CN108683509A - A kind of method for secure transactions, apparatus and system based on block chain - Google Patents
A kind of method for secure transactions, apparatus and system based on block chain Download PDFInfo
- Publication number
- CN108683509A CN108683509A CN201810459571.XA CN201810459571A CN108683509A CN 108683509 A CN108683509 A CN 108683509A CN 201810459571 A CN201810459571 A CN 201810459571A CN 108683509 A CN108683509 A CN 108683509A
- Authority
- CN
- China
- Prior art keywords
- key
- block chain
- sub
- root
- transaction data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
The present invention relates to block chain security technology areas, more particularly to a kind of method for secure transactions, apparatus and system based on block chain, wherein method includes obtaining block chain transaction data, and access the sub-key in multiple root key dispersed intelligence cards of Secure Transaction device jointly;Integrity key is generated according to the multiple sub-key of at least part;It is signed to the block chain transaction data using the integrity key;Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.Scheme through the embodiment of the present invention can share some the safety that account improves the transaction of block chain.
Description
Technical field
The present invention relates to block chain security technology area more particularly to a kind of method for secure transactions, dresses based on block chain
It sets and system.
Background technology
With the appearance of bit coin in 2009, block chain technology also develops therewith.Block chain technology, it is also known as " distributed
Account book technology " is that a kind of decentralization, collective safeguard the technical solution of distributed account book, and essence is by multiple node collectives
The distributed data base system of participation.Not a kind of single technology of block chain, multiple technologies integrate as a result, utilizing area
The account book record that block chain technical maintenance one is reliable, is difficult to tamper with, can reduce the risk of trust, and can effectively reduce crowd
The maintenance cost of participant cooperation.In block chain practical application, each user will produce a pair of of unsymmetrical key pair, be used for area
Trading signature on block chain corresponds to identity of the hash value of public key as its trading account.In view of safety, efficiency
Equal many factors, block chain rivest, shamir, adelman generally select ECC (elliptic curve) algorithm, the safety of algorithm to depend on
The intractability of elliptic curves discrete logarithm problem (ECDLP).
When the value of digital cash or other financial currencies is higher and higher in the account of block chain, the safety of account
Become focus therewith.The private key of block chain is unique data for proving user identity, the core asset such as bit coin of user also by
And only controlled by private key, mainly enhance the safety of account in block chain using hardware keys in the prior art, but it is this
Technological means can not cope with the safety problem that more people share account, i.e., some account will carry out the behaviour such as transfer accounts in block chain network
As when need more people to approve that signature could execute the scene of operation jointly, coping with the shared account of more people there is an urgent need for one kind now pacifies
The means paid entirely.
Invention content
The technical issues of to solve in the prior art, an embodiment of the present invention provides a kind of Secure Transactions based on block chain
Method, apparatus and system can improve the safety of account fund in block chain network.
On the one hand, an embodiment of the present invention provides a kind of method for secure transactions based on block chain, applied to root key point
Smart card is dissipated, including,
It obtains in block chain transaction data, and multiple root key dispersed intelligence cards of common access Secure Transaction device
Sub-key;
Integrity key is generated according to the multiple sub-key of at least part;
It is signed to the block chain transaction data using the integrity key;
Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.
On the other hand, the embodiment of the present invention additionally provides a kind of root key dispersed intelligence card based on block chain, including,
Receiving unit, for obtaining block chain transaction data, and multiple root keys of common access Secure Transaction device
Sub-key in dispersed intelligence card;
Generation unit, for generating integrity key according to the multiple sub-key of at least part;
Signature unit, for being signed to the block chain transaction data using the integrity key;
Output unit, for being exported the block chain transaction data after the signature to non-by the Secure Transaction device
Volatile memory.
On the other hand, the embodiment of the present invention additionally provides a kind of affaris safety trade system based on block chain, including,
Secure Transaction device connects multiple root key dispersed intelligence cards, and receives block chain transaction data;
Multiple root key dispersed intelligence cards, the block chain number of deals obtained for obtaining the Secure Transaction device
According to, and the sub-key in multiple root key dispersed intelligence cards obtained by the Secure Transaction device;According at least part
The multiple sub-key generates integrity key;It is signed to the block chain transaction data using the integrity key;By institute
The block chain transaction data after signature is stated to export to nonvolatile memory by the Secure Transaction device;
Trading host obtains the transaction data after signing in the nonvolatile memory, passes through area under networked environment
Block chain network completes the transaction on block chain.
On the other hand, the embodiment of the present invention additionally provides a kind of computer readable storage medium, is stored thereon with computer
Instruction, the computer instruction realize following steps when being executed by the processor in root key dispersed intelligence card:Block chain is obtained to hand over
Sub-key in easy data, and multiple root key dispersed intelligence cards of common access Secure Transaction device;According at least one
The multiple sub-key is divided to generate integrity key;It is signed to the block chain transaction data using the integrity key;It will
Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.
