CN108683509A - A kind of method for secure transactions, apparatus and system based on block chain - Google Patents

A kind of method for secure transactions, apparatus and system based on block chain Download PDF

Info

Publication number
CN108683509A
CN108683509A CN201810459571.XA CN201810459571A CN108683509A CN 108683509 A CN108683509 A CN 108683509A CN 201810459571 A CN201810459571 A CN 201810459571A CN 108683509 A CN108683509 A CN 108683509A
Authority
CN
China
Prior art keywords
key
block chain
sub
root
transaction data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810459571.XA
Other languages
Chinese (zh)
Other versions
CN108683509B (en
Inventor
成盛
佘伦凯
蒋万江
谢新强
周爱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Genesis Intelligence Chain Information Technology Research Institute
Original Assignee
Beijing Genesis Intelligence Chain Information Technology Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Genesis Intelligence Chain Information Technology Research Institute filed Critical Beijing Genesis Intelligence Chain Information Technology Research Institute
Priority to CN201810459571.XA priority Critical patent/CN108683509B/en
Publication of CN108683509A publication Critical patent/CN108683509A/en
Application granted granted Critical
Publication of CN108683509B publication Critical patent/CN108683509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The present invention relates to block chain security technology areas, more particularly to a kind of method for secure transactions, apparatus and system based on block chain, wherein method includes obtaining block chain transaction data, and access the sub-key in multiple root key dispersed intelligence cards of Secure Transaction device jointly;Integrity key is generated according to the multiple sub-key of at least part;It is signed to the block chain transaction data using the integrity key;Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.Scheme through the embodiment of the present invention can share some the safety that account improves the transaction of block chain.

Description

A kind of method for secure transactions, apparatus and system based on block chain
Technical field
The present invention relates to block chain security technology area more particularly to a kind of method for secure transactions, dresses based on block chain It sets and system.
Background technology
With the appearance of bit coin in 2009, block chain technology also develops therewith.Block chain technology, it is also known as " distributed Account book technology " is that a kind of decentralization, collective safeguard the technical solution of distributed account book, and essence is by multiple node collectives The distributed data base system of participation.Not a kind of single technology of block chain, multiple technologies integrate as a result, utilizing area The account book record that block chain technical maintenance one is reliable, is difficult to tamper with, can reduce the risk of trust, and can effectively reduce crowd The maintenance cost of participant cooperation.In block chain practical application, each user will produce a pair of of unsymmetrical key pair, be used for area Trading signature on block chain corresponds to identity of the hash value of public key as its trading account.In view of safety, efficiency Equal many factors, block chain rivest, shamir, adelman generally select ECC (elliptic curve) algorithm, the safety of algorithm to depend on The intractability of elliptic curves discrete logarithm problem (ECDLP).
When the value of digital cash or other financial currencies is higher and higher in the account of block chain, the safety of account Become focus therewith.The private key of block chain is unique data for proving user identity, the core asset such as bit coin of user also by And only controlled by private key, mainly enhance the safety of account in block chain using hardware keys in the prior art, but it is this Technological means can not cope with the safety problem that more people share account, i.e., some account will carry out the behaviour such as transfer accounts in block chain network As when need more people to approve that signature could execute the scene of operation jointly, coping with the shared account of more people there is an urgent need for one kind now pacifies The means paid entirely.
Invention content
The technical issues of to solve in the prior art, an embodiment of the present invention provides a kind of Secure Transactions based on block chain Method, apparatus and system can improve the safety of account fund in block chain network.
On the one hand, an embodiment of the present invention provides a kind of method for secure transactions based on block chain, applied to root key point Smart card is dissipated, including,
It obtains in block chain transaction data, and multiple root key dispersed intelligence cards of common access Secure Transaction device Sub-key;
Integrity key is generated according to the multiple sub-key of at least part;
It is signed to the block chain transaction data using the integrity key;
Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.
On the other hand, the embodiment of the present invention additionally provides a kind of root key dispersed intelligence card based on block chain, including,
Receiving unit, for obtaining block chain transaction data, and multiple root keys of common access Secure Transaction device Sub-key in dispersed intelligence card;
Generation unit, for generating integrity key according to the multiple sub-key of at least part;
Signature unit, for being signed to the block chain transaction data using the integrity key;
Output unit, for being exported the block chain transaction data after the signature to non-by the Secure Transaction device Volatile memory.
On the other hand, the embodiment of the present invention additionally provides a kind of affaris safety trade system based on block chain, including,
Secure Transaction device connects multiple root key dispersed intelligence cards, and receives block chain transaction data;
Multiple root key dispersed intelligence cards, the block chain number of deals obtained for obtaining the Secure Transaction device According to, and the sub-key in multiple root key dispersed intelligence cards obtained by the Secure Transaction device;According at least part The multiple sub-key generates integrity key;It is signed to the block chain transaction data using the integrity key;By institute The block chain transaction data after signature is stated to export to nonvolatile memory by the Secure Transaction device;
Trading host obtains the transaction data after signing in the nonvolatile memory, passes through area under networked environment Block chain network completes the transaction on block chain.
On the other hand, the embodiment of the present invention additionally provides a kind of computer readable storage medium, is stored thereon with computer Instruction, the computer instruction realize following steps when being executed by the processor in root key dispersed intelligence card:Block chain is obtained to hand over Sub-key in easy data, and multiple root key dispersed intelligence cards of common access Secure Transaction device;According at least one The multiple sub-key is divided to generate integrity key;It is signed to the block chain transaction data using the integrity key;It will Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.
Using the embodiment of the present invention, account can be shared to some, or be of great significance account, important account of the exchequer Family is carried out more people and is managed jointly, improves the safety of account fund, and will share by the Secure Transaction device of talkaround The private key of account generates temporarily, signs only for primary transaction, improves the safety of block chain transaction.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of method for secure transactions flow diagram based on block chain of the embodiment of the present invention;
Fig. 2 show a kind of structural schematic diagram of the root key dispersed intelligence card based on block chain of the embodiment of the present invention;
Fig. 3 show a kind of affaris safety trade system structural schematic diagram based on block chain of the embodiment of the present invention;
Fig. 4 show a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention;
Fig. 5 show input of the embodiment of the present invention and splits number and decryption threshold value interface schematic diagram;
Fig. 6 show a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention;
Fig. 7 show a kind of method for secure transactions flow chart based on block chain of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of method for secure transactions flow diagram based on block chain of the embodiment of the present invention, in the present embodiment Method is applied to root key dispersed intelligence card, and the root key dispersed intelligence card is a kind of with data-handling capacity and storage The smart card of function, all operations are all carried out between root key dispersed intelligence card and root key dispersed intelligence card, are being operated Each seed key in the process, integrity key, encryption key, the algorithm for splitting integrity key and encryption key, merging sub-key The algorithm for forming integrity key or encryption key does not reside in Secure Transaction device, and Secure Transaction device can be one general The computer of logical talkaround or with it is multiple enough for root key dispersed intelligence be clamped into interface equipment, multiple are close Mutual communication can be carried out between key dispersed intelligence card for example, by equipment such as USB, intelligent card read/write devices, to complete to grasp Make.As shown in Figure 1, this method includes:
Step 101, block chain transaction data is obtained, and multiple root keys of common access Secure Transaction device disperse intelligence Sub-key in capable of blocking;
Step 102, integrity key is generated according to the multiple sub-key of at least part;
Step 103, it is signed to the block chain transaction data using the integrity key;
Step 104, the block chain transaction data after the signature is exported by the Secure Transaction device to non-volatile Property memory.
According to one embodiment of present invention, the acquisition block chain transaction data, common access Secure Transaction device In sub-key in multiple root key dispersed intelligence cards, the Secure Transaction device and Network Isolation can improve multiple in this way The safety communicated between root key dispersed intelligence card;Also, all root key dispersed intelligence cards can access same A Secure Transaction device, or it is respectively connected to more Secure Transaction devices being in secure network.
According to one embodiment of present invention, block chain transaction data, and common access Secure Transaction device are being obtained Multiple root key dispersed intelligence cards in sub-key before further include that it is close that the integrity key is split as the multiple son Key, and the root key dispersed intelligence card for being distributed to multiple access Secure Transaction devices is stored.
Wherein, the embodiment of the present invention is directed to the transaction security that account is shared in block chain, and the shared account in block chain is By multiple user's co- controllings, and the account that can be just traded is authorized jointly, this in block chain is shared in order to control for integrity key The private key of account trading;The root key dispersed intelligence card is a kind of smart card with data processing and store function, is led to It crosses IC chip and carries out data processing, data storage is carried out by internal nonvolatile memory such as ROM, data therein are deposited Storage area domain uses encryption appropriate or secrecy provision, and multiple root key dispersed intelligence card insertions are accessed Secure Transaction device Afterwards, sub-key can be sent to other root key dispersed intelligences by the communication port between root key dispersed intelligence card to stick into Row storage.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, by institute It states integrity key and is split as the multiple sub-key, and be distributed to the root key dispersion intelligence of multiple access Secure Transaction devices It can block store and further comprise, the integrity key is split as multiple sub-keys, the multiple sub-key is stored in One or more root key dispersed intelligence card.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, by institute It states integrity key and is split as the multiple sub-key, and be distributed to the root key dispersion intelligence of multiple access Secure Transaction devices It can block store and further comprise, the multiple sub-key will be formed after the encryption key for encrypting integrity key fractionation, Encrypted integrity key and one or more of sub-keys are stored in each root key dispersed intelligence card;The basis The multiple sub-key generates integrity key and further comprises at least partially, is carried using multiple root key dispersed intelligence cards The multiple sub-keys supplied generate the encryption key, utilize encrypted integrity key described in the encryption key decryption.
According to one embodiment of present invention, integrity key is split as the multiple sub-key to further comprise, is adopted The integrity key is split as multiple sub-keys with Shamir Secret Sharing (summer Mir's key is shared) algorithm.Its In, other modes in the prior art can also be used.
According to one embodiment of present invention, it is generated in integrity key into one according to the multiple sub-key of at least part Step includes, when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys, by least part institute It states multiple sub-keys and generates integrity key;
Or using multiple sub-keys that multiple root key dispersed intelligence cards provide generate in the encryption key into One step includes, when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys, described at least part Multiple sub-keys generate the encryption key.
Wherein, predetermined ratio can be 50%, such as whole sub-key is 5, when receive 3 even more than son it is close The sub-key life integrity key that will just be received when key, number here are intended merely to illustratively illustrate, should not manage Solution is the limitation for predetermined ratio.
According to one embodiment of present invention, it is generated in integrity key into one according to the multiple sub-key of at least part Step includes sharing algorithm using the key including Shamir Secret Sharing (summer Mir's key is shared) algorithm.
Wherein, symmetry algorithm may be used in generating algorithm and algorithm when splitting, corresponding with the algorithm used when splitting.
According to one embodiment of present invention, the block chain transaction data after the signature is filled by the Secure Transaction Set output further includes later to nonvolatile memory, by transaction of the nonvolatile memory access under networked environment Host, so that it completes the transaction on block chain according to the transaction data after the signature, by block chain network.
Wherein, nonvolatile memory may include USB storage, SD memories (secure data card), CD or band There is the mobile memory etc. of hardware encryption chip.
Method through the embodiment of the present invention can realize that more people share an account, the institute of the account in block chain There is trading activity (trading activity for needing account private key signature) to be required for obtaining the sub-key that certain proportion shares user It could complete, can improve the transaction security of shared account in this way, and sub-key is carried out to complete by being detached from the host of network The generation of whole key improves the safety of shared account private key.
It is illustrated in figure 2 a kind of structural schematic diagram of the root key dispersed intelligence card based on block chain of the embodiment of the present invention, Root key dispersed intelligence card in detail in this figure is a kind of smart card with data-handling capacity and store function, all behaviour Work all carries out between root key dispersed intelligence card and root key dispersed intelligence card, each seed key in operation, complete Whole key, the algorithm for splitting integrity key and encryption key, merges sub-key formation integrity key or encrypts close encryption key The algorithm of key does not exist in Secure Transaction device, Secure Transaction device can be common talkaround computer or Person have it is multiple enough for root key dispersed intelligence be clamped into interface equipment, can be between multiple root key dispersed intelligence cards Mutual communication is carried out for example, by equipment such as USB, intelligent card read/write devices, to complete to operate.As shown in Fig. 2, the device has Body includes:
Receiving unit 201, for obtaining block chain transaction data, and multiple of common access Secure Transaction device are close Sub-key in key dispersed intelligence card;
Generation unit 202, for generating integrity key according to the multiple sub-key of at least part;
Signature unit 203, for being signed to the block chain transaction data using the integrity key;
Output unit 204, for exporting the block chain transaction data after the signature by the Secure Transaction device To nonvolatile memory.
According to one embodiment of present invention, further include split cells 205, it is the multiple for integrity key to be split as Sub-key, and the root key dispersed intelligence card for being distributed to multiple access Secure Transaction devices is stored.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, described Split cells is further used for, and the integrity key is split as multiple sub-keys, and the multiple sub-key is stored in one A or multiple root key dispersed intelligence cards.
According to one embodiment of present invention, the integrity key is the private key that account is shared in block chain network, described Split cells is further used for, and the multiple sub-key is formed after the encryption key for encrypting the integrity key is split, Each root key dispersed intelligence card stores encrypted integrity key and one or more of sub-keys;
The generation unit is further used for, and the multiple sub-keys provided using multiple root key dispersed intelligence cards are given birth to At the encryption key, encrypted integrity key described in the encryption key decryption is utilized.
According to one embodiment of present invention, the split cells is further used for, using Shamir SecretSharing (summer Mir's key is shared), the integrity key was split as multiple sub-keys by algorithm.
According to one embodiment of present invention, the receiving unit further comprises circuit connecting interface, is connected by circuit It connects port and obtains the transaction data of block chain in Secure Transaction device, and the root for obtaining by Secure Transaction device other accesses is close The sub-key of key dispersed intelligence card storage.
Wherein, the circuit connecting interface refers to the data transmission channel formed by way of being directly electrically connected, can be with Including USB interface, smart card reader interface etc..
According to one embodiment of present invention, the generation unit is further used for, when the number for receiving the sub-key When amount is more than the predetermined ratio of whole sub-keys, the multiple sub-key of described at least part is generated into integrity key;Alternatively, It, will the multiple sub-key of at least part when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys Generate the encryption key.
According to one embodiment of present invention, (summer, Mir was close using Shamir Secret Sharing for the generation unit Key is shared) algorithm.
Device through the embodiment of the present invention can realize that more people share an account, the institute of the account in block chain There is trading activity (trading activity for needing account private key signature) to be required for obtaining the sub-key that certain proportion shares user It could complete, can improve the transaction security of shared account in this way, and sub-key is carried out to complete by being detached from the host of network The generation of whole key improves the safety of shared account private key.
A kind of affaris safety trade system structural schematic diagram based on block chain of the embodiment of the present invention is illustrated in figure 3, in the figure Describe in the network of block chain, have one either several Secure Transaction devices disconnect network connection and (or be in safety net In network), multiple root key dispersed intelligence cards are connected to the safety education device, and the root key dispersed intelligence card is (disconnected by off line Open network) obtained sub-key is generated as integrity key, the transaction data of integrity key signature block chain is then utilized, then pass through CD is written in transaction data after signature by Secure Transaction device, sends the CD to trading host connected to the network, most Realize that the technical solution for authorizing an account to complete the transaction of block chain jointly by multiple people, the system specifically include eventually:
Secure Transaction device 301 connects multiple root key dispersed intelligence cards, and receives block chain transaction data;
Multiple root key dispersed intelligence cards 302, the block chain transaction obtained for obtaining the Secure Transaction device Data, and the sub-key in multiple root key dispersed intelligence cards is obtained by the Secure Transaction device;According at least one The multiple sub-key is divided to generate integrity key;It is signed to the block chain transaction data using the integrity key;It will Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory;
Trading host 303 obtains the transaction data after signing in the nonvolatile memory under networked environment, leads to Cross the transaction on block chain network completion block chain.
According to one embodiment of present invention, nonvolatile memory may include USB storage, SD memories (safety Data card), CD, or the mobile memory etc. with hardware encryption chip.The trading host passes through CD, USB etc. Mode obtains the transaction data after signing in the nonvolatile memory.
System through the embodiment of the present invention can realize that more people share an account, the institute of the account in block chain There is trading activity (trading activity for needing account private key signature) to be required for obtaining the sub-key that certain proportion shares user It could complete, can improve the transaction security of shared account in this way, and sub-key is carried out to complete by being detached from the host of network The generation of whole key improves the safety of shared account private key.
It is illustrated in figure 4 a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention, The embodiment of the present invention is described in detail in this figure and splits integrity key, and multiple users is transferred to preserve the technical solution of sub-key wherein Secure Transaction device is located in security context, such as can be located in the environment for disconnecting network connection, or is located at reliable office In the environment of domain Network Communication, trading host can be located in conventional internet environment, and the method in the present embodiment is applied to root Key dispersed intelligence card, the progress randomly choosed in the root key dispersed intelligence card of multiple access Secure Transaction devices are as follows Step, or following steps are carried out by the root key dispersed intelligence card of some setting, it specifically includes:
Step 401, the private key of block chain account is generated according to user instruction.
In this step, the integrity key that the block chain account private key of generation is namely described above, the block chain account It refer to the shared account in the block chain being described above.The root key dispersed intelligence is clamped into Secure Transaction device, and user refers to Order can be inputted by Secure Transaction device, and pass to root key dispersed intelligence card by USB interface.
Step 402, the number and decryption threshold value that user setting splits integrity key are received by Secure Transaction device.
It in this step, can be with refering to what is shown in Fig. 5, user inputs integrity key in the prompting interface of Secure Transaction device The number of fractionation inputs corresponding parameter by input equipments such as the keyboard of Secure Transaction device, mouses, and user needs in this example Integrity key is split as 5 parts, that is, is split as 5 sub-keys;And decryption threshold value, the decryption threshold value are close according to son The number of key restores integrity key, and it is 3 that threshold value is decrypted in capital and interest.
Step 403, integrity key is split as specified multiple sons by root key dispersed intelligence card according to the fractionation number Key.
In this step, can be carried out according to algorithm Shamir Secret Sharing (summer Mir's key is shared) It splits, using integrity key as secret information, (3,5) is taken to be used as thresholding, it is (namely sub close to generate 5 sections of secret sharing information Key), wherein arbitrary 3 sections or more of dispersion secret can restore entire secret information (namely integrity key) together.
Step 404, the multiple quantum key distribution is given to corresponding root key dispersed intelligence card.
In this step, Secure Transaction device prompts user to be inserted into root key dispersed intelligence card (example to Secure Transaction device Such as smart card with USB interface), multiple sub-keys are respectively written into different root key dispersed intelligence cards, then by this A little root key dispersed intelligence cards are transferred to multiple users of shared account, it is each with preserve per family its accordingly some (or It is several) root key dispersed intelligence card.
Alternatively, in this step, multiple sub-keys can also be respectively burnt at different by way of imprinting CDs In CD, leaking or distorting for sub-key can be prevented in this way.
The data such as the sub-key generated temporarily, cryptographic key factor can also be finally removed in Secure Transaction device, to ensure Data in root key dispersed intelligence card will not leak.
It is illustrated in figure 6 a kind of flow diagram of the fractionation integrity key method based on block chain of the embodiment of the present invention, Another method for splitting integrity key of description in detail in this figure, the method for this example run on root key dispersed intelligence card, but institute Some root key dispersed intelligence cards need access Secure Transaction device to be communicated, and the integrity key in this example is not true The private key of positive block chain account, the block chain account private key is generated by cryptographic key factor (RootKeySeed), in this example Integrity key is the key (ScrambleKey) for encrypting the cryptographic key factor, is specifically included:
Step 601, the cryptographic key factor for generating block chain account private key is generated according to user instruction.
In this step, block chain account refers to the shared account in the block chain being described above, cryptographic key factor (RootKeySeed) be generated by hardware (root key dispersed intelligence card) random number module of intelligent card chip 2048 with Machine number, the cryptographic key factor can be used for generating block chain account private key, that is, the private key of shared account.Receiving user instructions can To refer to previous embodiment.
Step 602, cryptographic key factor encryption key is generated.
In this step, 128 ratios are generated by the hardware of intelligent card chip (root key dispersed intelligence card) random number module The special encryption key (ScrambleKey) for encrypting the cryptographic key factor.
Step 603, cryptographic key factor (RootKeySeed) is encrypted using encryption key (ScrambleKey), is obtained Encrypted cryptographic key factor (ERootKeySeed).
Step 604, the encrypted cryptographic key factor is stored in 5 root key dispersed intelligence cards.
In this step, root key dispersed intelligence card can be the USB device with safety prevention measure, the root key point Dissipating the quantity of smart card can set according to user and be become, such as can be 7,3,4 etc..As when it is implemented, It is inserted into the root key dispersed intelligence card of respective numbers on computer, can pass through boolean Metz between root key dispersed intelligence card Te-De Meite agreements (Burmester-Desmedt agreements) establish secured communication channel, the program in root key dispersed intelligence card Encrypted cryptographic key factor is completely written to these root key dispersed intelligence cards respectively automatically to store, root can be stored in The secure memory area of key dispersed intelligence card.
Step 605, encryption key (ScrambleKey) is split as 5 parts, corresponding root key point will be stored in per portion It dissipates in smart card.
In this step, the interface that prompting interface shown in fig. 5 splits encryption key as setting can be equally referred to, Using Shamir Secret Sharing algorithms using encryption key as secret information in this example, (3,5) is taken to be used as thresholding, production Raw 5 sections of secret sharing information, wherein arbitrary 3 sections or more of dispersion secret can restore entire secret information, that is, pass through Encryption key is split as 5 sub-keys, respectively by each one's share of expenses for a joint undertaking key storage in each root key dispersed intelligence card, and It can restore encryption key (ScrambleKey) by 3 sub-keys therein.
In the present embodiment, (the 3,5) threshold value used in Shamir Secret Sharing algorithms may be used other Setting.
Step 606, access control module is added in each described root key dispersed intelligence card.
In this step, the access control module can be to log in password, such as when the root key dispersed intelligence card When being inserted into the USB interface of computer, root key dispersed intelligence card automatic running access control module, in the access control module In be stored with entry password, and display logs in password entry interface in the display, and correctly password is logged in when user has input, Access control module will allow the computer to access the data in the root key dispersed intelligence card, otherwise refuse computer access Internal data.Wherein, it is described log in password can be character string, biological information (such as fingerprint, sound, iris etc.) or other The safety verification mode of mode.
Step 607, the cryptographic key factor, encryption key of interim storage in Secure Transaction device are removed, is split by encryption key The sensitive datas such as obtained multiple sub-keys.
It may insure the safety of cryptographic key factor, encryption key, sub-key by this step.
It is illustrated in figure 7 a kind of method for secure transactions flow chart based on block chain of the embodiment of the present invention, it is close to be applied to root In key dispersed intelligence card, Secure Transaction device and trading host, the Secure Transaction device is the computing device (example of talkaround Such as desktop computer, notebook computer), it describes restore root key dispersed intelligence card according to multiple sub-keys in detail in this figure In integrity key, signed to transaction data using integrity key, and be synchronized in block chain network realize complete transaction Process.It specifically includes:
Step 701, when needing to carry out transfer operation, multiple root key dispersed intelligence card insertions are entered to the safety of talkaround Transaction system.
In this step, it needs to carry out transfer operation, the root key dispersed intelligence card that will be preserved by more people from shared account It is inserted on the Secure Transaction device of talkaround, such as root key dispersed intelligence card sum is 5, the preservation root currently shown up The user number of key dispersed intelligence card is 3 people, and be inserted into Secure Transaction device is also 3 with key dispersion card quantity.Wherein, The purpose of Secure Transaction device talkaround is, in order to ensure data communicate between root key dispersed intelligence card safety, and And it is for block chain transaction data and comparatively safe.
Step 702, entry password is inputted for each root key dispersed intelligence card, activates the root key dispersed intelligence Card.
In this step, it after multiple root key dispersed intelligence card insertions enter Secure Transaction device, is handed in the safety of talkaround The input interface for showing entry password in the display device of easy device computer respectively, when the input using Secure Transaction device is set After standby input correctly logs in password, the root key dispersed intelligence card and the Secure Transaction device computer normal communication, It can be communicated by Secure Transaction device between namely multiple root key dispersed intelligence cards.
Step 703, it is communicated between multiple root key dispersed intelligence cards, obtains the son of other root key dispersed intelligence cards Key.
In this step, root key dispersed intelligence card is the USB device with smart IC chip, or for IC chip Equipment (at this point, Secure Transaction device also simultaneously there are multiple IC chip card reader, so as to obtain IC chip obtain number According to), which there are data to store and process ability, multiple root key dispersed intelligence cards negotiate by one or The work that multiple sub-keys are reverted to integrity key by the multiple root key dispersed intelligence cards of person (or can also be by presetting Some root key dispersed intelligence card is main root key dispersed intelligence card), in this example, sticked into for a root key dispersed intelligence Row is resumed work, and Burmester-Desmedt agreements, which may be used, between multiple root key dispersed intelligence cards establishes one Then SessionKey establishes the escape way communicated between root key dispersed intelligence card using the SessionKey, obtain Sub-key in each root key dispersed intelligence card.
Step 704, when the quantity of sub-key reaches threshold value, restore encryption key ScrambleKey.
In this step, it is calculated using Shamir Secret Sharing by some the root key dispersed intelligence card negotiated Method restore encryption key ScrambleKey, when sub-key number be more than scheduled threshold value, in this case, it is 3 or more, Restore complete encryption key by the sub-key of Shamir Secret Sharing algorithms and 3 or more ScrambleKey;If the root key dispersed intelligence card being inserted into is less than threshold value (3), encryption key can not be restored, passed through The display output of Secure Transaction device cannot reply the information of encryption key due to sub-key lazy weight.
Algorithm in this step executes in the IC chip of root key dispersed intelligence card.
Step 705, the cryptographic key factor in the encryption key decryption root key dispersed intelligence card is utilized.
In this step, since cryptographic key factor is stored in each root key dispersed intelligence card, pass through recovery Complete encryption key can decrypt the cryptographic key factor in any root key dispersed intelligence card, use above-mentioned steps in this example The IC chip for executing the root key dispersed intelligence card for restoring encryption key program decrypts the cryptographic key factor.
Step 706, the private key for sharing account is generated using the cryptographic key factor.
In this step, generating the step of sharing account private key using cryptographic key factor can be in root key dispersed intelligence card It is completed in intelligent chip (IC chip), may further ensure that the safety for generating and sharing account private key, the generation are shared in this way The concrete mode of account private key can use elliptic curve or other block chain private keys to generate algorithm.
Step 707, the private key signature transaction data of the shared account is utilized.
In this step, transaction data can generate in Secure Transaction device, can also be to be set by USB storages It is standby to send Secure Transaction device to.The private key that root key dispersed intelligence Cali generates signs to the transaction data, Wherein, it is to sign to the cryptographic Hash of transaction data in this example.
Step 708, the transaction data after signature is written among CD by Secure Transaction device.
In this step, the transaction data after signature is to confirm the transaction that can be executed by 3 shared accounts, due to Through the threshold value (being more than the 3/5 of shared account cura generalis number) more than agreement, then the transaction is authorized.Profit Nonvolatile memory is written into the signature transaction data with the CD writer of Secure Transaction device, i.e., in CD, or It can also be written in other not revisable non-volatile memory mediums, can prevent from distorting the transaction data in CD in this way, Improve the safety of signature transaction data.
After completing the work of CD write-in, it is private that Secure Transaction device removes all about shared account cached in memory The data of key, cryptographic key factor, encryption key.
Step 709, the trading host of networking reads the signature transaction data in the CD.
In this step, it inserts the disc into the CD drive of networking trading host, described in the trading host acquisition The transaction data of signature, operator start block chain transacting customer end on the trading host, and transacting customer end obtains the label The transaction data of name.
Step 710, trading host broadcasts signature transaction data to block chain network, passes through block chain network and completes block Transaction on chain.
In this step, trading host broadcasts the transaction data of signature in block chain network, keeps accounts.
So far, money transfer transactions are completed.
By the method and device, system in above-mentioned the embodiment of the present application, account can be shared to some, or have The account of important meaning, important fund account are carried out more people and are managed jointly, improve the safety of account fund, and pass through off-grid The Secure Transaction device of work generates the private key of shared account temporarily, signs only for primary transaction, improves block The safety of chain transaction.
The embodiment of the present invention also provides a kind of computer-readable instruction, wherein when executing described instruction in electronic equipment When, program therein makes the method that electronic equipment executes determination processor operation as shown in Figure 1 to Figure 3.
It should be understood that in various embodiments of the present invention, size of the sequence numbers of the above procedures is not meant to execute suitable The execution sequence of the priority of sequence, each process should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention Process constitutes any restriction.
It should also be understood that in embodiments of the present invention, term "and/or" is only a kind of association pass of description affiliated partner System indicates may exist three kinds of relationships.For example, A and/or B, can indicate:Individualism A exists simultaneously A and B, individualism These three situations of B.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This A little functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution.Specially Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, foregoing description is The specific work process of system, device and unit, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component It can be combined or can be integrated into another system, or some features can be ignored or not executed.In addition, shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be the INDIRECT COUPLING by some interfaces, device or unit Or communication connection, can also be electricity, mechanical or other form connections.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present invention Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, can also be during two or more units are integrated in one unit.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random AccessMemory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
Specific embodiment is applied in the present invention, and principle and implementation of the present invention are described, above example Explanation be merely used to help understand the present invention method and its core concept;Meanwhile for those of ordinary skill in the art, According to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion in this specification Appearance should not be construed as limiting the invention.

Claims (10)

1. a kind of method for secure transactions based on block chain is applied to root key dispersed intelligence card, it is characterised in that including,
The son obtained in block chain transaction data, and multiple root key dispersed intelligence cards of common access Secure Transaction device is close Key;
Integrity key is generated according to the multiple sub-key of at least part;
It is signed to the block chain transaction data using the integrity key;
Block chain transaction data after the signature is exported by the Secure Transaction device to nonvolatile memory.
2. according to the method described in claim 1, it is characterized in that, obtaining block chain transaction data, and common access peace Further include being split as the integrity key described before sub-key in multiple root key dispersed intelligence cards of full transaction system Multiple sub-keys, and the root key dispersed intelligence card for being distributed to multiple access Secure Transaction devices is stored.
3. according to the method described in claim 2, it is characterized in that, the integrity key is to share account in block chain network The integrity key is split as the multiple sub-key by private key, and is distributed to the root of multiple access Secure Transaction devices Key dispersed intelligence card carries out storage and further comprises, the integrity key is split as multiple sub-keys, by the multiple son Key storage is in one or more root key dispersed intelligence card.
4. according to the method described in claim 3, it is characterized in that, being generated according to the multiple sub-key of at least part complete Key further comprises, when the quantity for receiving the sub-key is more than the predetermined ratio of whole sub-keys, described in general extremely Few a part of the multiple sub-key generates integrity key.
5. according to the method described in claim 2, it is characterized in that, the integrity key is to share account in block chain network The integrity key is split as the multiple sub-key by private key, and is distributed to the root of multiple access Secure Transaction devices Key dispersed intelligence card carries out storage and further comprises, is formed after the encryption key for encrypting the integrity key is split described more A sub-key stores encrypted integrity key in each root key dispersed intelligence card and one or more of sons is close Key;
It is described to be further comprised according to the multiple sub-key generation integrity key of at least part, utilize multiple root keys Multiple sub-keys that dispersed intelligence card provides generate the encryption key, using encrypted complete described in the encryption key decryption Whole key.
6. according to the method described in claim 5, it is characterized in that, being provided using multiple root key dispersed intelligence cards more A sub-key generates the encryption key and further comprises, when the quantity for receiving the sub-key is more than whole sub-keys When predetermined ratio, the multiple sub-key of at least part is generated into the encryption key.
7. according to the method described in claim 1, it is characterized in that, the block chain transaction data after the signature is passed through described Secure Transaction device further includes after exporting to nonvolatile memory, by nonvolatile memory access in networking ring Trading host under border, so that it completes block chain according to the block chain transaction data after the signature, by block chain network On transaction.
8. a kind of root key dispersed intelligence card based on block chain, it is characterised in that including,
Receiving unit, for obtaining block chain transaction data, and multiple root keys dispersion of common access Secure Transaction device Sub-key in smart card;
Generation unit, for generating integrity key according to the multiple sub-key of at least part;
Signature unit, for being signed to the block chain transaction data using the integrity key;
Output unit, for being exported the block chain transaction data after the signature to non-volatile by the Secure Transaction device Property memory.
9. a kind of affaris safety trade system based on block chain, it is characterised in that including,
Secure Transaction device connects multiple root key dispersed intelligence cards, and receives block chain transaction data;
Multiple root key dispersed intelligence cards, the block chain transaction data obtained for obtaining the Secure Transaction device, with And the sub-key in multiple root key dispersed intelligence cards is obtained by the Secure Transaction device;It is described more according at least part A sub-key generates integrity key;It is signed to the block chain transaction data using the integrity key;By the signature Block chain transaction data afterwards is exported by the Secure Transaction device to nonvolatile memory;
Trading host obtains the transaction data after signing in the nonvolatile memory, passes through block chain under networked environment Network completes the transaction on block chain.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, which disperses intelligence by root key Processor in capable of blocking realizes following steps when executing:Obtain block chain transaction data, and common access Secure Transaction device Multiple root key dispersed intelligence cards in sub-key;Integrity key is generated according to the multiple sub-key of at least part;Profit It is signed to the block chain transaction data with the integrity key;Block chain transaction data after the signature is passed through into institute Secure Transaction device is stated to export to nonvolatile memory.
CN201810459571.XA 2018-05-15 2018-05-15 Block chain-based secure transaction method, device and system Active CN108683509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810459571.XA CN108683509B (en) 2018-05-15 2018-05-15 Block chain-based secure transaction method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810459571.XA CN108683509B (en) 2018-05-15 2018-05-15 Block chain-based secure transaction method, device and system

Publications (2)

Publication Number Publication Date
CN108683509A true CN108683509A (en) 2018-10-19
CN108683509B CN108683509B (en) 2021-12-28

Family

ID=63805289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810459571.XA Active CN108683509B (en) 2018-05-15 2018-05-15 Block chain-based secure transaction method, device and system

Country Status (1)

Country Link
CN (1) CN108683509B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615525A (en) * 2019-01-18 2019-04-12 北京阿尔山区块链联盟科技有限公司 Multi-signature shares guard method, system and the electronic equipment of account
CN109687963A (en) * 2019-01-15 2019-04-26 如般量子科技有限公司 Anti- quantum calculation alliance chain method of commerce and system based on public key pond
CN109687979A (en) * 2019-03-06 2019-04-26 郑州师范学院 A kind of ring signatures method, apparatus, equipment and medium
CN109934585A (en) * 2019-03-08 2019-06-25 矩阵元技术(深圳)有限公司 A kind of endorsement method based on multi-party computations, apparatus and system
CN110061850A (en) * 2019-04-24 2019-07-26 电子科技大学 The collision calculation method and editable block chain building method of chameleon hash function
CN110138559A (en) * 2019-06-03 2019-08-16 北京智芯微电子科技有限公司 The method and system of quantum-key distribution are carried out to the terminal in platform area
CN110198320A (en) * 2019-06-03 2019-09-03 江苏恒宝智能系统技术有限公司 A kind of ciphered information transmission method
CN110443697A (en) * 2019-08-08 2019-11-12 北京阿尔山区块链联盟科技有限公司 The management method and device of bank account
CN111178875A (en) * 2019-12-23 2020-05-19 杭州复杂美科技有限公司 Wallet account configuration method, wallet account application method, device and storage medium
CN111177780A (en) * 2019-12-26 2020-05-19 深圳创客区块链技术有限公司 Security verification method and device, terminal equipment and computer readable storage medium
CN111291398A (en) * 2020-03-04 2020-06-16 恒安嘉新(北京)科技股份公司 Block chain-based authentication method and device, computer equipment and storage medium
CN111385098A (en) * 2018-12-29 2020-07-07 华为技术有限公司 Key generation method and device
WO2020172890A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Method and device for client to generate key for multiple clients and single server
WO2020172885A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Key management method in which single client generates private key, and electronic device
CN113098697A (en) * 2021-06-08 2021-07-09 清华大学 Block chain data writing and accessing method and device
CN113169879A (en) * 2018-11-27 2021-07-23 区块链控股有限公司 Computer-implemented system and method for storing data on blockchains
CN113364754A (en) * 2021-05-31 2021-09-07 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932140A (en) * 2012-11-20 2013-02-13 成都卫士通信息产业股份有限公司 Key backup method for enhancing safety of cipher machine
CN103546277A (en) * 2013-09-25 2014-01-29 北京握奇数据系统有限公司 Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system
CN103701588A (en) * 2013-12-18 2014-04-02 北京民芯科技有限公司 Secret sharing hardware realization method and device
CN104704504A (en) * 2012-09-26 2015-06-10 净睿存储股份有限公司 Multi-drive cooperation to generate encryption key
CN105356997A (en) * 2015-08-06 2016-02-24 华南农业大学 Security distributed data management method based on public cloud
US9413735B1 (en) * 2015-01-20 2016-08-09 Ca, Inc. Managing distribution and retrieval of security key fragments among proxy storage devices
CN107465505A (en) * 2017-08-28 2017-12-12 阿里巴巴集团控股有限公司 A kind of key data processing method, device and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104704504A (en) * 2012-09-26 2015-06-10 净睿存储股份有限公司 Multi-drive cooperation to generate encryption key
CN102932140A (en) * 2012-11-20 2013-02-13 成都卫士通信息产业股份有限公司 Key backup method for enhancing safety of cipher machine
CN103546277A (en) * 2013-09-25 2014-01-29 北京握奇数据系统有限公司 Smart card SM4 calculation based DPA attack and secret key restoring method and DPA attack and secret key restoring system
CN103701588A (en) * 2013-12-18 2014-04-02 北京民芯科技有限公司 Secret sharing hardware realization method and device
US9413735B1 (en) * 2015-01-20 2016-08-09 Ca, Inc. Managing distribution and retrieval of security key fragments among proxy storage devices
CN105356997A (en) * 2015-08-06 2016-02-24 华南农业大学 Security distributed data management method based on public cloud
CN107465505A (en) * 2017-08-28 2017-12-12 阿里巴巴集团控股有限公司 A kind of key data processing method, device and server

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113169879A (en) * 2018-11-27 2021-07-23 区块链控股有限公司 Computer-implemented system and method for storing data on blockchains
CN111385098A (en) * 2018-12-29 2020-07-07 华为技术有限公司 Key generation method and device
CN109687963A (en) * 2019-01-15 2019-04-26 如般量子科技有限公司 Anti- quantum calculation alliance chain method of commerce and system based on public key pond
CN109687963B (en) * 2019-01-15 2021-06-22 如般量子科技有限公司 Anti-quantum computing alliance chain transaction method and system based on public key pool
CN109615525A (en) * 2019-01-18 2019-04-12 北京阿尔山区块链联盟科技有限公司 Multi-signature shares guard method, system and the electronic equipment of account
WO2020172885A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Key management method in which single client generates private key, and electronic device
WO2020172890A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Method and device for client to generate key for multiple clients and single server
CN109687979A (en) * 2019-03-06 2019-04-26 郑州师范学院 A kind of ring signatures method, apparatus, equipment and medium
CN109934585A (en) * 2019-03-08 2019-06-25 矩阵元技术(深圳)有限公司 A kind of endorsement method based on multi-party computations, apparatus and system
CN109934585B (en) * 2019-03-08 2023-07-28 矩阵元技术(深圳)有限公司 Signature method, device and system based on secure multiparty calculation
CN110061850A (en) * 2019-04-24 2019-07-26 电子科技大学 The collision calculation method and editable block chain building method of chameleon hash function
CN110198320A (en) * 2019-06-03 2019-09-03 江苏恒宝智能系统技术有限公司 A kind of ciphered information transmission method
CN110138559A (en) * 2019-06-03 2019-08-16 北京智芯微电子科技有限公司 The method and system of quantum-key distribution are carried out to the terminal in platform area
CN110138559B (en) * 2019-06-03 2022-02-01 北京智芯微电子科技有限公司 Method and system for quantum key distribution of terminal in transformer area
CN110198320B (en) * 2019-06-03 2021-10-26 恒宝股份有限公司 Encrypted information transmission method and system
CN110443697A (en) * 2019-08-08 2019-11-12 北京阿尔山区块链联盟科技有限公司 The management method and device of bank account
CN111178875A (en) * 2019-12-23 2020-05-19 杭州复杂美科技有限公司 Wallet account configuration method, wallet account application method, device and storage medium
CN111177780A (en) * 2019-12-26 2020-05-19 深圳创客区块链技术有限公司 Security verification method and device, terminal equipment and computer readable storage medium
CN111177780B (en) * 2019-12-26 2022-05-20 深圳创客区块链技术有限公司 Security verification method, device, terminal equipment and computer readable storage medium
CN111291398A (en) * 2020-03-04 2020-06-16 恒安嘉新(北京)科技股份公司 Block chain-based authentication method and device, computer equipment and storage medium
CN113364754A (en) * 2021-05-31 2021-09-07 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment
CN113364754B (en) * 2021-05-31 2023-10-13 支付宝(杭州)信息技术有限公司 Data sharing method, device and equipment
CN113098697A (en) * 2021-06-08 2021-07-09 清华大学 Block chain data writing and accessing method and device

Also Published As

Publication number Publication date
CN108683509B (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN108683509A (en) A kind of method for secure transactions, apparatus and system based on block chain
Allen et al. Design choices for central bank digital currency: Policy and technical considerations
Singh et al. Blockchain: Future of financial and cyber security
US10536445B1 (en) Discrete blockchain and blockchain communications
WO2018137316A1 (en) Secure transaction method based on block chain, electronic device, system, and storage medium
CN104217327B (en) A kind of financial IC card internet terminal and its method of commerce
EP2143028B1 (en) Secure pin management
US9948624B2 (en) Key downloading method, management method, downloading management method, device and system
US7526652B2 (en) Secure PIN management
KR20230157929A (en) Transfer cryptocurrency from a remote access restricted wallet
CN104463001A (en) Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key
CN107682364B (en) A kind of license chain privacy method of commerce
CN107222303A (en) Digital publishing rights traceability system building method based on block chain and cloud platform
CN106789052A (en) A kind of remote cipher key based on quantum communication network issues system and its application method
US11917075B2 (en) Multi-signature security account control system
CN110086626A (en) Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair
CN107332671A (en) A kind of safety mobile terminal system and method for secure transactions based on safety chip
CN206611427U (en) A kind of key storage management system based on trust computing device
WO2020199028A1 (en) Security chip, security processing method and related device
CN206611428U (en) A kind of remote cipher key based on quantum communication network issues system
Allen et al. Design choices for central bank digital currency
TW201426395A (en) Data security system and method
CN104065488B (en) Method based on Conbined public or double key certification microprocessor card cloud management system
CN100550735C (en) The method of multifunction intelligent key equipment and security control thereof
WO2022089518A1 (en) Address generation method, blockchain information processing method, and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant