CN109102404A - The method for secret protection and system of block chain real name communication - Google Patents

The method for secret protection and system of block chain real name communication Download PDF

Info

Publication number
CN109102404A
CN109102404A CN201810900976.2A CN201810900976A CN109102404A CN 109102404 A CN109102404 A CN 109102404A CN 201810900976 A CN201810900976 A CN 201810900976A CN 109102404 A CN109102404 A CN 109102404A
Authority
CN
China
Prior art keywords
enterprise customer
node
company information
block chain
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810900976.2A
Other languages
Chinese (zh)
Other versions
CN109102404B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201810900976.2A priority Critical patent/CN109102404B/en
Publication of CN109102404A publication Critical patent/CN109102404A/en
Application granted granted Critical
Publication of CN109102404B publication Critical patent/CN109102404B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the method for secret protection and system of a kind of communication of block chain real name, wherein method includes: that the first participation node sends the preparation broadcast message of the transaction after the first private key signature of the first enterprise customer in block chain network;Second participation node receives transaction and prepares after broadcasting the message, signature verification is carried out to the first private key using the first public key of the first enterprise customer, if being verified, then by own node compared with enterprise customer's mark in block chain network is identified with the second enterprise customer, if knowing, the two is identical, then the complete company information of the first enterprise customer obtained by non-block chain network is calculated, obtain the second identifying code of the first enterprise customer, if knowing, the two is identical, then determine that incomplete company information is all correct, and it is ready to respond to the transaction that the first participation node feeding back includes the second enterprise customer mark.The privacy information of the block Lian Zhong enterprise node in real name communication is protected as a result,.

Description

The method for secret protection and system of block chain real name communication
Technical field
A kind of communicated the present invention relates to field of communication technology more particularly to block chain real name method for secret protection and it is System.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain The corresponding enterprise customer of a node implements, and cannot be forged by other enterprise customers, that is to say, that the implementation of block chain network Environment and actual life are separation, it is difficult to which to node in real life, corresponding enterprise customer is managed, for example, one Nodes ' behavior in denier block chain network can not be traced, there are illegal activities, such as money laundering etc. even by national CA completely The certificate that (Certificate Authority, certificate authority) organ provides, can only also prove network identity, and can not Prove its real identification, also, block chain network is backed up when being traded generally for enabling each to participate in node Transaction, All Activity data be all it is open and transparent, this is for many is not intended to the enterprise's nodes for exposing privacy information One important application pain spot, thus, the protection for how balancing the real-name authentication management and privacy to enterprise's node becomes urgently Problem to be solved.
Summary of the invention
The present invention provides the method for secret protection and system of a kind of block chain real name communication, to solve in the prior art, enterprise The technical issues of balancing is difficult between the real-name authentication management of industry node and the protection of privacy.
First embodiment of the invention provides a kind of method for secret protection of block chain real name communication, comprising: first participates in section Point sends the transaction after the first private key signature of the first enterprise customer in block chain network and prepares broadcast message, wherein It includes: first enterprise customer mark of first enterprise customer in block chain network that the transaction, which prepares broadcast message, with And second enterprise customer mark of the second enterprise customer of pending communication transaction in block chain network, first enterprise uses The incomplete company information at family and by the financial statement of the private key signature of audit server in block chain network and described the The first identifying code of one enterprise customer;Second participation node receives the transaction and prepares after broadcasting the message, and obtains using preparatory The first public key of first enterprise customer signature verification carried out to first private key if being verified save itself Point is compared with enterprise customer's mark in block chain network is identified with second enterprise customer, if knowing identical, the root of the two According to the local block chain account book of the node identification inquiry of the audit server, the node identification with the audit server is obtained Corresponding public key carries out signature verification to the financial statement using the public key;If described second participates in node described in Public key passes through the verification of financial statement, then according to first enterprise customer's for first passing through non-block chain network acquisition in advance Whether complete company information detects the incomplete company information all correct, if knowing the incomplete company information all just Really, then it is calculated according to complete company information of the preset one-way function to first enterprise customer, obtains described first The second identifying code of enterprise customer, wherein the company information type of the complete company information and the incomplete company information It is identical;Described second participates in node first identifying code and second identifying code, if knowing, the two is identical, to institute The authentication for stating the first enterprise customer passes through, and participates in node feeding back to described first and identify comprising second enterprise customer Transaction be ready to respond to.
Second embodiment of the invention provides a kind of intimacy protection system of block chain real name communication, comprising: first participates in section Point, second participate in node, wherein described first participates in node, passes through the first enterprise customer for sending in block chain network The first private key signature after transaction prepare broadcast message, wherein it includes: first enterprise that the transaction, which prepares to broadcast the message, Second enterprise customer of first enterprise customer mark and pending communication transaction of the user in block chain network is in block chain The second enterprise customer in network identifies, and examines in the incomplete company information and process block chain network of first enterprise customer Count the financial statement of the private key signature of server and the first identifying code of first enterprise customer;Described second participates in section Point prepares after broadcasting the message for receiving the transaction, using the first public key of first enterprise customer obtained in advance Signature verification is carried out to first private key, if being verified, enterprise customer of the own node in block chain network is marked Know compared with second enterprise customer mark, if knowing, the two is identical, is looked into according to the node identification of the audit server Local block chain account book is ask, public key corresponding with the node identification of the audit server is obtained, using the public key to institute It states financial statement and carries out signature verification;Described second participates in node, if being also used to test the financial statement using the public key Card passes through, then according to the complete company information detection for first passing through first enterprise customer that non-block chain network obtains in advance Whether incomplete company information is all correct, if knowing, the incomplete company information is all correct, according to preset unidirectional Function calculates the complete company information of first enterprise customer, obtains the second verifying of first enterprise customer Code, wherein the complete company information is identical as the company information type of the incomplete company information;Described second participates in section Point is also used to the first identifying code described in comparison and second identifying code, if knowing, the two is identical, uses first enterprise The authentication at family passes through, and participating in node feeding back to described first includes the transaction preparation sound that second enterprise customer identifies It answers.
Third embodiment of the invention provides a kind of computer equipment, comprising: memory, processor and storage are on a memory And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation The method for secret protection of block chain real name communication described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey Sequence realizes the secret protection of the block chain real name communication as described in above-described embodiment when the computer program is executed by processor Method.
Technical solution provided in an embodiment of the present invention can include the following benefits:
When first participates in node and the second participation node communication, first participates in the incomplete enterprise's letter of node broadcasts Breath, the company information of the first enterprise customer is known to avoid other nodes, avoids the privacy leakage of the first enterprise customer, meanwhile, Second participates in the complete company information of available first enterprise customer of node, and based on the complete company information and incomplete enterprise Industry information carry out the first enterprise customer real-name authentication, thus to first participation node carry out real-name authentication with guarantee convenient for pair On the basis of the legitimacy of transaction is supervised, the privacy information of the first participation node is protected.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram of the intimacy protection system of block chain real name communication according to an embodiment of the invention;
Fig. 2 is the interaction schematic diagram of the intimacy protection system of block chain real name communication according to an embodiment of the invention;
Fig. 3 is the interaction signal of the intimacy protection system of block chain real name communication in accordance with another embodiment of the present invention Figure;
Fig. 4 is the interaction signal of the intimacy protection system of the block chain real name communication of another embodiment according to the present invention Figure;
Fig. 5 is the flow chart of the method for secret protection of block chain real name communication according to an embodiment of the invention;
Fig. 6 is the application scenarios signal of the method for secret protection of block chain real name communication according to an embodiment of the invention Figure.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth of carrying entity world It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
Thus, authentication in order to solve the above-mentioned technical problem, in the present invention is provided for user on line, so that block chain Participant can be appeared in block chain in a manner of real name, thus, be conducive to the real information based on user to participation node Management, and the legitimacy of block chain network environment is guaranteed.
As a result, when participating in node application addition block chain network, real name is carried out to the corresponding living body user of node is participated in Certification, under the system of system of real name, to many illegal nodes ' behaviors, for example, all being formd effectively thoroughly the problem of intelligent contract Bright management environment maintains the legitimacy and authenticity of the operation of block chain network.
Further, based on above embodiments it is found that block chain network is being added in all block chain nodes in block chain Shi Jun completes real-name authentication, and the working principle based on block chain is it is found that in order to enable the node in block chain network can Transaction to be backed up, all transaction are all open and clear, and under many application scenarios, participate in the hope of node itself certainly Oneself account privacy information is protected, and especially to some enterprise institutions, account privacy information, which can obtain protection, makes its opponent Company does not know that its business information becomes tight demand.
In order to be protected to the privacy information between enterprise's node, the present invention mentions on the basis of realizing real-name authentication The method for secret protection and system of a kind of block chain real name communication are supplied, wherein hidden for the ease of communicating to block chain real name The explanation of private guard method, the present invention are first described the intimacy protection system of block chain real name communication.
Fig. 1 is the structural schematic diagram of the intimacy protection system of block chain real name communication according to an embodiment of the invention, As shown in Figure 1, the intimacy protection system of block chain real name communication includes that the first participation node 110, second participates in node 120, Wherein, in an embodiment of the present invention, the both sides' node traded is indicated with the first participation node and the second participation node, examined Consider during real trade, other nodes of non-participating node are only handed over it is only necessary to back up associated transaction data Easy both sides participate in node realize authentication be can guarantee transaction legitimacy and reliability can be supervisory, thus, in this hair In bright embodiment, the method for taking a kind of both parties enterprise node to carry out real-name authentication is realized on the basis of real-name authentication The privacy of upper protection enterprise's node.It is specific as follows:
As shown in Fig. 2, first participates in node in block chain when the first participation node and the second participation node are traded The transaction after the first private key signature of the first enterprise customer is sent in network and prepares broadcast message (step 1), wherein first Enterprise customer is the corresponding enterprise customer of the first participation node, generally refers to the stronger enterprise of secret protection demand, transaction is quasi- Standby broadcast message includes: that first enterprise customer mark and pending communication of first enterprise customer in block chain network are handed over Second enterprise customer mark of the second easy enterprise customer in block chain network, the incomplete company information of the first enterprise customer With the first verifying by the financial statement of the private key signature of audit server in block chain network and the first enterprise customer Code, wherein in step 1, due to broadcast message in broadcast be the first enterprise customer incomplete company information, thus, i.e., Make other nontransaction nodes that can not get the real corporate information of the first enterprise customer, thereby ensures that the transaction of transaction enterprise Record is not known by rival.
In turn, the second participation node is used after receiving transaction and preparing broadcast message using the first enterprise obtained in advance First public key at family carries out signature verification (step 2) to the first private key, wherein the first public key and the first private key are participated in for first The authentication of node, the first private key are held by the first participation node oneself, and the first public key is sent to block in the form broadcasted Chain network, so that communicate with the first participation node second participates in corresponding relationship pair of the node based on the first public key and the first private key First, which participates in node, carries out authentication.If being verified, enterprise customer of the own node in block chain network is identified (the step 3) compared with the second enterprise customer mark, whether the node for determining that the first participation node is traded is this node, if Both know identical, then confirmed the participation node both sides currently to trade, at this time for the ease of the legitimacy of monitoring trading, to the One, which participates in node, carries out real name authentication.
In the present embodiment, enterprise customer's mark in verifying own node in block chain network and the second enterprise customer After mark is consistent, then the block chain account book local according to the inquiry of audit server node identification, obtains the section with audit server The corresponding public key of point identification carries out signature verification to financial statement using public key, determines the whether credible (step of current financial statement 4)。
Further, if the second participation node application public key passes through verification of financial statement, show current financial statement It is genuine and believable, thus, real-name authentication is carried out to enterprise, is used according to the first enterprise that non-block chain network obtains is first passed through in advance Whether all the complete company information at family detects incomplete company information correct (step 5), if knowing, incomplete company information is complete Portion is correct, then further whether the whole company information of verifying is correct, according to preset one-way function to the first enterprise customer's Complete company information is calculated, and the second identifying code of the first enterprise customer, second identifying code and the first enterprise customer are obtained Complete company information uniquely corresponds to, but since second identifying code is generated according to one-way function, thus, the second identifying code The complete company information of the first enterprise customer can not inversely be calculated, wherein complete to look forward to for the ease of subsequent authentication Industry information (step 6) identical as the company information type of incomplete company information.
In turn, the second participation node compares the first identifying code and the second identifying code, if knowing, the two is identical, looks forward to first The authentication of industry user passes through, and is ready to respond to the transaction that the first participation node feeding back includes the second enterprise customer mark (step 7).
In an embodiment of the present invention, as shown in figure 3, on the basis of as shown in Figure 2, in order to further increase verifying Efficiency, second participates in node, is also used to after receiving transaction and preparing after broadcast message, determines the enterprise of incomplete company information Industry information type, and believed by the complete enterprise corresponding with company information type that non-block chain network obtains the first enterprise customer Cease (step 21).
In one embodiment of the invention, as shown in figure 4, on the basis of as shown in Figure 2, in order to further increase pair First participates in the authentication efficiency of node, and first participates in node, is also used to send in block chain network by the first enterprise Before transaction after the first private key signature of user prepares broadcast message, node is participated in second by non-block chain network and is sent The complete company information of first enterprise customer, and record the company information type of the second enterprise customer mark and complete company information Corresponding relationship, with send trade prepare broadcast message when, according to corresponding relationship generate the first enterprise customer incomplete enterprise Industry information (step 11).
When being executed for the intimacy protection system of the more detailed block chain real name communication for illustrating the embodiment of the present invention Details concentrates on area so that the secret protection process that those skilled in the art communicates real name of the present invention is clearer below The method for secret protection side of block chain real name communication is described.
Fig. 5 is the flow chart of the method for secret protection of block chain real name communication according to an embodiment of the invention, such as Fig. 5 It is shown, this method comprises:
Step 101, the first participation node sends the first private key signature by the first enterprise customer in block chain network Rear transaction prepares broadcast message, wherein it includes: the of the first enterprise customer in block chain network that transaction, which prepares broadcast message, Second enterprise customer mark of second enterprise customer of one enterprise customer mark and pending communication transaction in block chain network Know, the incomplete company information of the first enterprise customer and the finance report by the private key signature of audit server in block chain network Table and the first identifying code of the first enterprise customer.
Wherein, the authentication that the first public key and the first private key participate in node for first, the first private key are participated in by first Node is held oneself, and the first public key is sent to block chain network in the form broadcasted, so that the phase communicated with the first participation node Corresponding relationship of the artis based on the first public key and the first private key participates in node to first and carries out authentication.
In addition, above-mentioned first enterprise customer is corresponding with the first participation node, the corresponding enterprise of the first participation node can be, First enterprise customer mark can be node ID etc. for indicating node identification of the first participation node in block chain network, Likewise, the second enterprise customer mark is for indicating node identification of the second participation node in block chain network, it can be section Point ID etc., the both sides that can orient transaction based on the first enterprise customer mark and the second enterprise customer mark participate in node.First The company information of enterprise customer can be enterprise name, corporate tax number, the name of legal representative and ID card No., registration Capital, registered address, Business Registration Number (number of registration 569876654324567), establishment time etc., the first enterprise of mark used The information of the true identity at family, the incomplete information of the first enterprise customer can be the information of hidden parts company information, for example, Certain key messages: * * star company, the number of paying taxes 1234***90 are replaced using asterisk.
The first identifying code of first enterprise customer is the complete company information meter according to one-way function to the first enterprise customer It obtains, wherein the first identifying code and the complete company information of the first enterprise customer uniquely correspond to, and add via one-way function The first identifying code after close, cannot inversely export the complete company information of the first enterprise customer, even if there is artis acquisition as a result, To the first identifying code, the complete company information of the first enterprise customer can not be also exported, to ensure that the first enterprise customer's is hidden Private avoids the rival of the first enterprise customer from finding its trading activity etc., in addition, in an embodiment of the present invention, in order into One step avoids identifying code from being cracked, and identifying code, which can be, to be calculated by multinomial enterprise's complete information, for example, there is one-way function Complete Business Name, legal representative's (name+identification card number), registered capital, registered address, enterprise to the first enterprise customer Multinomial enterprise's complete informations such as industry number of registration (number of registration 569876654324567), establishment time are calculated first and test Demonstrate,prove code.
Specifically, the first participation node is sent after the first private key signature of the first enterprise customer in block chain network Transaction prepare broadcast message after, first, can based on the second enterprise customer in the broadcast message identify further orient The Correspondent Node of transaction;Second, it can be identified based on the first enterprise customer and show its identity in block chain network, in order to The Correspondent Node of transaction further carries out authentication to first enterprise customer;Third, based on the transmission of the first identifying code, with Node progress real-name authentication can be participated in first convenient for the Correspondent Node of transaction, convenient for guaranteeing the legitimacy of transaction; 4th, include incomplete company information in broadcast message, gets the incomplete company information even if the node in block chain The true identity that can not know the first enterprise customer protects the privacy of the first enterprise customer.Wherein, in order to ensure the first enterprise The personal secrets of user avoid illegal node from deriving complete company information, incomplete enterprise's letter by incomplete company information Most information that is hiding or masking complete company information or important message part in breath, for example, concealing identity Latter four etc. for demonstrate,proving number.;5th, in order to avoid not being that other illegal enterprises first enterprise customer that disguises oneself as trades, hand over Easily prepare in broadcast message to further include by the financial statement of the private key signature of audit server in block chain network as a result, one Aspect, only enterprise customer itself possess the financial statement, thus, which can be used to confirm that the first enterprise customer's On the other hand identity can guarantee the authenticity of financial statement via the financial statement after audit server private key signature, avoid Illegal node forges financial statement, wherein in order to guarantee that the real reliability of company information, financial statement need actual life In the office with financial audit qualification proof of affixing one's seal, or by there is financial audit qualification in block chain The financial statement that the private key signature of the corresponding audit server of office is crossed.
Step 102, the second participation node receives transaction and prepares after broadcasting the message, and uses using the first enterprise obtained in advance First public key at family carries out signature verification to the first private key, if being verified, by enterprise of the own node in block chain network Compared with industry user identifier is identified with the second enterprise customer, if knowing, the two is identical, is looked into according to the node identification of audit server Local block chain account book is ask, public key corresponding with the node identification of audit server is obtained, the finance are reported using public key Table carries out signature verification.
As analyzing above, the first public key and the first private key public key pair each other, thus, the second participation node receives friendship After easily preparing broadcast message, signature verification is carried out to the first private key using the first public key of the first enterprise customer obtained in advance, To ensure that transaction broadcast message participates in what node was sent for first, rather than what other nodes illegally pretended were sent etc., into And if the verification passes, then whether verifying second is participated in node is the current Correspondent Node that communicates of first participation node, With ensure both parties identity it is correct.
Specifically, second enterprise customer mark and second enterprise use of the node by own node in block chain network are participated in Family mark compares, and to ensure that the first participation node is the node communicated with, if being verified, shows current first ginseng It is that second communicated with participates in node with node, after transaction node both sides confirmation, not in order to further ensure financial statement It is to forge, avoids illegal transaction, further the authenticity of financial statement is verified.
Specifically, inquiring local block chain account book, acquisition and audit server according to the node identification of audit server Corresponding public key, the public key and private key are a pair of secret keys pair, can be used for verifying the identity of audit server, using public key to wealth Business report carries out signature verification, to ensure the authenticity of financial statement.
Step 103, if the second participation node passes through verification of financial statement using public key, basis first passes through non-block in advance Whether the incomplete company information of complete company information detection for the first enterprise customer that chain network obtains is all correct, if knowing non- Complete company information is all correct, then is counted according to complete company information of the preset one-way function to the first enterprise customer It calculates, obtains the second identifying code of the first enterprise customer, wherein the company information class of complete company information and incomplete company information Type is identical.
Step 104, the second participation node compares the first identifying code and the second identifying code, if both know it is identical, to the The authentication of one enterprise customer passes through, and participating in node feeding back to first includes the transaction preparation sound that the second enterprise customer identifies It answers.
Specifically, if the second participation node passes through verification of financial statement using public key, i.e., public key and financial statement are signed Private key matching, then show that financial statement is true and reliable, thus, second participate in node to first participate in node it is corresponding first enterprise Whether industry user carries out real-name authentication, all correct according to the incomplete company information of complete company information detection, if knowing non-complete Whole company information is all correct, then is further carried out according to complete company information of the preset one-way function to the first enterprise customer It calculates, obtains the second identifying code of the first enterprise customer, compare the first identifying code and the second identifying code, as described above, First identifying code and the second identifying code and the complete company information of enterprise customer are uniquely corresponding, thus, if the two is identical, table The bright authentication to the first enterprise customer passes through, so that participating in node feeding back to first includes the friendship that the second enterprise customer identifies It is easily ready to respond to, to allow the first participation node to trade with the second participation node.
In this example, it is not all of correctly if detecting incomplete company information according to complete company information, such as phase With the information of position, there are inconsistent, it is determined that and incomplete information is incorrect, thus, determine the real-name authentication of the first participation node Failure, refusal are communicated with the first participation node.Alternatively, the first identifying code and the second identifying code be not identical, it is determined that complete Information is incorrect, thus, determine the real-name authentication failure of the first participation node, refusal is communicated with the first participation node.
It is emphasized that in this example, being detected first than more complete company information and whether incomplete company information Unanimously carry out the preliminary real-name authentication of carry out for participating in node to first, after consistent, by comparing the first identifying code and the second verifying Whether code identical to participate in node to first and carries out further real-name authentication, as a result, when complete company information detect with it is non-complete When whole company information is inconsistent, it is confirmed that first participates in the failure of node real-name authentication, the first identifying code and the are not needed to compare again Whether two identifying codes are consistent, improve real-name authentication efficiency.
In an embodiment of the present invention, in order to protect the personal secrets of the first participation node, the first enterprise customer's is complete Company information does not store in the higher block chain network of transparency, and is stored in the relevant position of non-block chain network, than Such as, it is stored in the corresponding equipment of the first participation node, second participates in node can be by way of communicating from first face-to-face Participate in the complete company information that corresponding first enterprise customer is got in the corresponding equipment of node.
For the ease of the subsequent real-name authentication for participating in node to first, complete company information in the present embodiment with it is incomplete Company information type is identical, for example, complete company information is that then incomplete company information is also corporate tax to corporate tax information Information.
It should be noted that in practical applications, according to the difference of application scenarios, realize complete company information with it is incomplete The identical mode of company information type is different, illustrates as follows:
As an example:
Second participation node determines the company information type of incomplete company information, for example, according to the enterprise of incomplete information Industry information type carries out keyword match, determines the company information type of incomplete company information, in turn, passes through non-block link network Network obtains complete company information corresponding with company information type.
As another example:
First participation node actively sends the complete company information received with the second participation node to the second participation node The corresponding incomplete information of type is sent in block chain network in the first participation node by the first enterprise in this example Before transaction after the first private key signature of user prepares broadcast message, first participates in node by non-block chain network to second The complete company information that node sends the first enterprise customer is participated in, and records the second enterprise customer mark and complete company information The corresponding relationship of company information type, to generate the first enterprise according to corresponding relationship and use when sending transaction preparation broadcast message The incomplete company information at family.Complete enterprise corresponding with the second enterprise customer mark is got according to the corresponding relationship to believe The company information type of breath generates the consistent incomplete company information of company information type with the complete company information in turn Type.
As another example:
The friendship after the first private key signature of the first enterprise customer is sent in block chain network in the first participation node Before easily preparing broadcast message, first, which participates in node, sends transaction verification broadcast message by block chain network, wherein transaction is tested Card broadcast message include: the first enterprise customer the first public key and the first enterprise customer company information type so that other The enterprise customer for carrying out communication interaction with the first enterprise customer passes through non-block according to the company information type of the first enterprise customer Chain network obtains the complete company information of the first enterprise customer, thus, first participates in its enterprise to be sent of node active broadcast The information type of information is sent with guaranteeing that the second participation node communicated with the first participation node is got with the first enterprise customer Incomplete company information the corresponding complete company information of company information type.
In order to enable those skilled in the art more understands that the privacy of the block chain real name communication of the embodiment of the present invention is protected Maintaining method is illustrated below with reference to specifically application scenarios:
In this example, as shown in fig. 6, it is enterprise customer B that the first participation node, which is corresponding first enterprise customer, second Participating in the corresponding enterprise customer of node is enterprise customer A, and company information includes Business Name, legal representative, registered capital, note Time, financial statement, the number of paying taxes, are set up at Business Registration Number in volume address, when enterprise customer A and enterprise customer B will trade It waits, other real-life channels that enterprise customer A passes through non-block chain first obtain the complete company name of enterprise customer B Title, registered capital, registered address, Business Registration Number, sets up time, the number of paying taxes at legal representative.In turn, enterprise customer A passes through One-way function F calculates the second identifying code, the second identifying code=F (Business Name (Hai great Xing stationery company), legal representative (name+identification card number, part name horse rise greatly+320322456812345678), registered capital (20000), registered address are (deep The Nanshan District Zhen Shi HuaLian Building), Business Registration Number (569876654324567), set up December 1 2002 time), the number of paying taxes (560808199001021X)), for example one-way function F is Hash function, can only pass through complete corporate tax number and enterprise's name Title calculates the second identifying code, and in this example, the second identifying code of calculating is 67890.
In turn, enterprise customer B sends transaction in block chain and prepares to broadcast the message, and it includes: enterprise that transaction, which prepares broadcast message, The enterprise customer of industry user A identifies, Business Name (the big * * * in sea of the incomplete company information of enterprise customer B oneself, that is, simple Company), legal representative's (name+identification card number, part name horse * rise+3203224568********), registered capital The time (2002, is set up at Business Registration Number (569876654324***) in (200**), registered address (area * * of the Shenzhen mansion * *) Year * month * day), the number of paying taxes (56080819900****X) and the first identifying code: 67890, the transaction broadcast the message in further include The financial statement by the private key signature of audit server in block chain network of enterprise customer B.The broadcast message passes through enterprise It is broadcast out again after the private key signature of user B.
Enterprise customer A has received the broadcast message of enterprise customer B, whether just to first verify that the private key signature of enterprise customer B Really.If correct, enterprise customer A learns enterprise customer according to the mark of the enterprise customer A of the searching counterparty in the broadcast message B, which is found, oneself to trade, thus according to the local block chain account book of the node identification inquiry of audit server, obtain with The corresponding public key of the node identification of audit server carries out signature verification to financial statement using public key, if using public key to wealth Business report is verified, then according to the complete public affairs for the enterprise customer B for first passing through the block chain that non-block chain network obtains in advance Take charge of title (Hai great Xing stationery company), legal representative (name+identification card number, part name horse rises greatly+ 320322456812345678), registered capital (20000), registered address (Nanshan District, Shenzhen City HuaLian Building), Business Registration Number (569876654324567), set up December 1 2002 time), financial report (not showing herein), the number of paying taxes in recent years (560808199001021X) and omit that treated incomplete Business Name (the big * * * company in sea), legal representative's (name + identification card number, part name horse * rise+3203224568********), registered capital (200**), registered address (Shenzhen * * The area mansion * *), Business Registration Number (569876654324***), set up time (* month * day in 2002), the number of paying taxes Whether (56080819900****X) be consistent, if the information such as the number of the non-omission numerical digit of the two and Chinese character are completely the same, looks forward to Industry user A is calculated according to complete company information of the individual event function to enterprise B, obtains the second verifying of the first enterprise customer Code finds first identifying code according to the first identifying code in the broadcast message and with the complete Business Name of enterprise customer B, method Determine representative, registered capital, registered address, Business Registration Number, set up time, the number of paying taxes and calculated according to one-way function The second identifying code of enterprise customer B be consistent, if unanimously, illustrating simple Business Name in the broadcast message, method Determine representative, registered capital, registered address, Business Registration Number, set up time, the number of paying taxes and corresponded to real-life enterprise and use Family B.Then enterprise customer B real-name authentication success, enterprise customer A can be trusted and enterprise customer B trade.
In conclusion the method for secret protection that the block chain real name of the embodiment of the present invention communicates, first participate in node and When the second participation node communication, first participates in the incomplete company information of node broadcasts, knows first to avoid other nodes The company information of enterprise customer avoids the privacy leakage of the first enterprise customer, meanwhile, second participates in available first enterprise of node The complete company information of industry user, and the reality based on the complete company information and incomplete company information the first enterprise customer of progress Thus name certification is carrying out real-name authentication to the first participation node to guarantee the basis convenient for being supervised to the legitimacy of transaction On, protect the privacy information of the first participation node.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program The now method for secret protection of the block chain real name communication as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor The method for secret protection of name communication.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below " One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of method for secret protection of block chain real name communication characterized by comprising
First participation node sends the preparation of the transaction after the first private key signature of the first enterprise customer in block chain network Broadcast message, wherein it includes: first enterprise of first enterprise customer in block chain network that the transaction, which prepares broadcast message, Second enterprise customer mark of second enterprise customer of industry user identifier and pending communication transaction in block chain network, The incomplete company information of first enterprise customer and the finance for passing through the private key signature of audit server in block chain network Report and the first identifying code of first enterprise customer;
Second participation node receives the transaction and prepares after broadcasting the message, using first enterprise customer's obtained in advance First public key carries out signature verification to first private key, if being verified, by enterprise of the own node in block chain network Compared with industry user identifier is identified with second enterprise customer, if knowing, the two is identical, according to the section of the audit server The local block chain account book of point identification inquiry, obtains public key corresponding with the node identification of the audit server, using described Public key carries out signature verification to the financial statement;
If the second participation node passes through the verification of financial statement using the public key, basis first passes through non-block in advance Whether the complete company information detection incomplete company information for first enterprise customer that chain network obtains is all correct, If knowing, the incomplete company information is all correct, according to preset one-way function to the complete of first enterprise customer Company information is calculated, and the second identifying code of first enterprise customer is obtained, wherein the complete company information with it is described The company information type of incomplete company information is identical;
Described second participates in node first identifying code and second identifying code, if knowing, the two is identical, to institute The authentication for stating the first enterprise customer passes through, and participates in node feeding back to described first and identify comprising second enterprise customer Transaction be ready to respond to.
2. the method as described in claim 1, which is characterized in that receive the transaction in the second participation node and prepare extensively After broadcasting after message, further includes:
The second participation node determines the company information type of incomplete company information, and obtains institute by non-block chain network State the complete company information corresponding with the company information type of the first enterprise customer.
3. the method as described in claim 1, which is characterized in that send warp in block chain network in the first participation node Transaction after crossing the first private key signature of the first enterprise customer prepares before broadcast message, further includes:
The first participation node sends first enterprise customer's to the second participation node by non-block chain network Complete company information, and it is corresponding with the company information type of the complete company information to record the second enterprise customer mark Relationship, to generate the non-of first enterprise customer according to the corresponding relationship when sending the transaction preparation broadcast message Complete company information.
4. the method as described in claim 1, which is characterized in that send warp in block chain network in the first participation node Transaction after crossing the first private key signature of the first enterprise customer prepares before broadcast message, further includes:
Described first, which participates in node, sends transaction verification broadcast message by block chain network, wherein the transaction verification broadcast Message includes: the first public key of first enterprise customer and the company information type of first enterprise customer, so that its He and first enterprise customer carry out the enterprise customer of communication interaction according to the company information type of first enterprise customer, The complete company information of first enterprise customer is obtained by non-block chain network.
5. the method as described in claim 1, which is characterized in that further include:
If the second participation node knows that the incomplete company information is not all of correctly, alternatively, first identifying code It is not identical with second identifying code, it is determined that fail to the authentication of first enterprise customer, and join to described first The transaction for including second enterprise customer mark with node feeding back refuses to respond.
6. a kind of intimacy protection system of block chain real name communication characterized by comprising first participates in node, the second participation Node, wherein
Described first participates in node, for sending after the first private key signature of the first enterprise customer in block chain network Transaction prepares broadcast message, wherein it includes: first enterprise customer in block chain network that the transaction, which prepares broadcast message, The first enterprise customer mark and second enterprise of second enterprise customer in block chain network of pending communication transaction use Family mark, the incomplete company information of first enterprise customer and the private key signature by audit server in block chain network Financial statement and first enterprise customer the first identifying code;Described second participates in node, for receiving the friendship After easily preparing broadcast message, first private key is signed using the first public key of first enterprise customer obtained in advance Name verifying identifies enterprise customer of the own node in block chain network and second enterprise customer if being verified Mark compares, if knowing, the two is identical, according to the local block chain account book of the node identification of audit server inquiry, obtains Public key corresponding with the node identification of the audit server is taken, signature is carried out to the financial statement using the public key and is tested Card;
Described second participates in node, if being also used to pass through the verification of financial statement using the public key, according to logical in advance Whether the complete company information for crossing first enterprise customer that non-block chain network obtains detects the incomplete company information All correct, if knowing, the incomplete company information is all correct, according to preset one-way function to first enterprise The complete company information of user calculates, and obtains the second identifying code of first enterprise customer, wherein the complete enterprise Information is identical as the company information type of the incomplete company information;
Described second participates in node, is also used to the first identifying code described in comparison and second identifying code, if knowing, the two is identical, Then the authentication of first enterprise customer is passed through, and participates in node feeding back to described first and is used comprising second enterprise The transaction of family mark is ready to respond to.
7. system as claimed in claim 6, which is characterized in that
Described second participates in node, is also used to after receiving the transaction and preparing after broadcast message, determines incomplete enterprise The company information type of information, and it is obtaining first enterprise customer with the company information type by non-block chain network Corresponding complete company information.
8. system as claimed in claim 6, which is characterized in that
Described first participates in node, is also used to send after the first private key signature of the first enterprise customer in block chain network Transaction prepare broadcast message before, node is participated in described second by non-block chain network and sends first enterprise customer Complete company information, and record pair of second enterprise customer mark and the company information type of the complete company information It should be related to, to generate first enterprise customer's according to the corresponding relationship when sending the transaction preparation broadcast message Incomplete company information.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5 Block chain real name communication method for secret protection.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The method for secret protection such as block chain real name as claimed in any one of claims 1 to 5 communication is realized when being executed by processor.
CN201810900976.2A 2018-08-09 2018-08-09 Privacy protection method and system for block chain real-name communication Active CN109102404B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810900976.2A CN109102404B (en) 2018-08-09 2018-08-09 Privacy protection method and system for block chain real-name communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810900976.2A CN109102404B (en) 2018-08-09 2018-08-09 Privacy protection method and system for block chain real-name communication

Publications (2)

Publication Number Publication Date
CN109102404A true CN109102404A (en) 2018-12-28
CN109102404B CN109102404B (en) 2021-07-30

Family

ID=64849189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810900976.2A Active CN109102404B (en) 2018-08-09 2018-08-09 Privacy protection method and system for block chain real-name communication

Country Status (1)

Country Link
CN (1) CN109102404B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149335A (en) * 2019-05-24 2019-08-20 众安信息技术服务有限公司 Establish the method and apparatus of the home zone for the protection of block chain data-privacy
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN110751485A (en) * 2019-10-28 2020-02-04 腾讯科技(深圳)有限公司 Data processing method and equipment
CN111050326A (en) * 2019-11-28 2020-04-21 泰康保险集团股份有限公司 Short message verification method, device, equipment and medium based on block chain
CN111080292A (en) * 2019-11-25 2020-04-28 支付宝(杭州)信息技术有限公司 Method and device for acquiring block chain transaction signature data
CN111815272A (en) * 2020-06-30 2020-10-23 平安国际智慧城市科技股份有限公司 Application auditing method and device, electronic equipment and storage medium
CN113095937A (en) * 2021-03-31 2021-07-09 携程商旅信息服务(上海)有限公司 Bill generation method, system, equipment and storage medium based on enterprise WeChat

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978855A (en) * 2016-04-18 2016-09-28 南开大学 System and method for protecting personal information security in real-name system
CN107146157A (en) * 2017-04-30 2017-09-08 杭州复杂美科技有限公司 Block chain wallet prepays consumption system
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN107330681A (en) * 2017-06-27 2017-11-07 中链科技有限公司 A kind of method and apparatus of exchange hour for being used to determine to merchandise outside block chain chain
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107423333A (en) * 2017-04-21 2017-12-01 博大莱哲科技(北京)有限公司 A kind of real name identification method and device
US20170352027A1 (en) * 2016-06-07 2017-12-07 Cornell University Authenticated data feed for blockchains
CN107453865A (en) * 2017-07-18 2017-12-08 众安信息技术服务有限公司 A kind of multiparty data sharing method and system for protecting data transmission source privacy
CN107682378A (en) * 2017-11-22 2018-02-09 国民认证科技(北京)有限公司 A kind of real name identification method and system based on block chain
CN108229926A (en) * 2018-01-31 2018-06-29 深圳慧通商务有限公司 Business accounting method and relevant apparatus
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978855A (en) * 2016-04-18 2016-09-28 南开大学 System and method for protecting personal information security in real-name system
US20170352027A1 (en) * 2016-06-07 2017-12-07 Cornell University Authenticated data feed for blockchains
CN107423333A (en) * 2017-04-21 2017-12-01 博大莱哲科技(北京)有限公司 A kind of real name identification method and device
CN107146157A (en) * 2017-04-30 2017-09-08 杭州复杂美科技有限公司 Block chain wallet prepays consumption system
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN107330681A (en) * 2017-06-27 2017-11-07 中链科技有限公司 A kind of method and apparatus of exchange hour for being used to determine to merchandise outside block chain chain
CN107453865A (en) * 2017-07-18 2017-12-08 众安信息技术服务有限公司 A kind of multiparty data sharing method and system for protecting data transmission source privacy
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107682378A (en) * 2017-11-22 2018-02-09 国民认证科技(北京)有限公司 A kind of real name identification method and system based on block chain
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain
CN108229926A (en) * 2018-01-31 2018-06-29 深圳慧通商务有限公司 Business accounting method and relevant apparatus

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
NING ZHANG 等: "Using Blockchain to Protect Personal Privacy in the Scenario of Online Taxi-hailing", 《INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL》 *
RYAN HENRY 等: "Blockchain Access Privay:Challenges and Directions", 《IEEE SECURITY & PRIVACY》 *
唐盛区块链: "区块链隐私保护的两大"保镖"", 《HTTPS://WWW.SOHU.COM/A/145403666_694835》 *
李兆森 等: "基于区块链的电子数据存证应用研究", 《软件》 *
李鸣 等: "区块链标准化现状及思路", 《中国信息安全》 *
梅颖: "安全存储医疗记录的区块链方法研究", 《江西师范大学学报(自然科学版)》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149335A (en) * 2019-05-24 2019-08-20 众安信息技术服务有限公司 Establish the method and apparatus of the home zone for the protection of block chain data-privacy
CN110149335B (en) * 2019-05-24 2022-06-21 众安信息技术服务有限公司 Method and equipment for establishing private area for block chain data privacy protection
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN110751485A (en) * 2019-10-28 2020-02-04 腾讯科技(深圳)有限公司 Data processing method and equipment
CN110751485B (en) * 2019-10-28 2021-08-17 腾讯科技(深圳)有限公司 Data processing method and equipment
CN111080292A (en) * 2019-11-25 2020-04-28 支付宝(杭州)信息技术有限公司 Method and device for acquiring block chain transaction signature data
CN111050326A (en) * 2019-11-28 2020-04-21 泰康保险集团股份有限公司 Short message verification method, device, equipment and medium based on block chain
CN111050326B (en) * 2019-11-28 2023-08-25 泰康保险集团股份有限公司 Block chain-based short message verification method, device, equipment and medium
CN111815272A (en) * 2020-06-30 2020-10-23 平安国际智慧城市科技股份有限公司 Application auditing method and device, electronic equipment and storage medium
CN113095937A (en) * 2021-03-31 2021-07-09 携程商旅信息服务(上海)有限公司 Bill generation method, system, equipment and storage medium based on enterprise WeChat
CN113095937B (en) * 2021-03-31 2022-10-28 携程商旅信息服务(上海)有限公司 Bill generation method, system, equipment and storage medium based on enterprise WeChat

Also Published As

Publication number Publication date
CN109102404B (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN109102404A (en) The method for secret protection and system of block chain real name communication
Zheng et al. Blockchain challenges and opportunities: A survey
CN108960832A (en) The method for secret protection and system of block chain real name communication
Soni et al. A comprehensive survey on blockchain: Working, security analysis, privacy threats and potential applications
CN106485167B (en) Credit recording system and method based on block chain
Moreno-Sanchez et al. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network
CN109636599A (en) License block chain secret protection and monitoring and managing method based on group ranking
CN108876374A (en) The network identity certificate authentication method and system of block chain
CN109274501A (en) License block chain method for secret protection based on Proxy Signature
CN108418689A (en) A kind of the zero-knowledge proof method and medium of suitable block chain secret protection
CN111770198B (en) Information sharing method, device and equipment
CN108900507A (en) Block chain real name identification method and system
CN113781073B (en) Subsidizing method capable of hiding real names based on matrix alliance chain
ul Hassan et al. Blockchain and the future of the internet: a comprehensive review
CN108880832A (en) Block chain real name identification method and system
US20220253813A1 (en) Cryptographicaly secured hybrid (on and off blockchain) cryptocurrency system
Jeon et al. RMBC: Randomized mesh blockchain using DBFT consensus algorithm
CN111444267A (en) Government information sharing platform and method based on block chain
CN111339550A (en) Comment information credibility method based on block chain technology
Suryanarayana et al. Architectural support for trust models in decentralized applications
CN114548989A (en) Rights and interests management system based on NFR
CN112347517A (en) KYC compliance supervision system based on multi-party safety calculation
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CN110321730A (en) A kind of method, block chain node and the storage medium of operation data processing
CN111698254B (en) Alliance chain Baas platform building method based on sharing organization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant