, and plus timestamp, the publicity column publicity on public network is put into, using user A as user trusty, by it
Information is published to the second block of block chain, block chain is launched with tree-like manner.
Specifically, during the personally identifiable information of system S checking users A, can be by third-party authentication platform validation user A
Personally identifiable information, comprising mail verify or mobile phone verify by way of, or other mutual concessions mode.When
Authentication failed returns to application status;The public key and digital signature of user A offers are verified again after being proved to be successful, after authentication failed
Application status are returned to, after being proved to be successful, by associated personal identification's information of user A(Mailbox or cell-phone number etc.)And public key
PUBA, produce Hash hash values containing formula HashA, system S produces digital signature Sign with oneself private keyS, and plus timestamp,
It is put into the publicity column publicity on public network.
When user B will add this block chain, user B can initiate this block chain application to user A applications, use
The public key PUB that the safety means that family B holds oneself are producedBAnd personally identifiable information(Such as mailbox or cell-phone number), with holding
Some private keys are digitally signed SignB, user A is submitted to, the personally identifiable information of user A checking users B and checking are used
The digital signature Sign of family BB.After confirmation is errorless, user A is verified to user B, by the personal identification of user B
Information and public key PUBB, produce Hash hash values containing formula HashB, user A produces digital signature Sign with oneself private keyA,
And plus timestamp, the publicity column publicity on public network is put into, using user B as user trusty, its information is published to area
3rd block of block chain, makes block chain continue to launch with tree-like manner.
Specifically, during the personally identifiable information of user A checking users B, can be by third-party authentication platform validation user B
Personally identifiable information, comprising mail checking or mobile phone verification mode, or other mutual concessions mode, as long as user
A can confirm that the true identity of user B.When failing the authentication, error message is returned;After being proved to be successful, user A is tested again
Public key and digital signature that card user B is provided, when error message is returned after authentication failed, after being proved to be successful, by the individual of user B
People's identity information(Such as mailbox or cell-phone number)With public key PUBB, produce Hash hash values containing formula HashB, user A with oneself
Private key produces digital signature SignA, and plus timestamp, it is put into the publicity column publicity on public network.
When user C will add this block chain, can to this block chain any user apply, its verification process with it is upper
Stating user B adds verification process during block chain identical, and after the user's checking passes through, user C can just add the block
Chain, makes block chain constantly launch with tree-like manner.As shown in figure 1, in the present embodiment, when user C will add this block chain, can be with
Apply for that after user A is verified, user C can just add the block chain to user A.In other embodiments, user
When C will add this block chain, it is also possible to apply to user B, or directly to system S applications, empirical tests add this area after passing through
Block chain.
All users in the present invention hold a safety means, and the safety means can produce public private key pair, private key
Can be by the preservation of safety.
The method of the present invention, as long as user trusts certain user in block chain, according to the digital signature of this user, so that it may
To ensure the other users that this user is confirmed, user can just obtain the public affairs of any object in block chain from publicity column on public network
Key, the object is given by data safety encryption.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, on the premise of the technology of the present invention principle is not departed from, some improvement and deformation can also be made, these improve and deform
Also should be regarded as protection scope of the present invention.
Claims (9)
1. a kind of credible block chain method of decentralization certificate, it is characterized in that, the first block of block chain has credible public affairs by one
The system S of key is produced, and user A initiates to add block chain application to system S applications, and by the public key PUB of oneselfAAnd personal identification
Information is digitally signed Sign with the private key heldA, submit to system S, the personally identifiable information of system S checking users A with
And digital signature SignA;After confirmation is errorless, system S is verified to user A, by the personally identifiable information of user A
And public key PUBA, produce Hash hash values containing formula HashAAnd produce digital signature Sign with the private key of oneselfS, it is put into publicity column
Publicity;
When user B will add this block chain, user B to user A application initiate this block chain application, user B by oneself
Public key PUBBAnd personally identifiable information is digitally signed Sign with the private key heldB, submit to user A, user A checking users B
Personally identifiable information and digital signature SignB;After confirmation is errorless, user A is verified to user B, will use
The personally identifiable information and public key PUB of family BB, produce Hash hash values containing formula HashBAnd produce numeral to sign with the private key of oneself
Name SignA, it is put into publicity column publicity;
When there is new user C to add this block chain again, apply to any existing subscriber in block chain, it is existing by this
After user's checking passes through, new user C just adds the block chain, block chain is constantly launched with tree-like manner.
2. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, the use in block chain
Family obtains the public key of any user object in block chain from publicity column, and the user object is given by data encryption.
3. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, new user C is added
Verification process during this block chain adds verification process during block chain identical with above-mentioned user B.
4. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, system S checkings are used
During the personally identifiable information of family A, by the personally identifiable information of third-party authentication platform validation user A.
5. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, a person of user
Part information includes mail and/or phone number.
6. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, publicity column is arranged on
On public network.
7. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, system S is to user A
Be verified after, by the personally identifiable information of user A and public key PUBA, produce Hash hash values containing formula HashAAnd use oneself
Private key produce digital signature SignS, along with timestamp, it is put into publicity column publicity.
8. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, user A is to user B
Be verified after, by the personally identifiable information of user B and public key PUBB, produce Hash hash values containing formula HashBAnd with certainly
Oneself private key produces digital signature SignA, along with timestamp, it is put into publicity column publicity.
9. a kind of credible block chain method of decentralization certificate according to claim 1, it is characterized in that, all users hold
There are the safety means that can produce public private key pair, and private key by its safe preservation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710080268.4A CN106789041B (en) | 2017-02-15 | 2017-02-15 | A kind of credible block chain method of decentralization certificate |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710080268.4A CN106789041B (en) | 2017-02-15 | 2017-02-15 | A kind of credible block chain method of decentralization certificate |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106789041A true CN106789041A (en) | 2017-05-31 |
CN106789041B CN106789041B (en) | 2019-07-12 |
Family
ID=58957096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710080268.4A Expired - Fee Related CN106789041B (en) | 2017-02-15 | 2017-02-15 | A kind of credible block chain method of decentralization certificate |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789041B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231239A (en) * | 2017-06-27 | 2017-10-03 | 中国联合网络通信集团有限公司 | Create generation block method for anti-counterfeit and device |
CN107508859A (en) * | 2017-07-20 | 2017-12-22 | 北京交通大学 | Vehicle communication method based on block chain technology in vehicular ad hoc network |
CN107993069A (en) * | 2017-12-13 | 2018-05-04 | 清华大学 | A kind of online transaction method and system based on block chain network |
CN108052530A (en) * | 2017-11-10 | 2018-05-18 | 杭州云象网络技术有限公司 | A kind of decentralization CA construction methods and its system based on alliance's chain |
CN108124505A (en) * | 2017-12-19 | 2018-06-05 | 深圳前海达闼云端智能科技有限公司 | Method and device for acquiring trusted node, storage medium and block link node |
CN108712257A (en) * | 2018-04-03 | 2018-10-26 | 阿里巴巴集团控股有限公司 | The authentication method and device, electronic equipment of transregional piece of chain |
CN108763303A (en) * | 2018-04-20 | 2018-11-06 | 广东省科技基础条件平台中心 | Platform verification method, device, computer equipment and storage medium |
CN109150546A (en) * | 2018-09-07 | 2019-01-04 | 全链通有限公司 | The method for realizing the registration of block chain system of real name based on phone number |
CN109242467A (en) * | 2018-09-17 | 2019-01-18 | 金蝶软件(中国)有限公司 | Network-building method, device, computer equipment and storage medium based on block chain |
WO2019033822A1 (en) * | 2017-08-16 | 2019-02-21 | 中国移动通信有限公司研究院 | Methods for generating and authenticating digital certificate, communication device, and storage medium |
WO2019076019A1 (en) * | 2017-10-18 | 2019-04-25 | 克洛斯比尔有限公司 | Method and device for electronic signature |
CN110071808A (en) * | 2019-04-09 | 2019-07-30 | 郭浩 | A kind of the secure digital identity verification method and device of block chain user |
WO2019195940A1 (en) * | 2018-04-12 | 2019-10-17 | ISARA Corporation | Constructing a multiple-entity root of trust |
CN110430201A (en) * | 2019-08-09 | 2019-11-08 | 北京智汇信元科技有限公司 | A kind of distribution identity documents generate, verification method and system |
US10567174B2 (en) | 2018-05-10 | 2020-02-18 | Alibaba Group Holding Limited | Blockchain data processing methods, apparatuses, processing devices, and systems |
WO2020134942A1 (en) * | 2018-12-25 | 2020-07-02 | 阿里巴巴集团控股有限公司 | Identity verification method and system therefor |
CN111385755A (en) * | 2020-03-18 | 2020-07-07 | 成都西加云杉科技有限公司 | Bandwidth resource sharing method, device, equipment and readable storage medium |
CN112118231A (en) * | 2020-08-21 | 2020-12-22 | 浙江数秦科技有限公司 | Trusted identity management method based on block chain technology |
US10958450B1 (en) | 2020-10-15 | 2021-03-23 | ISARA Corporation | Constructing a multiple-entity root certificate data block chain |
TWI732247B (en) * | 2019-07-16 | 2021-07-01 | 中華電信股份有限公司 | Method to display the validation of certificate at signing time |
TWI733125B (en) * | 2018-08-14 | 2021-07-11 | 開曼群島商創新先進技術有限公司 | Multi-party safe calculation method and device, and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101714996A (en) * | 2009-12-31 | 2010-05-26 | 中兴通讯股份有限公司 | Authentication system and method based on peer-to-peer computing network |
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN106301792A (en) * | 2016-08-31 | 2017-01-04 | 江苏通付盾科技有限公司 | Ca authentication management method based on block chain, Apparatus and system |
CN106385315A (en) * | 2016-08-30 | 2017-02-08 | 北京三未信安科技发展有限公司 | Digital certificate management method and system |
-
2017
- 2017-02-15 CN CN201710080268.4A patent/CN106789041B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101714996A (en) * | 2009-12-31 | 2010-05-26 | 中兴通讯股份有限公司 | Authentication system and method based on peer-to-peer computing network |
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN106385315A (en) * | 2016-08-30 | 2017-02-08 | 北京三未信安科技发展有限公司 | Digital certificate management method and system |
CN106301792A (en) * | 2016-08-31 | 2017-01-04 | 江苏通付盾科技有限公司 | Ca authentication management method based on block chain, Apparatus and system |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231239A (en) * | 2017-06-27 | 2017-10-03 | 中国联合网络通信集团有限公司 | Create generation block method for anti-counterfeit and device |
CN107231239B (en) * | 2017-06-27 | 2019-06-25 | 中国联合网络通信集团有限公司 | Create generation block method for anti-counterfeit and device |
CN107508859A (en) * | 2017-07-20 | 2017-12-22 | 北京交通大学 | Vehicle communication method based on block chain technology in vehicular ad hoc network |
CN107508859B (en) * | 2017-07-20 | 2020-02-21 | 北京交通大学 | Vehicle communication method based on block chain technology in vehicle-mounted self-organizing network |
WO2019033822A1 (en) * | 2017-08-16 | 2019-02-21 | 中国移动通信有限公司研究院 | Methods for generating and authenticating digital certificate, communication device, and storage medium |
CN109412792A (en) * | 2017-08-16 | 2019-03-01 | 中国移动通信有限公司研究院 | Generation, authentication method, communication equipment and the storage medium of digital certificate |
CN109687967B (en) * | 2017-10-18 | 2022-02-08 | 克洛斯比尔有限公司 | Electronic signature method and device |
US11258613B2 (en) | 2017-10-18 | 2022-02-22 | Crosbil Ltd. | Method and device for electronic signature |
WO2019076019A1 (en) * | 2017-10-18 | 2019-04-25 | 克洛斯比尔有限公司 | Method and device for electronic signature |
CN109687967A (en) * | 2017-10-18 | 2019-04-26 | 克洛斯比尔有限公司 | Electric endorsement method and equipment |
CN108052530A (en) * | 2017-11-10 | 2018-05-18 | 杭州云象网络技术有限公司 | A kind of decentralization CA construction methods and its system based on alliance's chain |
CN108052530B (en) * | 2017-11-10 | 2020-12-11 | 杭州云象网络技术有限公司 | Decentralized CA construction method and system based on alliance chain |
CN107993069A (en) * | 2017-12-13 | 2018-05-04 | 清华大学 | A kind of online transaction method and system based on block chain network |
CN108124505A (en) * | 2017-12-19 | 2018-06-05 | 深圳前海达闼云端智能科技有限公司 | Method and device for acquiring trusted node, storage medium and block link node |
WO2019119278A1 (en) * | 2017-12-19 | 2019-06-27 | 深圳前海达闼云端智能科技有限公司 | Method and apparatus for acquiring trusted node, and storage medium and blockchain node |
CN108712257A (en) * | 2018-04-03 | 2018-10-26 | 阿里巴巴集团控股有限公司 | The authentication method and device, electronic equipment of transregional piece of chain |
US10805088B2 (en) | 2018-04-03 | 2020-10-13 | Alibaba Group Holding Limited | Cross-blockchain authentication method, apparatus, and electronic device |
CN108712257B (en) * | 2018-04-03 | 2020-04-17 | 阿里巴巴集团控股有限公司 | Cross-block-chain authentication method and device and electronic equipment |
WO2019195940A1 (en) * | 2018-04-12 | 2019-10-17 | ISARA Corporation | Constructing a multiple-entity root of trust |
EP3759640A4 (en) * | 2018-04-12 | 2021-11-24 | Isara Corporation | Constructing a multiple-entity root of trust |
US11615060B2 (en) | 2018-04-12 | 2023-03-28 | ISARA Corporation | Constructing a multiple entity root of trust |
CN108763303A (en) * | 2018-04-20 | 2018-11-06 | 广东省科技基础条件平台中心 | Platform verification method, device, computer equipment and storage medium |
US10567174B2 (en) | 2018-05-10 | 2020-02-18 | Alibaba Group Holding Limited | Blockchain data processing methods, apparatuses, processing devices, and systems |
TWI701933B (en) * | 2018-05-10 | 2020-08-11 | 香港商阿里巴巴集團服務有限公司 | Block chain data processing method, device, processing equipment and system |
US10693649B2 (en) | 2018-05-10 | 2020-06-23 | Alibaba Group Holding Limited | Blockchain data processing methods, apparatuses, processing devices, and systems |
TWI733125B (en) * | 2018-08-14 | 2021-07-11 | 開曼群島商創新先進技術有限公司 | Multi-party safe calculation method and device, and electronic equipment |
CN109150546A (en) * | 2018-09-07 | 2019-01-04 | 全链通有限公司 | The method for realizing the registration of block chain system of real name based on phone number |
CN109242467A (en) * | 2018-09-17 | 2019-01-18 | 金蝶软件(中国)有限公司 | Network-building method, device, computer equipment and storage medium based on block chain |
TWI737001B (en) * | 2018-12-25 | 2021-08-21 | 開曼群島商創新先進技術有限公司 | Identity verification method and system |
WO2020134942A1 (en) * | 2018-12-25 | 2020-07-02 | 阿里巴巴集团控股有限公司 | Identity verification method and system therefor |
CN110071808A (en) * | 2019-04-09 | 2019-07-30 | 郭浩 | A kind of the secure digital identity verification method and device of block chain user |
TWI732247B (en) * | 2019-07-16 | 2021-07-01 | 中華電信股份有限公司 | Method to display the validation of certificate at signing time |
CN110430201A (en) * | 2019-08-09 | 2019-11-08 | 北京智汇信元科技有限公司 | A kind of distribution identity documents generate, verification method and system |
CN111385755A (en) * | 2020-03-18 | 2020-07-07 | 成都西加云杉科技有限公司 | Bandwidth resource sharing method, device, equipment and readable storage medium |
CN112118231B (en) * | 2020-08-21 | 2022-06-10 | 浙江数秦科技有限公司 | Trusted identity management method based on block chain technology |
CN112118231A (en) * | 2020-08-21 | 2020-12-22 | 浙江数秦科技有限公司 | Trusted identity management method based on block chain technology |
US10958450B1 (en) | 2020-10-15 | 2021-03-23 | ISARA Corporation | Constructing a multiple-entity root certificate data block chain |
Also Published As
Publication number | Publication date |
---|---|
CN106789041B (en) | 2019-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789041B (en) | A kind of credible block chain method of decentralization certificate | |
AU2019240671B2 (en) | Methods for secure cryptogram generation | |
US11070564B2 (en) | Electronic interaction authentication and verification, and related systems, devices, and methods | |
CA3014748C (en) | Personal device security using elliptic curve cryptography for secret sharing | |
CA2838675C (en) | Implicitly certified digital signatures | |
JP6543040B2 (en) | System and method for remote access, remote digital signature | |
US8533482B2 (en) | Method for generating a key pair and transmitting a public key or request file of a certificate in security | |
CN107196966A (en) | The identity identifying method and system of multi-party trust based on block chain | |
CA3169568A1 (en) | Key exchange through partially trusted third party | |
CN108768652A (en) | It is a kind of can the attack of anti-quantum alliance's block chain bottom encryption method | |
JP2012055000A (en) | Method and system of managing and filtering electronic message using cryptographic technique | |
JP2003234729A (en) | Revocation and updating of token in public key infrastructure system | |
GB2487503A (en) | Authentication of digital files and associated identities using biometric information | |
US20190149523A1 (en) | Anonymous communication system and method for subscribing to said communication system | |
CA2838322A1 (en) | Secure implicit certificate chaining | |
CN113824564A (en) | Online signing method and system based on block chain | |
US11245514B1 (en) | Blockchain delegation | |
KR101253683B1 (en) | Digital Signing System and Method Using Chained Hash | |
US20230188345A1 (en) | System and methods for interactive document sharing and authentication with privacy guarantee | |
Chauhan et al. | Digital signature with message security process | |
WO2019174404A1 (en) | Digital group signature method, device and apparatus, and verification method, device and apparatus | |
CN106973067A (en) | A kind of platform environment integrality detection method and device | |
JP2009239496A (en) | Data communication method using key encryption method, data communication program, data communication program storage medium, and data communication system | |
NL2021222B1 (en) | Method for secure encrypted digital services | |
US20050262346A1 (en) | Self-service provisioning of digital certificates |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190712 |
|
CF01 | Termination of patent right due to non-payment of annual fee |