CN108921557A - A method of it is traded by the system and protection of block chain network protection transaction - Google Patents

A method of it is traded by the system and protection of block chain network protection transaction Download PDF

Info

Publication number
CN108921557A
CN108921557A CN201810734511.4A CN201810734511A CN108921557A CN 108921557 A CN108921557 A CN 108921557A CN 201810734511 A CN201810734511 A CN 201810734511A CN 108921557 A CN108921557 A CN 108921557A
Authority
CN
China
Prior art keywords
safety zone
custom system
transaction
custom
remainder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810734511.4A
Other languages
Chinese (zh)
Inventor
刘祎
克里斯托·艾伦
宁宇宸
马克西姆·马修斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Ys Jusen Technology Co Ltd
Original Assignee
Foshan Ys Jusen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Ys Jusen Technology Co Ltd filed Critical Foshan Ys Jusen Technology Co Ltd
Priority to CN201810734511.4A priority Critical patent/CN108921557A/en
Publication of CN108921557A publication Critical patent/CN108921557A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Abstract

The invention discloses a kind of systems by the protection transaction of block chain network, including:Password is generated at custom system, its value depends on Transaction Information and private key, custom system has processor system, the processor system has at least one processor, communication interface and memory, the password that Transaction Information and custom system generate is sent the block chain network by the system, to combine the request for executing transaction to be verified, it is characterized in that, the custom system includes safety zone and the remainder including the custom system but the safety zone, and the remainder of the custom system cannot access the safety zone.This method further includes calculating and/or storing private key in the safety zone of custom system.

Description

A method of it is traded by the system and protection of block chain network protection transaction
Technical field
The present invention relates to distributed computing or computations fields, are protected in particular to one kind by block chain network Protect the system of transaction and the method for protection transaction.
Background technique
With the omnipotent development for being connected to the network most cities in the world, the shared cost of global information is more and more just Preferably.The movement of the hierarchy of skill as bit coin has already appeared, it has shared with the world and completely free at the same time Use, by one possibly also with network design at the calculation power of default of value Transfer system of decentralization, formula mechanism, The social contract voluntarily abided by.This system can be said to be a very special special case for encryption safe Because it is the state machine based on transaction.By utilizing the technical characterstics such as block chain " distributed, open and clear, can not to change ", The transaction and circulation of right are realized on transaction platform, recording-related information is simultaneously protected, to improve digital content circulation Efficiency is reduced circulation cost, circulation expansion range, effectively solve really to weigh present in digital content circulation it is difficult, pirate it is serious, The problems such as publicity is poor, trading efficiency is low.Block chain is made of data structure and block chain node, i.e. number in block chain It being formed according to according to block mode, each data are included in a block, then muti-piece block are attached by chain, Such structure makes wherein once there is node to attempt to change existing block, it must change after all blocks. Need to carry out proof of work due to generating block, the generation of each block requires certain calculation amount, makes number therein It is believed that breath modification becomes extremely difficult.Meanwhile each node for accessing block chain network can save a complete block Data need all nodes to reach common understanding the modification of data, and the behavior of altered data can be found by other nodes.Block chain It is based on the public credibility that such structure obtains.By block chain technology be applied to copyright field whether and current existing copyright System generates conflict?Wu Peng thinks, block chain technology can become a useful supplement of existing copyright system, convenience, Timeliness provides better user experience.Instantly the flowing velocity of internet information is very fast, and the spread speed of information is Through using minute, second as basic unit, effective life cycle of information is also become shorter, and traditional copyright protection regime is difficult effectively Act on this kind of information.Also lack a fair and just transaction platform, both sides of supply and demand in existing copyright system simultaneously It can not effectively dock, this also significantly limits the scale in copyright trading market.In order to solve this problem, pass through area originally Block chain technology all generates artistic work original at one's side, picture, text etc. global only one numeration system, referred to as " former This DNA " has " script DNA ", and no matter works are transmitted author and the copyright information that can everywhere trace back to him, while every A works carry a payment system again, as long as seeing such a DAN information, so that it may very easily complete payment and award Power, is greatly to evolve for present content propagation system.But block chain bring for entire cultural industry Change more than that.Each participant is fair cooperation on block platform chain, each of inside this block chain Participating in node has the record of equality to weigh, and income is generated in network can also carry out more fair distribution, and author can be real-time Obtain the clearing of income.Intelligent contract also will carry out great benefit to content authorizing band.For example, works are directed to and do not go together Different prices is arranged in the use of industry;Such as a comparison can be for example arranged in the strong works of timeliness in initial 24 hours High authorization price, when 24 is small after hot spot cooling can automatically by works authorization switch to freely sign propagate, help author's fame and gain Double receipts.
But all being rested on above-mentioned introduction and imagination using the overwhelming majority for present block chain, how to solve specific The problem of and lack the disclosure of technology using the technology.
Summary of the invention
The invention proposes a kind of systems by the protection transaction of block chain network, including:It is generated at custom system close Code, value depend on Transaction Information and private key, and custom system has processor system, which has at least one Device, communication interface and memory are managed, the password that Transaction Information and custom system generate is sent the block chain by the system Network, to combine the request for executing transaction to be verified, which is characterized in that the custom system includes safety zone and including institute The remainder of custom system but the safety zone is stated, the remainder of the custom system cannot access the safety zone Domain.
Further, the custom system include safety zone and including the custom system but the safety zone The remainder of remainder, the custom system cannot access the safety zone.
Further, user information is input in the interface of custom system of a part as safety zone, wherein The private key is at least partly exported from some user informations.
Another aspect of the present invention provides a kind of method of protection transaction, is used for foregoing system, feature exists In the method includes:Password is generated at custom system, value depends on Transaction Information and private key, which has place Device system is managed, which has at least one processor, communication interface and memory.System;By Transaction Information and use The password that family system generates is sent to block chain network, to combine the request for executing transaction to be verified.Wherein, the user system System include safety zone and including the custom system but the remainder of the safety zone, the residue of the custom system Part cannot access the safety zone;This method further includes calculating and/or storing private key in the safety zone of custom system.
Further, the custom system include safety zone and including the custom system but the safety zone The remainder of remainder, the custom system cannot access the safety zone.This method further includes in custom system Calculating and/or store transaction password generator in safety zone.
Further, user information is input in the interface of custom system of a part as safety zone, wherein The private key is at least partly exported from some user informations.
Further, the user information being input in the interface is PIN or password;The user being wherein input in interface Information is the biometric data of user, such as fingerprint, voice data, face data, finger vena or hand geometry;Its In the user information that is input in interface be one or more visual patterns selection.
Further, block chain network is using custom system public key verifications from the received Transaction Information of custom system and close Code.
Further, to the user information and seed application one-way function to calculate the private cipher key.
Further, wherein the one-way function is one-way hash function.
Advantageous effects obtained by the present invention are:A kind of technical solution of Secure Transaction is provided based on block chain It carries out.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
This gives a kind of systems by the protection transaction of block chain network, including:It is generated at custom system Password, value depend on Transaction Information and private key, and custom system has processor system, which has at least one The password that Transaction Information and custom system generate is sent the block by processor, communication interface and memory, the system Chain network, with combine execute transaction request verified, which is characterized in that the custom system include safety zone and including The remainder of the remainder of the custom system but the safety zone, the custom system cannot access the safety zone Domain.Further, the custom system include safety zone and including the custom system but the residue of the safety zone The remainder of part, the custom system cannot access the safety zone.Further, user information is input to conduct In the interface of the custom system of a part of safety zone, wherein the private key is at least partly exported from some user informations.
Embodiment two.
A kind of method for present embodiments providing protection transaction, is used for foregoing system, the method includes:? Password is generated at custom system, value depends on Transaction Information and private key, which has processor system, the processor System has at least one processor, communication interface and memory.System;The password hair that Transaction Information and custom system are generated It is sent to block chain network, to combine the request for executing transaction to be verified.Wherein, the custom system includes safety zone and packet The remainder of the custom system but the safety zone is included, the remainder of the custom system cannot access the peace It is region-wide;This method further includes calculating and/or storing private key in the safety zone of custom system.Further, the user System include safety zone and including the custom system but the remainder of the safety zone, the custom system it is surplus Remaining part point cannot access the safety zone.This method further includes calculating and/or storing in the safety zone of custom system to hand over Easy password generator.Further, user information is input in the interface of custom system of a part as safety zone, Wherein the private key is at least partly exported from some user informations.Further, the user information being input in the interface It is PIN or password;The user information being wherein input in interface is the biometric data of user, such as fingerprint, voice data, Face data, finger vena or hand geometry;The user information being wherein input in interface is one or more vision figures The selection of picture.Block chain network utilizes custom system public key verifications from the received Transaction Information of custom system and password.To described User information and seed application one-way function are to calculate the private cipher key.The one-way function is one-way hash function.
Embodiment three.
This gives a kind of systems by the protection transaction of block chain network, including:It is generated at custom system Password, value depend on Transaction Information and private key, and custom system has processor system, which has at least one The password that Transaction Information and custom system generate is sent the block by processor, communication interface and memory, the system Chain network, with combine execute transaction request verified, which is characterized in that the custom system include safety zone and including The remainder of the remainder of the custom system but the safety zone, the custom system cannot access the safety zone Domain.Further, the custom system include safety zone and including the custom system but the residue of the safety zone The remainder of part, the custom system cannot access the safety zone.Further, user information is input to conduct In the interface of the custom system of a part of safety zone, wherein the private key is at least partly exported from some user informations.
The method traded is protected for foregoing system there is also provided a kind of, the method includes:With Password is generated at the system of family, value depends on Transaction Information and private key, which has processor system, the processor system System has at least one processor, communication interface and memory.System;The password that Transaction Information and custom system generate is sent To block chain network, to combine the request for executing transaction to be verified.Wherein, the custom system include safety zone and including The remainder of the custom system but the safety zone, the remainder of the custom system cannot access the safety Region;This method further includes calculating and/or storing private key in the safety zone of custom system.Further, the user system System include safety zone and including the custom system but the remainder of the safety zone, the residue of the custom system Part cannot access the safety zone.This method further includes calculating and/or store transaction in the safety zone of custom system Password generator.Further, user information is input in the interface of custom system of a part as safety zone, Described in private key at least partly from some user informations export.Further, the user information being input in the interface is PIN or password;The user information being wherein input in interface is the biometric data of user, such as fingerprint, voice data, face Portion's data, finger vena or hand geometry;The user information being wherein input in interface is one or more visual patterns Selection.Block chain network utilizes custom system public key verifications from the received Transaction Information of custom system and password.To the use Family information and seed application one-way function are to calculate the private cipher key.The one-way function is one-way hash function.
Example IV.
The present embodiment constructs a kind of system, including:First processor system has at least one processor, processor The first memory system that system communicates, user input and check the user interface of the information handled by processor system, And the network that the network communicating system for sending and receiving message is handled by processor system;Including at least second processor The safety zone of system, for handling security affairs;And second memory system, private key is stored, which is to generate password Or the value of signature;Second memory and second processor system are communicatively coupled with one another;First processor system cannot access Second processor system and second memory system.Wherein the system executes on a cellular telephone.Mobile phone includes display Screen, the safety zone is communicably coupled to the display screen;The safety zone is communicably coupled at least the one of the display screen Part, for showing the information about the transaction on the display.And at least in the part of the display screen When being controlled by the second processor system, the first processor cannot be accessed by the second processor system in the peace The display screen controlled in entire area.Certain display screen further includes will be alphabetical, and the button or character of number or other symbols are defeated Enter into user interface, the user interface is connected only to the safety zone, so that the first processor system can not visit It asks.Wherein the second memory system is located in the safety zone, and the safety zone storage is by the password encryption One or more algorithms of the Transaction Information are tied to, so that if the password is based on incorrect transaction, it is described close Code will be invalid.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and Modification equally falls into the scope of the claims in the present invention.

Claims (10)

1. a kind of system by the protection transaction of block chain network, including:Password is generated at custom system, value depends on handing over Easy information and private key, custom system have a processor system, which has at least one processor, communication interface and Memory, the system send the block chain network for the password that Transaction Information and custom system generate, are executed with combining The request of transaction is verified, which is characterized in that the custom system includes safety zone and including the custom system but institute The remainder of safety zone is stated, the remainder of the custom system cannot access the safety zone.
2. the system as claimed in claim 1, which is characterized in that the custom system includes safety zone and including the user The remainder of system but the safety zone, the remainder of the custom system cannot access the safety zone.
3. method according to claim 2, which is characterized in that user information is input to a part as safety zone In the interface of custom system, wherein the private key is at least partly exported from some user informations.
4. a kind of method of protection transaction, is used for the system as described in claim 1-3, it is characterised in that the method packet It includes:Password is generated at custom system, value depends on Transaction Information and private key, which has processor system, should Processor system has at least one processor, communication interface and memory.System;Transaction Information and custom system are generated Password is sent to block chain network, to combine the request for executing transaction to be verified.Wherein, the custom system includes safety zone Domain and including the custom system but the remainder of the safety zone, the remainder of the custom system cannot access The safety zone;This method further includes calculating and/or storing private key in the safety zone of custom system.
5. method as claimed in claim 4, which is characterized in that the custom system includes safety zone and including the user The remainder of system but the safety zone, the remainder of the custom system cannot access the safety zone.It should Method further includes calculating and/or store transaction password generator in the safety zone of custom system.
6. method as claimed in claim 5, which is characterized in that user information is input to a part as safety zone In the interface of custom system, wherein the private key is at least partly exported from some user informations.
7. method as claimed in claim 6, which is characterized in that the user information being input in the interface is PIN or password; The user information being wherein input in interface is the biometric data of user, such as fingerprint, voice data, face data, hand Refer to vein or hand geometry;The user information being wherein input in interface is the selection of one or more visual patterns.
8. the method for claim 7, which is characterized in that block chain network utilizes custom system public key verifications from user system It unites received Transaction Information and password.
9. method according to claim 8, which is characterized in that the user information and seed application one-way function to calculate The private cipher key.
10. method as claimed in claim 9, which is characterized in that wherein the one-way function is one-way hash function.
CN201810734511.4A 2018-07-06 2018-07-06 A method of it is traded by the system and protection of block chain network protection transaction Pending CN108921557A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810734511.4A CN108921557A (en) 2018-07-06 2018-07-06 A method of it is traded by the system and protection of block chain network protection transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810734511.4A CN108921557A (en) 2018-07-06 2018-07-06 A method of it is traded by the system and protection of block chain network protection transaction

Publications (1)

Publication Number Publication Date
CN108921557A true CN108921557A (en) 2018-11-30

Family

ID=64425480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810734511.4A Pending CN108921557A (en) 2018-07-06 2018-07-06 A method of it is traded by the system and protection of block chain network protection transaction

Country Status (1)

Country Link
CN (1) CN108921557A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179514A (en) * 2011-12-22 2013-06-26 航天信息股份有限公司 Cell phone safe group-sending method and device for sensitive message
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN107122673A (en) * 2017-03-09 2017-09-01 深圳市金立通信设备有限公司 A kind of information ciphering method and terminal
CN107580767A (en) * 2015-03-12 2018-01-12 眼锁有限责任公司 The method and system of network activity is managed using biological characteristic
CN107919954A (en) * 2017-10-20 2018-04-17 浙江大学 A kind of block chain user key guard method and device based on SGX
CN108055133A (en) * 2017-12-12 2018-05-18 江苏安凰领御科技有限公司 A kind of key secure signing method based on block chain technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179514A (en) * 2011-12-22 2013-06-26 航天信息股份有限公司 Cell phone safe group-sending method and device for sensitive message
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN107580767A (en) * 2015-03-12 2018-01-12 眼锁有限责任公司 The method and system of network activity is managed using biological characteristic
CN107122673A (en) * 2017-03-09 2017-09-01 深圳市金立通信设备有限公司 A kind of information ciphering method and terminal
CN107919954A (en) * 2017-10-20 2018-04-17 浙江大学 A kind of block chain user key guard method and device based on SGX
CN108055133A (en) * 2017-12-12 2018-05-18 江苏安凰领御科技有限公司 A kind of key secure signing method based on block chain technology

Similar Documents

Publication Publication Date Title
Wang et al. Challenges of blockchain in new generation energy systems and future outlooks
Boireau Securing the blockchain against hackers
CN107993069A (en) A kind of online transaction method and system based on block chain network
US20170250796A1 (en) Trans Vernam Cryptography: Round One
CN109417465A (en) Registration and automatic management method of intelligent contracts executed by block chains
US20140177825A1 (en) Asymmetric Tokenization
Zhang et al. Consensus mechanisms and information security technologies
CN110263544A (en) In conjunction with the receipt storage method and node of type of transaction and Rule of judgment
An et al. Secure crowdsensed data trading based on blockchain
CN110264195A (en) It is marked and transaction, the receipt storage method of user type and node in conjunction with code
CN110086626A (en) Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair
CN110245947A (en) The receipt storage method and node limited in conjunction with the condition of transaction and user type
CN108090769A (en) A kind of data safety method of commerce and system based on ownership
CN110263086A (en) In conjunction with the receipt storage method and node of user type and event functions type
CN110245942A (en) In conjunction with the receipt storage method and node of user type and Rule of judgment
CN110245945A (en) In conjunction with the receipt storage method and node of code mark and user type
CN110245504A (en) The receipt storage method and node limited in conjunction with the condition of polymorphic type dimension
CN110264197A (en) The receipt storage method and node of binding events type function and Rule of judgment
CN110264193A (en) In conjunction with the receipt storage method and node of user type and type of transaction
CN110245944A (en) Receipt storage method and node based on user type
CN109847365A (en) A kind of anti-cheating method and system towards the application of block chain
CN110264194A (en) Receipt storage method and node based on event functions type
CN110472974A (en) Assets transfer method, apparatus and system based on block chain intelligence contract
CN110263089A (en) The receipt storage method and node limited in conjunction with the condition of transaction and event type
Li et al. Astraea: Anonymous and secure auditing based on private smart contracts for donation systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130

RJ01 Rejection of invention patent application after publication