CN108921557A - A method of it is traded by the system and protection of block chain network protection transaction - Google Patents
A method of it is traded by the system and protection of block chain network protection transaction Download PDFInfo
- Publication number
- CN108921557A CN108921557A CN201810734511.4A CN201810734511A CN108921557A CN 108921557 A CN108921557 A CN 108921557A CN 201810734511 A CN201810734511 A CN 201810734511A CN 108921557 A CN108921557 A CN 108921557A
- Authority
- CN
- China
- Prior art keywords
- safety zone
- custom system
- transaction
- custom
- remainder
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Abstract
The invention discloses a kind of systems by the protection transaction of block chain network, including:Password is generated at custom system, its value depends on Transaction Information and private key, custom system has processor system, the processor system has at least one processor, communication interface and memory, the password that Transaction Information and custom system generate is sent the block chain network by the system, to combine the request for executing transaction to be verified, it is characterized in that, the custom system includes safety zone and the remainder including the custom system but the safety zone, and the remainder of the custom system cannot access the safety zone.This method further includes calculating and/or storing private key in the safety zone of custom system.
Description
Technical field
The present invention relates to distributed computing or computations fields, are protected in particular to one kind by block chain network
Protect the system of transaction and the method for protection transaction.
Background technique
With the omnipotent development for being connected to the network most cities in the world, the shared cost of global information is more and more just
Preferably.The movement of the hierarchy of skill as bit coin has already appeared, it has shared with the world and completely free at the same time
Use, by one possibly also with network design at the calculation power of default of value Transfer system of decentralization, formula mechanism,
The social contract voluntarily abided by.This system can be said to be a very special special case for encryption safe
Because it is the state machine based on transaction.By utilizing the technical characterstics such as block chain " distributed, open and clear, can not to change ",
The transaction and circulation of right are realized on transaction platform, recording-related information is simultaneously protected, to improve digital content circulation
Efficiency is reduced circulation cost, circulation expansion range, effectively solve really to weigh present in digital content circulation it is difficult, pirate it is serious,
The problems such as publicity is poor, trading efficiency is low.Block chain is made of data structure and block chain node, i.e. number in block chain
It being formed according to according to block mode, each data are included in a block, then muti-piece block are attached by chain,
Such structure makes wherein once there is node to attempt to change existing block, it must change after all blocks.
Need to carry out proof of work due to generating block, the generation of each block requires certain calculation amount, makes number therein
It is believed that breath modification becomes extremely difficult.Meanwhile each node for accessing block chain network can save a complete block
Data need all nodes to reach common understanding the modification of data, and the behavior of altered data can be found by other nodes.Block chain
It is based on the public credibility that such structure obtains.By block chain technology be applied to copyright field whether and current existing copyright
System generates conflict?Wu Peng thinks, block chain technology can become a useful supplement of existing copyright system, convenience,
Timeliness provides better user experience.Instantly the flowing velocity of internet information is very fast, and the spread speed of information is
Through using minute, second as basic unit, effective life cycle of information is also become shorter, and traditional copyright protection regime is difficult effectively
Act on this kind of information.Also lack a fair and just transaction platform, both sides of supply and demand in existing copyright system simultaneously
It can not effectively dock, this also significantly limits the scale in copyright trading market.In order to solve this problem, pass through area originally
Block chain technology all generates artistic work original at one's side, picture, text etc. global only one numeration system, referred to as " former
This DNA " has " script DNA ", and no matter works are transmitted author and the copyright information that can everywhere trace back to him, while every
A works carry a payment system again, as long as seeing such a DAN information, so that it may very easily complete payment and award
Power, is greatly to evolve for present content propagation system.But block chain bring for entire cultural industry
Change more than that.Each participant is fair cooperation on block platform chain, each of inside this block chain
Participating in node has the record of equality to weigh, and income is generated in network can also carry out more fair distribution, and author can be real-time
Obtain the clearing of income.Intelligent contract also will carry out great benefit to content authorizing band.For example, works are directed to and do not go together
Different prices is arranged in the use of industry;Such as a comparison can be for example arranged in the strong works of timeliness in initial 24 hours
High authorization price, when 24 is small after hot spot cooling can automatically by works authorization switch to freely sign propagate, help author's fame and gain
Double receipts.
But all being rested on above-mentioned introduction and imagination using the overwhelming majority for present block chain, how to solve specific
The problem of and lack the disclosure of technology using the technology.
Summary of the invention
The invention proposes a kind of systems by the protection transaction of block chain network, including:It is generated at custom system close
Code, value depend on Transaction Information and private key, and custom system has processor system, which has at least one
Device, communication interface and memory are managed, the password that Transaction Information and custom system generate is sent the block chain by the system
Network, to combine the request for executing transaction to be verified, which is characterized in that the custom system includes safety zone and including institute
The remainder of custom system but the safety zone is stated, the remainder of the custom system cannot access the safety zone
Domain.
Further, the custom system include safety zone and including the custom system but the safety zone
The remainder of remainder, the custom system cannot access the safety zone.
Further, user information is input in the interface of custom system of a part as safety zone, wherein
The private key is at least partly exported from some user informations.
Another aspect of the present invention provides a kind of method of protection transaction, is used for foregoing system, feature exists
In the method includes:Password is generated at custom system, value depends on Transaction Information and private key, which has place
Device system is managed, which has at least one processor, communication interface and memory.System;By Transaction Information and use
The password that family system generates is sent to block chain network, to combine the request for executing transaction to be verified.Wherein, the user system
System include safety zone and including the custom system but the remainder of the safety zone, the residue of the custom system
Part cannot access the safety zone;This method further includes calculating and/or storing private key in the safety zone of custom system.
Further, the custom system include safety zone and including the custom system but the safety zone
The remainder of remainder, the custom system cannot access the safety zone.This method further includes in custom system
Calculating and/or store transaction password generator in safety zone.
Further, user information is input in the interface of custom system of a part as safety zone, wherein
The private key is at least partly exported from some user informations.
Further, the user information being input in the interface is PIN or password;The user being wherein input in interface
Information is the biometric data of user, such as fingerprint, voice data, face data, finger vena or hand geometry;Its
In the user information that is input in interface be one or more visual patterns selection.
Further, block chain network is using custom system public key verifications from the received Transaction Information of custom system and close
Code.
Further, to the user information and seed application one-way function to calculate the private cipher key.
Further, wherein the one-way function is one-way hash function.
Advantageous effects obtained by the present invention are:A kind of technical solution of Secure Transaction is provided based on block chain
It carries out.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this
Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to
It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment
System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in
It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below
The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
This gives a kind of systems by the protection transaction of block chain network, including:It is generated at custom system
Password, value depend on Transaction Information and private key, and custom system has processor system, which has at least one
The password that Transaction Information and custom system generate is sent the block by processor, communication interface and memory, the system
Chain network, with combine execute transaction request verified, which is characterized in that the custom system include safety zone and including
The remainder of the remainder of the custom system but the safety zone, the custom system cannot access the safety zone
Domain.Further, the custom system include safety zone and including the custom system but the residue of the safety zone
The remainder of part, the custom system cannot access the safety zone.Further, user information is input to conduct
In the interface of the custom system of a part of safety zone, wherein the private key is at least partly exported from some user informations.
Embodiment two.
A kind of method for present embodiments providing protection transaction, is used for foregoing system, the method includes:?
Password is generated at custom system, value depends on Transaction Information and private key, which has processor system, the processor
System has at least one processor, communication interface and memory.System;The password hair that Transaction Information and custom system are generated
It is sent to block chain network, to combine the request for executing transaction to be verified.Wherein, the custom system includes safety zone and packet
The remainder of the custom system but the safety zone is included, the remainder of the custom system cannot access the peace
It is region-wide;This method further includes calculating and/or storing private key in the safety zone of custom system.Further, the user
System include safety zone and including the custom system but the remainder of the safety zone, the custom system it is surplus
Remaining part point cannot access the safety zone.This method further includes calculating and/or storing in the safety zone of custom system to hand over
Easy password generator.Further, user information is input in the interface of custom system of a part as safety zone,
Wherein the private key is at least partly exported from some user informations.Further, the user information being input in the interface
It is PIN or password;The user information being wherein input in interface is the biometric data of user, such as fingerprint, voice data,
Face data, finger vena or hand geometry;The user information being wherein input in interface is one or more vision figures
The selection of picture.Block chain network utilizes custom system public key verifications from the received Transaction Information of custom system and password.To described
User information and seed application one-way function are to calculate the private cipher key.The one-way function is one-way hash function.
Embodiment three.
This gives a kind of systems by the protection transaction of block chain network, including:It is generated at custom system
Password, value depend on Transaction Information and private key, and custom system has processor system, which has at least one
The password that Transaction Information and custom system generate is sent the block by processor, communication interface and memory, the system
Chain network, with combine execute transaction request verified, which is characterized in that the custom system include safety zone and including
The remainder of the remainder of the custom system but the safety zone, the custom system cannot access the safety zone
Domain.Further, the custom system include safety zone and including the custom system but the residue of the safety zone
The remainder of part, the custom system cannot access the safety zone.Further, user information is input to conduct
In the interface of the custom system of a part of safety zone, wherein the private key is at least partly exported from some user informations.
The method traded is protected for foregoing system there is also provided a kind of, the method includes:With
Password is generated at the system of family, value depends on Transaction Information and private key, which has processor system, the processor system
System has at least one processor, communication interface and memory.System;The password that Transaction Information and custom system generate is sent
To block chain network, to combine the request for executing transaction to be verified.Wherein, the custom system include safety zone and including
The remainder of the custom system but the safety zone, the remainder of the custom system cannot access the safety
Region;This method further includes calculating and/or storing private key in the safety zone of custom system.Further, the user system
System include safety zone and including the custom system but the remainder of the safety zone, the residue of the custom system
Part cannot access the safety zone.This method further includes calculating and/or store transaction in the safety zone of custom system
Password generator.Further, user information is input in the interface of custom system of a part as safety zone,
Described in private key at least partly from some user informations export.Further, the user information being input in the interface is
PIN or password;The user information being wherein input in interface is the biometric data of user, such as fingerprint, voice data, face
Portion's data, finger vena or hand geometry;The user information being wherein input in interface is one or more visual patterns
Selection.Block chain network utilizes custom system public key verifications from the received Transaction Information of custom system and password.To the use
Family information and seed application one-way function are to calculate the private cipher key.The one-way function is one-way hash function.
Example IV.
The present embodiment constructs a kind of system, including:First processor system has at least one processor, processor
The first memory system that system communicates, user input and check the user interface of the information handled by processor system,
And the network that the network communicating system for sending and receiving message is handled by processor system;Including at least second processor
The safety zone of system, for handling security affairs;And second memory system, private key is stored, which is to generate password
Or the value of signature;Second memory and second processor system are communicatively coupled with one another;First processor system cannot access
Second processor system and second memory system.Wherein the system executes on a cellular telephone.Mobile phone includes display
Screen, the safety zone is communicably coupled to the display screen;The safety zone is communicably coupled at least the one of the display screen
Part, for showing the information about the transaction on the display.And at least in the part of the display screen
When being controlled by the second processor system, the first processor cannot be accessed by the second processor system in the peace
The display screen controlled in entire area.Certain display screen further includes will be alphabetical, and the button or character of number or other symbols are defeated
Enter into user interface, the user interface is connected only to the safety zone, so that the first processor system can not visit
It asks.Wherein the second memory system is located in the safety zone, and the safety zone storage is by the password encryption
One or more algorithms of the Transaction Information are tied to, so that if the password is based on incorrect transaction, it is described close
Code will be invalid.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from
In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and
It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention
It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading
After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and
Modification equally falls into the scope of the claims in the present invention.
Claims (10)
1. a kind of system by the protection transaction of block chain network, including:Password is generated at custom system, value depends on handing over
Easy information and private key, custom system have a processor system, which has at least one processor, communication interface and
Memory, the system send the block chain network for the password that Transaction Information and custom system generate, are executed with combining
The request of transaction is verified, which is characterized in that the custom system includes safety zone and including the custom system but institute
The remainder of safety zone is stated, the remainder of the custom system cannot access the safety zone.
2. the system as claimed in claim 1, which is characterized in that the custom system includes safety zone and including the user
The remainder of system but the safety zone, the remainder of the custom system cannot access the safety zone.
3. method according to claim 2, which is characterized in that user information is input to a part as safety zone
In the interface of custom system, wherein the private key is at least partly exported from some user informations.
4. a kind of method of protection transaction, is used for the system as described in claim 1-3, it is characterised in that the method packet
It includes:Password is generated at custom system, value depends on Transaction Information and private key, which has processor system, should
Processor system has at least one processor, communication interface and memory.System;Transaction Information and custom system are generated
Password is sent to block chain network, to combine the request for executing transaction to be verified.Wherein, the custom system includes safety zone
Domain and including the custom system but the remainder of the safety zone, the remainder of the custom system cannot access
The safety zone;This method further includes calculating and/or storing private key in the safety zone of custom system.
5. method as claimed in claim 4, which is characterized in that the custom system includes safety zone and including the user
The remainder of system but the safety zone, the remainder of the custom system cannot access the safety zone.It should
Method further includes calculating and/or store transaction password generator in the safety zone of custom system.
6. method as claimed in claim 5, which is characterized in that user information is input to a part as safety zone
In the interface of custom system, wherein the private key is at least partly exported from some user informations.
7. method as claimed in claim 6, which is characterized in that the user information being input in the interface is PIN or password;
The user information being wherein input in interface is the biometric data of user, such as fingerprint, voice data, face data, hand
Refer to vein or hand geometry;The user information being wherein input in interface is the selection of one or more visual patterns.
8. the method for claim 7, which is characterized in that block chain network utilizes custom system public key verifications from user system
It unites received Transaction Information and password.
9. method according to claim 8, which is characterized in that the user information and seed application one-way function to calculate
The private cipher key.
10. method as claimed in claim 9, which is characterized in that wherein the one-way function is one-way hash function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810734511.4A CN108921557A (en) | 2018-07-06 | 2018-07-06 | A method of it is traded by the system and protection of block chain network protection transaction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810734511.4A CN108921557A (en) | 2018-07-06 | 2018-07-06 | A method of it is traded by the system and protection of block chain network protection transaction |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108921557A true CN108921557A (en) | 2018-11-30 |
Family
ID=64425480
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810734511.4A Pending CN108921557A (en) | 2018-07-06 | 2018-07-06 | A method of it is traded by the system and protection of block chain network protection transaction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108921557A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179514A (en) * | 2011-12-22 | 2013-06-26 | 航天信息股份有限公司 | Cell phone safe group-sending method and device for sensitive message |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN107122673A (en) * | 2017-03-09 | 2017-09-01 | 深圳市金立通信设备有限公司 | A kind of information ciphering method and terminal |
CN107580767A (en) * | 2015-03-12 | 2018-01-12 | 眼锁有限责任公司 | The method and system of network activity is managed using biological characteristic |
CN107919954A (en) * | 2017-10-20 | 2018-04-17 | 浙江大学 | A kind of block chain user key guard method and device based on SGX |
CN108055133A (en) * | 2017-12-12 | 2018-05-18 | 江苏安凰领御科技有限公司 | A kind of key secure signing method based on block chain technology |
-
2018
- 2018-07-06 CN CN201810734511.4A patent/CN108921557A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179514A (en) * | 2011-12-22 | 2013-06-26 | 航天信息股份有限公司 | Cell phone safe group-sending method and device for sensitive message |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN107580767A (en) * | 2015-03-12 | 2018-01-12 | 眼锁有限责任公司 | The method and system of network activity is managed using biological characteristic |
CN107122673A (en) * | 2017-03-09 | 2017-09-01 | 深圳市金立通信设备有限公司 | A kind of information ciphering method and terminal |
CN107919954A (en) * | 2017-10-20 | 2018-04-17 | 浙江大学 | A kind of block chain user key guard method and device based on SGX |
CN108055133A (en) * | 2017-12-12 | 2018-05-18 | 江苏安凰领御科技有限公司 | A kind of key secure signing method based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Challenges of blockchain in new generation energy systems and future outlooks | |
Boireau | Securing the blockchain against hackers | |
CN107993069A (en) | A kind of online transaction method and system based on block chain network | |
US20170250796A1 (en) | Trans Vernam Cryptography: Round One | |
CN109417465A (en) | Registration and automatic management method of intelligent contracts executed by block chains | |
US20140177825A1 (en) | Asymmetric Tokenization | |
Zhang et al. | Consensus mechanisms and information security technologies | |
CN110263544A (en) | In conjunction with the receipt storage method and node of type of transaction and Rule of judgment | |
An et al. | Secure crowdsensed data trading based on blockchain | |
CN110264195A (en) | It is marked and transaction, the receipt storage method of user type and node in conjunction with code | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN110245947A (en) | The receipt storage method and node limited in conjunction with the condition of transaction and user type | |
CN108090769A (en) | A kind of data safety method of commerce and system based on ownership | |
CN110263086A (en) | In conjunction with the receipt storage method and node of user type and event functions type | |
CN110245942A (en) | In conjunction with the receipt storage method and node of user type and Rule of judgment | |
CN110245945A (en) | In conjunction with the receipt storage method and node of code mark and user type | |
CN110245504A (en) | The receipt storage method and node limited in conjunction with the condition of polymorphic type dimension | |
CN110264197A (en) | The receipt storage method and node of binding events type function and Rule of judgment | |
CN110264193A (en) | In conjunction with the receipt storage method and node of user type and type of transaction | |
CN110245944A (en) | Receipt storage method and node based on user type | |
CN109847365A (en) | A kind of anti-cheating method and system towards the application of block chain | |
CN110264194A (en) | Receipt storage method and node based on event functions type | |
CN110472974A (en) | Assets transfer method, apparatus and system based on block chain intelligence contract | |
CN110263089A (en) | The receipt storage method and node limited in conjunction with the condition of transaction and event type | |
Li et al. | Astraea: Anonymous and secure auditing based on private smart contracts for donation systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181130 |
|
RJ01 | Rejection of invention patent application after publication |