Using the embodiment of the present invention, account can be shared to some, or be of great significance account, important account of the exchequer
Family is carried out more people and is managed jointly, improves the safety of account fund, and will share by the Secure Transaction device of talkaround
The private key of account generates temporarily, signs only for primary transaction, improves the safety of block chain transaction.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of method for secure transactions flow diagram based on block chain of the embodiment of the present invention;
Fig. 2 show a kind of structural schematic diagram of the root key dispersed intelligence card based on block chain of the embodiment of the present invention;
Fig. 3 show a kind of affaris safety trade system structural schematic diagram based on block chain of the embodiment of the present invention;
Fig. 4 show a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention;
Fig. 5 show input of the embodiment of the present invention and splits number and decryption threshold value interface schematic diagram;
Fig. 6 show a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention;
Fig. 7 show a kind of method for secure transactions flow chart based on block chain of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of method for secure transactions flow diagram based on block chain of the embodiment of the present invention, in the present embodiment
Method is applied to root key dispersed intelligence card, and the root key dispersed intelligence card is a kind of with data-handling capacity and storage
The smart card of function, all operations are all carried out between root key dispersed intelligence card and root key dispersed intelligence card, are being operated
Each seed key in the process, integrity key, encryption key, the algorithm for splitting integrity key and encryption key, merging sub-key
The algorithm for forming integrity key or encryption key does not reside in Secure Transaction device, and Secure Transaction device can be one general
The computer of logical talkaround or with it is multiple enough for root key dispersed intelligence be clamped into interface equipment, multiple are close
Mutual communication can be carried out between key dispersed intelligence card for example, by equipment such as USB, intelligent card read/write devices, to complete to grasp
Make.As shown in Figure 1, this method includes:
Step 101, block chain transaction data is obtained, and multiple root keys of common access Secure Transaction device disperse intelligence
Sub-key in capable of blocking;
Step 102, integrity key is generated according to the multiple sub-key of at least part;
Step 103, it is signed to the block chain transaction data using the integrity key;
Step 104, the block chain transaction data after the signature is exported by the Secure Transaction device to non-volatile
Property memory.
According to one embodiment of present invention, the acquisition block chain transaction data, common access Secure Transaction device
In sub-key in multiple root key dispersed intelligence cards, the Secure Transaction device and Network Isolation can improve multiple in this way
The safety communicated between root key dispersed intelligence card;Also, all root key dispersed intelligence cards can access same
A Secure Transaction device, or it is respectively connected to more Secure Transaction devices being in secure network.
According to one embodiment of present invention, block chain transaction data, and common access Secure Transaction device are being obtained
Multiple root key dispersed intelligence cards in sub-key before further include that it is close that the integrity key is split as the multiple son
Key, and the root key dispersed intelligence card for being distributed to multiple access Secure Transaction devices is stored.
Wherein, the embodiment of the present invention is directed to the transaction security that account is shared in block chain, and the shared account in block chain is
By multiple user's co- controllings, and the account that can be just traded is authorized jointly, this in block chain is shared in order to control for integrity key
The private key of account trading;The root key dispersed intelligence card is a kind of smart card with data processing and store function, is led to
It crosses IC chip and carries out data processing, data storage is carried out by internal nonvolatile memory such as ROM, data therein are deposited
Storage area domain uses encryption appropriate or secrecy provision, and multiple root key dispersed intelligence card insertions are accessed Secure Transaction device
Afterwards, sub-key can be sent to other root key dispersed intelligences by the communication port between root key dispersed intelligence card to stick into
Row storage.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, by institute
It states integrity key and is split as the multiple sub-key, and be distributed to the root key dispersion intelligence of multiple access Secure Transaction devices
It can block store and further comprise, the integrity key is split as multiple sub-keys, the multiple sub-key is stored in
One or more root key dispersed intelligence card.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, by institute
It states integrity key and is split as the multiple sub-key, and be distributed to the root key dispersion intelligence of multiple access Secure Transaction devices
It can block store and further comprise, the multiple sub-key will be formed after the encryption key for encrypting integrity key fractionation,
Encrypted integrity key and one or more of sub-keys are stored in each root key dispersed intelligence card;The basis
The multiple sub-key generates integrity key and further comprises at least partially, is carried using multiple root key dispersed intelligence cards
The multiple sub-keys supplied generate the encryption key, utilize encrypted integrity key described in the encryption key decryption.
According to one embodiment of present invention, integrity key is split as the multiple sub-key to further comprise, is adopted
The integrity key is split as multiple sub-keys with Shamir Secret Sharing (summer Mir's key is shared) algorithm.Its
In, other modes in the prior art can also be used.
According to one embodiment of present invention, it is generated in integrity key into one according to the multiple sub-key of at least part
Step includes, when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys, by least part institute
It states multiple sub-keys and generates integrity key;
Or using multiple sub-keys that multiple root key dispersed intelligence cards provide generate in the encryption key into
One step includes, when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys, described at least part
Multiple sub-keys generate the encryption key.
Wherein, predetermined ratio can be 50%, such as whole sub-key is 5, when receive 3 even more than son it is close
The sub-key life integrity key that will just be received when key, number here are intended merely to illustratively illustrate, should not manage
Solution is the limitation for predetermined ratio.
According to one embodiment of present invention, it is generated in integrity key into one according to the multiple sub-key of at least part
Step includes sharing algorithm using the key including Shamir Secret Sharing (summer Mir's key is shared) algorithm.
Wherein, symmetry algorithm may be used in generating algorithm and algorithm when splitting, corresponding with the algorithm used when splitting.
According to one embodiment of present invention, the block chain transaction data after the signature is filled by the Secure Transaction
Set output further includes later to nonvolatile memory, by transaction of the nonvolatile memory access under networked environment
Host, so that it completes the transaction on block chain according to the transaction data after the signature, by block chain network.
Wherein, nonvolatile memory may include USB storage, SD memories (secure data card), CD or band
There is the mobile memory etc. of hardware encryption chip.
Method through the embodiment of the present invention can realize that more people share an account, the institute of the account in block chain
There is trading activity (trading activity for needing account private key signature) to be required for obtaining the sub-key that certain proportion shares user
It could complete, can improve the transaction security of shared account in this way, and sub-key is carried out to complete by being detached from the host of network
The generation of whole key improves the safety of shared account private key.
It is illustrated in figure 2 a kind of structural schematic diagram of the root key dispersed intelligence card based on block chain of the embodiment of the present invention,
Root key dispersed intelligence card in detail in this figure is a kind of smart card with data-handling capacity and store function, all behaviour
Work all carries out between root key dispersed intelligence card and root key dispersed intelligence card, each seed key in operation, complete
Whole key, the algorithm for splitting integrity key and encryption key, merges sub-key formation integrity key or encrypts close encryption key
The algorithm of key does not exist in Secure Transaction device, Secure Transaction device can be common talkaround computer or
Person have it is multiple enough for root key dispersed intelligence be clamped into interface equipment, can be between multiple root key dispersed intelligence cards
Mutual communication is carried out for example, by equipment such as USB, intelligent card read/write devices, to complete to operate.As shown in Fig. 2, the device has
Body includes:
Receiving unit 201, for obtaining block chain transaction data, and multiple of common access Secure Transaction device are close
Sub-key in key dispersed intelligence card;
Generation unit 202, for generating integrity key according to the multiple sub-key of at least part;
Signature unit 203, for being signed to the block chain transaction data using the integrity key;
Output unit 204, for exporting the block chain transaction data after the signature by the Secure Transaction device
To nonvolatile memory.
According to one embodiment of present invention, further include split cells 205, it is the multiple for integrity key to be split as
Sub-key, and the root key dispersed intelligence card for being distributed to multiple access Secure Transaction devices is stored.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, described
Split cells is further used for, and the integrity key is split as multiple sub-keys, and the multiple sub-key is stored in one
A or multiple root key dispersed intelligence cards.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, described
Split cells is further used for, and the multiple sub-key is formed after the encryption key for encrypting the integrity key is split,
Each root key dispersed intelligence card stores encrypted integrity key and one or more of sub-keys;
The generation unit is further used for, and the multiple sub-keys provided using multiple root key dispersed intelligence cards are given birth to
At the encryption key, encrypted integrity key described in the encryption key decryption is utilized.
According to one embodiment of present invention, the split cells is further used for, using Shamir
SecretSharing (summer Mir's key is shared), the integrity key was split as multiple sub-keys by algorithm.
According to one embodiment of present invention, the receiving unit further comprises circuit connecting interface, is connected by circuit
It connects port and obtains the transaction data of block chain in Secure Transaction device, and the root for obtaining by Secure Transaction device other accesses is close
The sub-key of key dispersed intelligence card storage.
Wherein, the circuit connecting interface refers to the data transmission channel formed by way of being directly electrically connected, can be with
Including USB interface, smart card reader interface etc..
According to one embodiment of present invention, the generation unit is further used for, when the number for receiving the sub-key
When amount is more than the predetermined ratio of whole sub-keys, the multiple sub-key of described at least part is generated into integrity key;Alternatively,
It, will the multiple sub-key of at least part when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys
Generate the encryption key.
According to one embodiment of present invention, (summer, Mir was close using Shamir Secret Sharing for the generation unit
Key is shared) algorithm.
Device through the embodiment of the present invention can realize that more people share an account, the institute of the account in block chain
There is trading activity (trading activity for needing account private key signature) to be required for obtaining the sub-key that certain proportion shares user
It could complete, can improve the transaction security of shared account in this way, and sub-key is carried out to complete by being detached from the host of network
The generation of whole key improves the safety of shared account private key.
A kind of affaris safety trade system structural schematic diagram based on block chain of the embodiment of the present invention is illustrated in figure 3, in the figure
Describe in the network of block chain, have one either several Secure Transaction devices disconnect network connection and (or be in safety net
In network), multiple root key dispersed intelligence cards are connected to the safety education device, and the root key dispersed intelligence card is (disconnected by off line
Open network) obtained sub-key is generated as integrity key, the transaction data of integrity key signature block chain is then utilized, then pass through
CD is written in transaction data after signature by Secure Transaction device, sends the CD to trading host connected to the network, most
Realize that the technical solution for authorizing an account to complete the transaction of block chain jointly by multiple people, the system specifically include eventually:
Secure Transaction device 301 connects multiple root key dispersed intelligence cards, and receives block chain transaction data;
Multiple root key dispersed intelligence cards 302, the block chain transaction obtained for obtaining the Secure Transaction device
Data, and the sub-key in multiple root key dispersed intelligence cards is obtained by the Secure Transaction device;According at least one
The multiple sub-key is divided to generate integrity key;It is signed to the block chain transaction data using the integrity key;It will
Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory;
Trading host 303 obtains the transaction data after signing in the nonvolatile memory under networked environment, leads to
Cross the transaction on block chain network completion block chain.
According to one embodiment of present invention, nonvolatile memory may include USB storage, SD memories (safety
Data card), CD, or the mobile memory etc. with hardware encryption chip.The trading host passes through CD, USB etc.
Mode obtains the transaction data after signing in the nonvolatile memory.
System through the embodiment of the present invention can realize that more people share an account, the institute of the account in block chain
There is trading activity (trading activity for needing account private key signature) to be required for obtaining the sub-key that certain proportion shares user
It could complete, can improve the transaction security of shared account in this way, and sub-key is carried out to complete by being detached from the host of network
The generation of whole key improves the safety of shared account private key.
It is illustrated in figure 4 a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention,
The embodiment of the present invention is described in detail in this figure and splits integrity key, and multiple users is transferred to preserve the technical solution of sub-key wherein
Secure Transaction device is located in security context, such as can be located in the environment for disconnecting network connection, or is located at reliable office
In the environment of domain Network Communication, trading host can be located in conventional internet environment, and the method in the present embodiment is applied to root
Key dispersed intelligence card, the progress randomly choosed in the root key dispersed intelligence card of multiple access Secure Transaction devices are as follows
Step, or following steps are carried out by the root key dispersed intelligence card of some setting, it specifically includes:
Step 401, the private key of block chain account is generated according to user instruction.
In this step, the integrity key that the block chain account private key of generation is namely described above, the block chain account
It refer to the shared account in the block chain being described above.The root key dispersed intelligence is clamped into Secure Transaction device, and user refers to
Order can be inputted by Secure Transaction device, and pass to root key dispersed intelligence card by USB interface.
Step 402, the number and decryption threshold value that user setting splits integrity key are received by Secure Transaction device.
It in this step, can be with refering to what is shown in Fig. 5, user inputs integrity key in the prompting interface of Secure Transaction device
The number of fractionation inputs corresponding parameter by input equipments such as the keyboard of Secure Transaction device, mouses, and user needs in this example
Integrity key is split as 5 parts, that is, is split as 5 sub-keys;And decryption threshold value, the decryption threshold value are close according to son
The number of key restores integrity key, and it is 3 that threshold value is decrypted in capital and interest.
Step 403, integrity key is split as specified multiple sons by root key dispersed intelligence card according to the fractionation number
Key.
In this step, can be carried out according to algorithm Shamir Secret Sharing (summer Mir's key is shared)
It splits, using integrity key as secret information, (3,5) is taken to be used as thresholding, it is (namely sub close to generate 5 sections of secret sharing information
Key), wherein arbitrary 3 sections or more of dispersion secret can restore entire secret information (namely integrity key) together.
Step 404, the multiple quantum key distribution is given to corresponding root key dispersed intelligence card.
In this step, Secure Transaction device prompts user to be inserted into root key dispersed intelligence card (example to Secure Transaction device
Such as smart card with USB interface), multiple sub-keys are respectively written into different root key dispersed intelligence cards, then by this
A little root key dispersed intelligence cards are transferred to multiple users of shared account, it is each with preserve per family its accordingly some (or
It is several) root key dispersed intelligence card.
Alternatively, in this step, multiple sub-keys can also be respectively burnt at different by way of imprinting CDs
In CD, leaking or distorting for sub-key can be prevented in this way.
The data such as the sub-key generated temporarily, cryptographic key factor can also be finally removed in Secure Transaction device, to ensure
Data in root key dispersed intelligence card will not leak.
It is illustrated in figure 6 a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention,
Another method for splitting integrity key of description in detail in this figure, the method for this example run on root key dispersed intelligence card, but institute
Some root key dispersed intelligence cards need access Secure Transaction device to be communicated, and the integrity key in this example is not true
The private key of positive block chain account, the block chain account private key is generated by cryptographic key factor (RootKeySeed), in this example
Integrity key is the key (ScrambleKey) for encrypting the cryptographic key factor, is specifically included:
Step 601, the cryptographic key factor for generating block chain account private key is generated according to user instruction.
In this step, block chain account refers to the shared account in the block chain being described above, cryptographic key factor
(RootKeySeed) be generated by hardware (root key dispersed intelligence card) random number module of intelligent card chip 2048 with
Machine number, the cryptographic key factor can be used for generating block chain account private key, that is, the private key of shared account.Receiving user instructions can
To refer to previous embodiment.
Step 602, cryptographic key factor encryption key is generated.
In this step, 128 ratios are generated by the hardware of intelligent card chip (root key dispersed intelligence card) random number module
The special encryption key (ScrambleKey) for encrypting the cryptographic key factor.
Step 603, cryptographic key factor (RootKeySeed) is encrypted using encryption key (ScrambleKey), is obtained
Encrypted cryptographic key factor (ERootKeySeed).
Step 604, the encrypted cryptographic key factor is stored in 5 root key dispersed intelligence cards.
In this step, root key dispersed intelligence card can be the USB device with safety prevention measure, the root key point
Dissipating the quantity of smart card can set according to user and be become, such as can be 7,3,4 etc..As when it is implemented,
It is inserted into the root key dispersed intelligence card of respective numbers on computer, can pass through boolean Metz between root key dispersed intelligence card
Te-De Meite agreements (Burmester-Desmedt agreements) establish secured communication channel, the program in root key dispersed intelligence card
Encrypted cryptographic key factor is completely written to these root key dispersed intelligence cards respectively automatically to store, root can be stored in
The secure memory area of key dispersed intelligence card.
Step 605, encryption key (ScrambleKey) is split as 5 parts, corresponding root key point will be stored in per portion
It dissipates in smart card.
In this step, the interface that prompting interface shown in fig. 5 splits encryption key as setting can be equally referred to,
Using Shamir Secret Sharing algorithms using encryption key as secret information in this example, (3,5) is taken to be used as thresholding, production
Raw 5 sections of secret sharing information, wherein arbitrary 3 sections or more of dispersion secret can restore entire secret information, that is, pass through
Encryption key is split as 5 sub-keys, respectively by each one's share of expenses for a joint undertaking key storage in each root key dispersed intelligence card, and
It can restore encryption key (ScrambleKey) by 3 sub-keys therein.
In the present embodiment, (the 3,5) threshold value used in Shamir Secret Sharing algorithms may be used other
Setting.
Step 606, access control module is added in each described root key dispersed intelligence card.
In this step, the access control module can be to log in password, such as when the root key dispersed intelligence card
When being inserted into the USB interface of computer, root key dispersed intelligence card automatic running access control module, in the access control module
In be stored with entry password, and display logs in password entry interface in the display, and correctly password is logged in when user has input,
Access control module will allow the computer to access the data in the root key dispersed intelligence card, otherwise refuse computer access
Internal data.Wherein, it is described log in password can be character string, biological information (such as fingerprint, sound, iris etc.) or other
The safety verification mode of mode.
Step 607, the cryptographic key factor, encryption key of interim storage in Secure Transaction device are removed, is split by encryption key
The sensitive datas such as obtained multiple sub-keys.
It may insure the safety of cryptographic key factor, encryption key, sub-key by this step.
It is illustrated in figure 7 a kind of method for secure transactions flow chart based on block chain of the embodiment of the present invention, it is close to be applied to root
In key dispersed intelligence card, Secure Transaction device and trading host, the Secure Transaction device is the computing device (example of talkaround
Such as desktop computer, notebook computer), it describes restore root key dispersed intelligence card according to multiple sub-keys in detail in this figure
In integrity key, signed to transaction data using integrity key, and be synchronized in block chain network realize complete transaction
Process.It specifically includes:
Step 701, when needing to carry out transfer operation, multiple root key dispersed intelligence card insertions are entered to the safety of talkaround
Transaction system.
In this step, it needs to carry out transfer operation, the root key dispersed intelligence card that will be preserved by more people from shared account
It is inserted on the Secure Transaction device of talkaround, such as root key dispersed intelligence card sum is 5, the preservation root currently shown up
The user number of key dispersed intelligence card is 3 people, and be inserted into Secure Transaction device is also 3 with key dispersion card quantity.Wherein,
The purpose of Secure Transaction device talkaround is, in order to ensure data communicate between root key dispersed intelligence card safety, and
And it is for block chain transaction data and comparatively safe.
Step 702, entry password is inputted for each root key dispersed intelligence card, activates the root key dispersed intelligence
Card.
In this step, it after multiple root key dispersed intelligence card insertions enter Secure Transaction device, is handed in the safety of talkaround
The input interface for showing entry password in the display device of easy device computer respectively, when the input using Secure Transaction device is set
After standby input correctly logs in password, the root key dispersed intelligence card and the Secure Transaction device computer normal communication,
It can be communicated by Secure Transaction device between namely multiple root key dispersed intelligence cards.
Step 703, it is communicated between multiple root key dispersed intelligence cards, obtains the son of other root key dispersed intelligence cards
Key.
In this step, root key dispersed intelligence card is the USB device with smart IC chip, or for IC chip
Equipment (at this point, Secure Transaction device also simultaneously there are multiple IC chip card reader, so as to obtain IC chip obtain number
According to), which there are data to store and process ability, multiple root key dispersed intelligence cards negotiate by one or
The work that multiple sub-keys are reverted to integrity key by the multiple root key dispersed intelligence cards of person (or can also be by presetting
Some root key dispersed intelligence card is main root key dispersed intelligence card), in this example, sticked into for a root key dispersed intelligence
Row is resumed work, and Burmester-Desmedt agreements, which may be used, between multiple root key dispersed intelligence cards establishes one
Then SessionKey establishes the escape way communicated between root key dispersed intelligence card using the SessionKey, obtain
Sub-key in each root key dispersed intelligence card.
Step 704, when the quantity of sub-key reaches threshold value, restore encryption key ScrambleKey.
In this step, it is calculated using Shamir Secret Sharing by some the root key dispersed intelligence card negotiated
Method restore encryption key ScrambleKey, when sub-key number be more than scheduled threshold value, in this case, it is 3 or more,
Restore complete encryption key by the sub-key of Shamir Secret Sharing algorithms and 3 or more
ScrambleKey;If the root key dispersed intelligence card being inserted into is less than threshold value (3), encryption key can not be restored, passed through
The display output of Secure Transaction device cannot reply the information of encryption key due to sub-key lazy weight.
Algorithm in this step executes in the IC chip of root key dispersed intelligence card.
Step 705, the cryptographic key factor in the encryption key decryption root key dispersed intelligence card is utilized.
In this step, since cryptographic key factor is stored in each root key dispersed intelligence card, pass through recovery
Complete encryption key can decrypt the cryptographic key factor in any root key dispersed intelligence card, use above-mentioned steps in this example
The IC chip for executing the root key dispersed intelligence card for restoring encryption key program decrypts the cryptographic key factor.
Step 706, the private key for sharing account is generated using the cryptographic key factor.
In this step, generating the step of sharing account private key using cryptographic key factor can be in root key dispersed intelligence card
It is completed in intelligent chip (IC chip), may further ensure that the safety for generating and sharing account private key, the generation are shared in this way
The concrete mode of account private key can use elliptic curve or other block chain private keys to generate algorithm.
Step 707, the private key signature transaction data of the shared account is utilized.
In this step, transaction data can generate in Secure Transaction device, can also be to be set by USB storages
It is standby to send Secure Transaction device to.The private key that root key dispersed intelligence Cali generates signs to the transaction data,
Wherein, it is to sign to the cryptographic Hash of transaction data in this example.
Step 708, the transaction data after signature is written among CD by Secure Transaction device.
In this step, the transaction data after signature is to confirm the transaction that can be executed by 3 shared accounts, due to
Through the threshold value (being more than the 3/5 of shared account cura generalis number) more than agreement, then the transaction is authorized.Profit
Nonvolatile memory is written into the signature transaction data with the CD writer of Secure Transaction device, i.e., in CD, or
It can also be written in other not revisable non-volatile memory mediums, can prevent from distorting the transaction data in CD in this way,
Improve the safety of signature transaction data.
After completing the work of CD write-in, it is private that Secure Transaction device removes all about shared account cached in memory
The data of key, cryptographic key factor, encryption key.
Step 709, the trading host of networking reads the signature transaction data in the CD.
In this step, it inserts the disc into the CD drive of networking trading host, described in the trading host acquisition
The transaction data of signature, operator start block chain transacting customer end on the trading host, and transacting customer end obtains the label
The transaction data of name.
Step 710, trading host broadcasts signature transaction data to block chain network, passes through block chain network and completes block
Transaction on chain.
In this step, trading host broadcasts the transaction data of signature in block chain network, keeps accounts.
So far, money transfer transactions are completed.
By the method and device, system in above-mentioned the embodiment of the present application, account can be shared to some, or have
The account of important meaning, important fund account are carried out more people and are managed jointly, improve the safety of account fund, and pass through off-grid
The Secure Transaction device of work generates the private key of shared account temporarily, signs only for primary transaction, improves block
The safety of chain transaction.
The embodiment of the present invention also provides a kind of computer-readable instruction, wherein when executing described instruction in electronic equipment
When, program therein makes the method that electronic equipment executes determination processor operation as shown in Figure 1 to Figure 3.
It should be understood that in various embodiments of the present invention, size of the sequence numbers of the above procedures is not meant to execute suitable
The execution sequence of the priority of sequence, each process should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention
Process constitutes any restriction.
It should also be understood that in embodiments of the present invention, term "and/or" is only a kind of association pass of description affiliated partner
System indicates may exist three kinds of relationships.For example, A and/or B, can indicate:Individualism A exists simultaneously A and B, individualism
These three situations of B.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution.Specially
Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, foregoing description is
The specific work process of system, device and unit, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component
It can be combined or can be integrated into another system, or some features can be ignored or not executed.In addition, shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be the INDIRECT COUPLING by some interfaces, device or unit
Or communication connection, can also be electricity, mechanical or other form connections.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present invention
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, can also be during two or more units are integrated in one unit.It is above-mentioned integrated
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random AccessMemory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Specific embodiment is applied in the present invention, and principle and implementation of the present invention are described, above example
Explanation be merely used to help understand the present invention method and its core concept;Meanwhile for those of ordinary skill in the art,
According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification
Appearance should not be construed as limiting the invention.
Claims (10)
1. a kind of method for secure transactions based on block chain is applied to root key dispersed intelligence card, it is characterised in that including,
The son obtained in block chain transaction data, and multiple root key dispersed intelligence cards of common access Secure Transaction device is close
Key;
Integrity key is generated according to the multiple sub-key of at least part;
It is signed to the block chain transaction data using the integrity key;
Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.
2. according to the method described in claim 1, it is characterized in that, obtaining block chain transaction data, and common access peace
Further include being split as the integrity key described before sub-key in multiple root key dispersed intelligence cards of full transaction system
Multiple sub-keys, and the root key dispersed intelligence card for being distributed to multiple access Secure Transaction devices is stored.
3. according to the method described in claim 2, it is characterized in that, the integrity key is to share account in block chain network
The integrity key is split as the multiple sub-key by private key, and is distributed to the root of multiple access Secure Transaction devices
Key dispersed intelligence card carries out storage and further comprises, the integrity key is split as multiple sub-keys, by the multiple son
Key storage is in one or more root key dispersed intelligence card.
4. according to the method described in claim 3, it is characterized in that, being generated according to the multiple sub-key of at least part complete
Key further comprises, when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys, described in general extremely
Few a part of the multiple sub-key generates integrity key.
5. according to the method described in claim 2, it is characterized in that, the integrity key is to share account in block chain network
The integrity key is split as the multiple sub-key by private key, and is distributed to the root of multiple access Secure Transaction devices
Key dispersed intelligence card carries out storage and further comprises, is formed after the encryption key for encrypting the integrity key is split described more
A sub-key stores encrypted integrity key in each root key dispersed intelligence card and one or more of sons is close
Key;
It is described to be further comprised according to the multiple sub-key generation integrity key of at least part, utilize multiple root keys
Multiple sub-keys that dispersed intelligence card provides generate the encryption key, using encrypted complete described in the encryption key decryption
Whole key.
6. according to the method described in claim 5, it is characterized in that, being provided using multiple root key dispersed intelligence cards more
A sub-key generates the encryption key and further comprises, when the quantity for receiving the sub-key is more than whole sub-keys
When predetermined ratio, the multiple sub-key of at least part is generated into the encryption key.
7. according to the method described in claim 1, it is characterized in that, the block chain transaction data after the signature is passed through described
Secure Transaction device further includes after exporting to nonvolatile memory, by nonvolatile memory access in networking ring
Trading host under border, so that it completes block chain according to the block chain transaction data after the signature, by block chain network
On transaction.
8. a kind of root key dispersed intelligence card based on block chain, it is characterised in that including,
Receiving unit, for obtaining block chain transaction data, and multiple root keys dispersion of common access Secure Transaction device
Sub-key in smart card;
Generation unit, for generating integrity key according to the multiple sub-key of at least part;
Signature unit, for being signed to the block chain transaction data using the integrity key;
Output unit, for being exported the block chain transaction data after the signature to non-volatile by the Secure Transaction device
Property memory.
9. a kind of affaris safety trade system based on block chain, it is characterised in that including,
Secure Transaction device connects multiple root key dispersed intelligence cards, and receives block chain transaction data;
Multiple root key dispersed intelligence cards, the block chain transaction data obtained for obtaining the Secure Transaction device, with
And the sub-key in multiple root key dispersed intelligence cards is obtained by the Secure Transaction device;It is described more according at least part
A sub-key generates integrity key;It is signed to the block chain transaction data using the integrity key;By the signature
Block chain transaction data afterwards is exported by the Secure Transaction device to nonvolatile memory;
Trading host obtains the transaction data after signing in the nonvolatile memory, passes through block chain under networked environment
Network completes the transaction on block chain.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, which disperses intelligence by root key
Processor in capable of blocking realizes following steps when executing:Obtain block chain transaction data, and common access Secure Transaction device
Multiple root key dispersed intelligence cards in sub-key;Integrity key is generated according to the multiple sub-key of at least part;Profit
It is signed to the block chain transaction data with the integrity key;Block chain transaction data after the signature is passed through into institute
Secure Transaction device is stated to export to nonvolatile memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810459571.XA CN108683509B (en) | 2018-05-15 | 2018-05-15 | Block chain-based secure transaction method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810459571.XA CN108683509B (en) | 2018-05-15 | 2018-05-15 | Block chain-based secure transaction method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108683509A true CN108683509A (en) | 2018-10-19 |
CN108683509B CN108683509B (en) | 2021-12-28 |
Family
ID=63805289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810459571.XA Active CN108683509B (en) | 2018-05-15 | 2018-05-15 | Block chain-based secure transaction method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108683509B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109615525A (en) * | 2019-01-18 | 2019-04-12 | 北京阿尔山区块链联盟科技有限公司 | Multi-signature shares guard method, system and the electronic equipment of account |
CN109687963A (en) * | 2019-01-15 | 2019-04-26 | 如般量子科技有限公司 | Anti- quantum calculation alliance chain method of commerce and system based on public key pond |
CN109687979A (en) * | 2019-03-06 | 2019-04-26 | 郑州师范学院 | A kind of ring signatures method, apparatus, equipment and medium |
CN109934585A (en) * | 2019-03-08 | 2019-06-25 | 矩阵元技术(深圳)有限公司 | A kind of endorsement method based on multi-party computations, apparatus and system |
CN110061850A (en) * | 2019-04-24 | 2019-07-26 | 电子科技大学 | The collision calculation method and editable block chain building method of chameleon hash function |
CN110138559A (en) * | 2019-06-03 | 2019-08-16 | 北京智芯微电子科技有限公司 | The method and system of quantum-key distribution are carried out to the terminal in platform area |
CN110198320A (en) * | 2019-06-03 | 2019-09-03 | 江苏恒宝智能系统技术有限公司 | A kind of ciphered information transmission method |
CN110443697A (en) * | 2019-08-08 | 2019-11-12 | 北京阿尔山区块链联盟科技有限公司 | The management method and device of bank account |
CN111178875A (en) * | 2019-12-23 | 2020-05-19 | 杭州复杂美科技有限公司 | Wallet account configuration method, wallet account application method, device and storage medium |
CN111177780A (en) * | 2019-12-26 | 2020-05-19 | 深圳创客区块链技术有限公司 | Security verification method and device, terminal equipment and computer readable storage medium |
CN111291398A (en) * | 2020-03-04 | 2020-06-16 | 恒安嘉新(北京)科技股份公司 | Block chain-based authentication method and device, computer equipment and storage medium |
CN111385098A (en) * | 2018-12-29 | 2020-07-07 | 华为技术有限公司 | Key generation method and device |
WO2020172890A1 (en) * | 2019-02-28 | 2020-09-03 | 云图有限公司 | Method and device for client to generate key for multiple clients and single server |
WO2020172885A1 (en) * | 2019-02-28 | 2020-09-03 | 云图有限公司 | Key management method in which single client generates private key, and electronic device |
CN113098697A (en) * | 2021-06-08 | 2021-07-09 | 清华大学 | Block chain data writing and accessing method and device |
CN113169879A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for storing data on blockchains |
CN113364754A (en) * | 2021-05-31 | 2021-09-07 | 支付宝(杭州)信息技术有限公司 | Data sharing method, device and equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932140A (en) * | 2012-11-20 | 2013-02-13 | 成都卫士通信息产业股份有限公司 | Key backup method for enhancing safety of cipher machine |
CN103546277A (en) * | 2013-09-25 | 2014-01-29 | 北京握奇数据系统有限公司 | Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system |
CN103701588A (en) * | 2013-12-18 | 2014-04-02 | 北京民芯科技有限公司 | Secret sharing hardware realization method and device |
CN104704504A (en) * | 2012-09-26 | 2015-06-10 | 净睿存储股份有限公司 | Multi-drive cooperation to generate encryption key |
CN105356997A (en) * | 2015-08-06 | 2016-02-24 | 华南农业大学 | Security distributed data management method based on public cloud |
US9413735B1 (en) * | 2015-01-20 | 2016-08-09 | Ca, Inc. | Managing distribution and retrieval of security key fragments among proxy storage devices |
CN107465505A (en) * | 2017-08-28 | 2017-12-12 | 阿里巴巴集团控股有限公司 | A kind of key data processing method, device and server |
-
2018
- 2018-05-15 CN CN201810459571.XA patent/CN108683509B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104704504A (en) * | 2012-09-26 | 2015-06-10 | 净睿存储股份有限公司 | Multi-drive cooperation to generate encryption key |
CN102932140A (en) * | 2012-11-20 | 2013-02-13 | 成都卫士通信息产业股份有限公司 | Key backup method for enhancing safety of cipher machine |
CN103546277A (en) * | 2013-09-25 | 2014-01-29 | 北京握奇数据系统有限公司 | Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system |
CN103701588A (en) * | 2013-12-18 | 2014-04-02 | 北京民芯科技有限公司 | Secret sharing hardware realization method and device |
US9413735B1 (en) * | 2015-01-20 | 2016-08-09 | Ca, Inc. | Managing distribution and retrieval of security key fragments among proxy storage devices |
CN105356997A (en) * | 2015-08-06 | 2016-02-24 | 华南农业大学 | Security distributed data management method based on public cloud |
CN107465505A (en) * | 2017-08-28 | 2017-12-12 | 阿里巴巴集团控股有限公司 | A kind of key data processing method, device and server |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113169879A (en) * | 2018-11-27 | 2021-07-23 | 区块链控股有限公司 | Computer-implemented system and method for storing data on blockchains |
CN111385098A (en) * | 2018-12-29 | 2020-07-07 | 华为技术有限公司 | Key generation method and device |
CN109687963A (en) * | 2019-01-15 | 2019-04-26 | 如般量子科技有限公司 | Anti- quantum calculation alliance chain method of commerce and system based on public key pond |
CN109687963B (en) * | 2019-01-15 | 2021-06-22 | 如般量子科技有限公司 | Anti-quantum computing alliance chain transaction method and system based on public key pool |
CN109615525A (en) * | 2019-01-18 | 2019-04-12 | 北京阿尔山区块链联盟科技有限公司 | Multi-signature shares guard method, system and the electronic equipment of account |
WO2020172885A1 (en) * | 2019-02-28 | 2020-09-03 | 云图有限公司 | Key management method in which single client generates private key, and electronic device |
WO2020172890A1 (en) * | 2019-02-28 | 2020-09-03 | 云图有限公司 | Method and device for client to generate key for multiple clients and single server |
CN109687979A (en) * | 2019-03-06 | 2019-04-26 | 郑州师范学院 | A kind of ring signatures method, apparatus, equipment and medium |
CN109934585A (en) * | 2019-03-08 | 2019-06-25 | 矩阵元技术(深圳)有限公司 | A kind of endorsement method based on multi-party computations, apparatus and system |
CN109934585B (en) * | 2019-03-08 | 2023-07-28 | 矩阵元技术(深圳)有限公司 | Signature method, device and system based on secure multiparty calculation |
CN110061850A (en) * | 2019-04-24 | 2019-07-26 | 电子科技大学 | The collision calculation method and editable block chain building method of chameleon hash function |
CN110198320A (en) * | 2019-06-03 | 2019-09-03 | 江苏恒宝智能系统技术有限公司 | A kind of ciphered information transmission method |
CN110138559A (en) * | 2019-06-03 | 2019-08-16 | 北京智芯微电子科技有限公司 | The method and system of quantum-key distribution are carried out to the terminal in platform area |
CN110138559B (en) * | 2019-06-03 | 2022-02-01 | 北京智芯微电子科技有限公司 | Method and system for quantum key distribution of terminal in transformer area |
CN110198320B (en) * | 2019-06-03 | 2021-10-26 | 恒宝股份有限公司 | Encrypted information transmission method and system |
CN110443697A (en) * | 2019-08-08 | 2019-11-12 | 北京阿尔山区块链联盟科技有限公司 | The management method and device of bank account |
CN111178875A (en) * | 2019-12-23 | 2020-05-19 | 杭州复杂美科技有限公司 | Wallet account configuration method, wallet account application method, device and storage medium |
CN111177780A (en) * | 2019-12-26 | 2020-05-19 | 深圳创客区块链技术有限公司 | Security verification method and device, terminal equipment and computer readable storage medium |
CN111177780B (en) * | 2019-12-26 | 2022-05-20 | 深圳创客区块链技术有限公司 | Security verification method, device, terminal equipment and computer readable storage medium |
CN111291398A (en) * | 2020-03-04 | 2020-06-16 | 恒安嘉新(北京)科技股份公司 | Block chain-based authentication method and device, computer equipment and storage medium |
CN113364754A (en) * | 2021-05-31 | 2021-09-07 | 支付宝(杭州)信息技术有限公司 | Data sharing method, device and equipment |
CN113364754B (en) * | 2021-05-31 | 2023-10-13 | 支付宝(杭州)信息技术有限公司 | Data sharing method, device and equipment |
CN113098697A (en) * | 2021-06-08 | 2021-07-09 | 清华大学 | Block chain data writing and accessing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN108683509B (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108683509A (en) | A kind of method for secure transactions, apparatus and system based on block chain | |
Allen et al. | Design choices for central bank digital currency: Policy and technical considerations | |
Singh et al. | Blockchain: Future of financial and cyber security | |
US10536445B1 (en) | Discrete blockchain and blockchain communications | |
WO2018137316A1 (en) | Secure transaction method based on block chain, electronic device, system, and storage medium | |
CN104217327B (en) | A kind of financial IC card internet terminal and its method of commerce | |
EP2143028B1 (en) | Secure pin management | |
US9948624B2 (en) | Key downloading method, management method, downloading management method, device and system | |
US7526652B2 (en) | Secure PIN management | |
KR20230157929A (en) | Transfer cryptocurrency from a remote access restricted wallet | |
CN104463001A (en) | Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key | |
CN107682364B (en) | A kind of license chain privacy method of commerce | |
CN107222303A (en) | Digital publishing rights traceability system building method based on block chain and cloud platform | |
CN106789052A (en) | A kind of remote cipher key based on quantum communication network issues system and its application method | |
US11917075B2 (en) | Multi-signature security account control system | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN107332671A (en) | A kind of safety mobile terminal system and method for secure transactions based on safety chip | |
CN206611427U (en) | A kind of key storage management system based on trust computing device | |
WO2020199028A1 (en) | Security chip, security processing method and related device | |
CN206611428U (en) | A kind of remote cipher key based on quantum communication network issues system | |
Allen et al. | Design choices for central bank digital currency | |
TW201426395A (en) | Data security system and method | |
CN104065488B (en) | Method based on Conbined public or double key certification microprocessor card cloud management system | |
CN100550735C (en) | The method of multifunction intelligent key equipment and security control thereof | |
WO2022089518A1 (en) | Address generation method, blockchain information processing method, and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |