CN109102404A - The method for secret protection and system of block chain real name communication - Google Patents
The method for secret protection and system of block chain real name communication Download PDFInfo
- Publication number
- CN109102404A CN109102404A CN201810900976.2A CN201810900976A CN109102404A CN 109102404 A CN109102404 A CN 109102404A CN 201810900976 A CN201810900976 A CN 201810900976A CN 109102404 A CN109102404 A CN 109102404A
- Authority
- CN
- China
- Prior art keywords
- enterprise customer
- node
- company information
- block chain
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses the method for secret protection and system of a kind of communication of block chain real name, wherein method includes: that the first participation node sends the preparation broadcast message of the transaction after the first private key signature of the first enterprise customer in block chain network;Second participation node receives transaction and prepares after broadcasting the message, signature verification is carried out to the first private key using the first public key of the first enterprise customer, if being verified, then by own node compared with enterprise customer's mark in block chain network is identified with the second enterprise customer, if knowing, the two is identical, then the complete company information of the first enterprise customer obtained by non-block chain network is calculated, obtain the second identifying code of the first enterprise customer, if knowing, the two is identical, then determine that incomplete company information is all correct, and it is ready to respond to the transaction that the first participation node feeding back includes the second enterprise customer mark.The privacy information of the block Lian Zhong enterprise node in real name communication is protected as a result,.
Description
Technical field
A kind of communicated the present invention relates to field of communication technology more particularly to block chain real name method for secret protection and it is
System.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node
Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain
The corresponding enterprise customer of a node implements, and cannot be forged by other enterprise customers, that is to say, that the implementation of block chain network
Environment and actual life are separation, it is difficult to which to node in real life, corresponding enterprise customer is managed, for example, one
Nodes ' behavior in denier block chain network can not be traced, there are illegal activities, such as money laundering etc. even by national CA completely
The certificate that (Certificate Authority, certificate authority) organ provides, can only also prove network identity, and can not
Prove its real identification, also, block chain network is backed up when being traded generally for enabling each to participate in node
Transaction, All Activity data be all it is open and transparent, this is for many is not intended to the enterprise's nodes for exposing privacy information
One important application pain spot, thus, the protection for how balancing the real-name authentication management and privacy to enterprise's node becomes urgently
Problem to be solved.
Summary of the invention
The present invention provides the method for secret protection and system of a kind of block chain real name communication, to solve in the prior art, enterprise
The technical issues of balancing is difficult between the real-name authentication management of industry node and the protection of privacy.
First embodiment of the invention provides a kind of method for secret protection of block chain real name communication, comprising: first participates in section
Point sends the transaction after the first private key signature of the first enterprise customer in block chain network and prepares broadcast message, wherein
It includes: first enterprise customer mark of first enterprise customer in block chain network that the transaction, which prepares broadcast message, with
And second enterprise customer mark of the second enterprise customer of pending communication transaction in block chain network, first enterprise uses
The incomplete company information at family and by the financial statement of the private key signature of audit server in block chain network and described the
The first identifying code of one enterprise customer;Second participation node receives the transaction and prepares after broadcasting the message, and obtains using preparatory
The first public key of first enterprise customer signature verification carried out to first private key if being verified save itself
Point is compared with enterprise customer's mark in block chain network is identified with second enterprise customer, if knowing identical, the root of the two
According to the local block chain account book of the node identification inquiry of the audit server, the node identification with the audit server is obtained
Corresponding public key carries out signature verification to the financial statement using the public key;If described second participates in node described in
Public key passes through the verification of financial statement, then according to first enterprise customer's for first passing through non-block chain network acquisition in advance
Whether complete company information detects the incomplete company information all correct, if knowing the incomplete company information all just
Really, then it is calculated according to complete company information of the preset one-way function to first enterprise customer, obtains described first
The second identifying code of enterprise customer, wherein the company information type of the complete company information and the incomplete company information
It is identical;Described second participates in node first identifying code and second identifying code, if knowing, the two is identical, to institute
The authentication for stating the first enterprise customer passes through, and participates in node feeding back to described first and identify comprising second enterprise customer
Transaction be ready to respond to.
Second embodiment of the invention provides a kind of intimacy protection system of block chain real name communication, comprising: first participates in section
Point, second participate in node, wherein described first participates in node, passes through the first enterprise customer for sending in block chain network
The first private key signature after transaction prepare broadcast message, wherein it includes: first enterprise that the transaction, which prepares to broadcast the message,
Second enterprise customer of first enterprise customer mark and pending communication transaction of the user in block chain network is in block chain
The second enterprise customer in network identifies, and examines in the incomplete company information and process block chain network of first enterprise customer
Count the financial statement of the private key signature of server and the first identifying code of first enterprise customer;Described second participates in section
Point prepares after broadcasting the message for receiving the transaction, using the first public key of first enterprise customer obtained in advance
Signature verification is carried out to first private key, if being verified, enterprise customer of the own node in block chain network is marked
Know compared with second enterprise customer mark, if knowing, the two is identical, is looked into according to the node identification of the audit server
Local block chain account book is ask, public key corresponding with the node identification of the audit server is obtained, using the public key to institute
It states financial statement and carries out signature verification;Described second participates in node, if being also used to test the financial statement using the public key
Card passes through, then according to the complete company information detection for first passing through first enterprise customer that non-block chain network obtains in advance
Whether incomplete company information is all correct, if knowing, the incomplete company information is all correct, according to preset unidirectional
Function calculates the complete company information of first enterprise customer, obtains the second verifying of first enterprise customer
Code, wherein the complete company information is identical as the company information type of the incomplete company information;Described second participates in section
Point is also used to the first identifying code described in comparison and second identifying code, if knowing, the two is identical, uses first enterprise
The authentication at family passes through, and participating in node feeding back to described first includes the transaction preparation sound that second enterprise customer identifies
It answers.
Third embodiment of the invention provides a kind of computer equipment, comprising: memory, processor and storage are on a memory
And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation
The method for secret protection of block chain real name communication described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey
Sequence realizes the secret protection of the block chain real name communication as described in above-described embodiment when the computer program is executed by processor
Method.
Technical solution provided in an embodiment of the present invention can include the following benefits:
When first participates in node and the second participation node communication, first participates in the incomplete enterprise's letter of node broadcasts
Breath, the company information of the first enterprise customer is known to avoid other nodes, avoids the privacy leakage of the first enterprise customer, meanwhile,
Second participates in the complete company information of available first enterprise customer of node, and based on the complete company information and incomplete enterprise
Industry information carry out the first enterprise customer real-name authentication, thus to first participation node carry out real-name authentication with guarantee convenient for pair
On the basis of the legitimacy of transaction is supervised, the privacy information of the first participation node is protected.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram of the intimacy protection system of block chain real name communication according to an embodiment of the invention;
Fig. 2 is the interaction schematic diagram of the intimacy protection system of block chain real name communication according to an embodiment of the invention;
Fig. 3 is the interaction signal of the intimacy protection system of block chain real name communication in accordance with another embodiment of the present invention
Figure;
Fig. 4 is the interaction signal of the intimacy protection system of the block chain real name communication of another embodiment according to the present invention
Figure;
Fig. 5 is the flow chart of the method for secret protection of block chain real name communication according to an embodiment of the invention;
Fig. 6 is the application scenarios signal of the method for secret protection of block chain real name communication according to an embodiment of the invention
Figure.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in
Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in
The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network
The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth of carrying entity world
It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
Thus, authentication in order to solve the above-mentioned technical problem, in the present invention is provided for user on line, so that block chain
Participant can be appeared in block chain in a manner of real name, thus, be conducive to the real information based on user to participation node
Management, and the legitimacy of block chain network environment is guaranteed.
As a result, when participating in node application addition block chain network, real name is carried out to the corresponding living body user of node is participated in
Certification, under the system of system of real name, to many illegal nodes ' behaviors, for example, all being formd effectively thoroughly the problem of intelligent contract
Bright management environment maintains the legitimacy and authenticity of the operation of block chain network.
Further, based on above embodiments it is found that block chain network is being added in all block chain nodes in block chain
Shi Jun completes real-name authentication, and the working principle based on block chain is it is found that in order to enable the node in block chain network can
Transaction to be backed up, all transaction are all open and clear, and under many application scenarios, participate in the hope of node itself certainly
Oneself account privacy information is protected, and especially to some enterprise institutions, account privacy information, which can obtain protection, makes its opponent
Company does not know that its business information becomes tight demand.
In order to be protected to the privacy information between enterprise's node, the present invention mentions on the basis of realizing real-name authentication
The method for secret protection and system of a kind of block chain real name communication are supplied, wherein hidden for the ease of communicating to block chain real name
The explanation of private guard method, the present invention are first described the intimacy protection system of block chain real name communication.
Fig. 1 is the structural schematic diagram of the intimacy protection system of block chain real name communication according to an embodiment of the invention,
As shown in Figure 1, the intimacy protection system of block chain real name communication includes that the first participation node 110, second participates in node 120,
Wherein, in an embodiment of the present invention, the both sides' node traded is indicated with the first participation node and the second participation node, examined
Consider during real trade, other nodes of non-participating node are only handed over it is only necessary to back up associated transaction data
Easy both sides participate in node realize authentication be can guarantee transaction legitimacy and reliability can be supervisory, thus, in this hair
In bright embodiment, the method for taking a kind of both parties enterprise node to carry out real-name authentication is realized on the basis of real-name authentication
The privacy of upper protection enterprise's node.It is specific as follows:
As shown in Fig. 2, first participates in node in block chain when the first participation node and the second participation node are traded
The transaction after the first private key signature of the first enterprise customer is sent in network and prepares broadcast message (step 1), wherein first
Enterprise customer is the corresponding enterprise customer of the first participation node, generally refers to the stronger enterprise of secret protection demand, transaction is quasi-
Standby broadcast message includes: that first enterprise customer mark and pending communication of first enterprise customer in block chain network are handed over
Second enterprise customer mark of the second easy enterprise customer in block chain network, the incomplete company information of the first enterprise customer
With the first verifying by the financial statement of the private key signature of audit server in block chain network and the first enterprise customer
Code, wherein in step 1, due to broadcast message in broadcast be the first enterprise customer incomplete company information, thus, i.e.,
Make other nontransaction nodes that can not get the real corporate information of the first enterprise customer, thereby ensures that the transaction of transaction enterprise
Record is not known by rival.
In turn, the second participation node is used after receiving transaction and preparing broadcast message using the first enterprise obtained in advance
First public key at family carries out signature verification (step 2) to the first private key, wherein the first public key and the first private key are participated in for first
The authentication of node, the first private key are held by the first participation node oneself, and the first public key is sent to block in the form broadcasted
Chain network, so that communicate with the first participation node second participates in corresponding relationship pair of the node based on the first public key and the first private key
First, which participates in node, carries out authentication.If being verified, enterprise customer of the own node in block chain network is identified
(the step 3) compared with the second enterprise customer mark, whether the node for determining that the first participation node is traded is this node, if
Both know identical, then confirmed the participation node both sides currently to trade, at this time for the ease of the legitimacy of monitoring trading, to the
One, which participates in node, carries out real name authentication.
In the present embodiment, enterprise customer's mark in verifying own node in block chain network and the second enterprise customer
After mark is consistent, then the block chain account book local according to the inquiry of audit server node identification, obtains the section with audit server
The corresponding public key of point identification carries out signature verification to financial statement using public key, determines the whether credible (step of current financial statement
4)。
Further, if the second participation node application public key passes through verification of financial statement, show current financial statement
It is genuine and believable, thus, real-name authentication is carried out to enterprise, is used according to the first enterprise that non-block chain network obtains is first passed through in advance
Whether all the complete company information at family detects incomplete company information correct (step 5), if knowing, incomplete company information is complete
Portion is correct, then further whether the whole company information of verifying is correct, according to preset one-way function to the first enterprise customer's
Complete company information is calculated, and the second identifying code of the first enterprise customer, second identifying code and the first enterprise customer are obtained
Complete company information uniquely corresponds to, but since second identifying code is generated according to one-way function, thus, the second identifying code
The complete company information of the first enterprise customer can not inversely be calculated, wherein complete to look forward to for the ease of subsequent authentication
Industry information (step 6) identical as the company information type of incomplete company information.
In turn, the second participation node compares the first identifying code and the second identifying code, if knowing, the two is identical, looks forward to first
The authentication of industry user passes through, and is ready to respond to the transaction that the first participation node feeding back includes the second enterprise customer mark
(step 7).
In an embodiment of the present invention, as shown in figure 3, on the basis of as shown in Figure 2, in order to further increase verifying
Efficiency, second participates in node, is also used to after receiving transaction and preparing after broadcast message, determines the enterprise of incomplete company information
Industry information type, and believed by the complete enterprise corresponding with company information type that non-block chain network obtains the first enterprise customer
Cease (step 21).
In one embodiment of the invention, as shown in figure 4, on the basis of as shown in Figure 2, in order to further increase pair
First participates in the authentication efficiency of node, and first participates in node, is also used to send in block chain network by the first enterprise
Before transaction after the first private key signature of user prepares broadcast message, node is participated in second by non-block chain network and is sent
The complete company information of first enterprise customer, and record the company information type of the second enterprise customer mark and complete company information
Corresponding relationship, with send trade prepare broadcast message when, according to corresponding relationship generate the first enterprise customer incomplete enterprise
Industry information (step 11).
When being executed for the intimacy protection system of the more detailed block chain real name communication for illustrating the embodiment of the present invention
Details concentrates on area so that the secret protection process that those skilled in the art communicates real name of the present invention is clearer below
The method for secret protection side of block chain real name communication is described.
Fig. 5 is the flow chart of the method for secret protection of block chain real name communication according to an embodiment of the invention, such as Fig. 5
It is shown, this method comprises:
Step 101, the first participation node sends the first private key signature by the first enterprise customer in block chain network
Rear transaction prepares broadcast message, wherein it includes: the of the first enterprise customer in block chain network that transaction, which prepares broadcast message,
Second enterprise customer mark of second enterprise customer of one enterprise customer mark and pending communication transaction in block chain network
Know, the incomplete company information of the first enterprise customer and the finance report by the private key signature of audit server in block chain network
Table and the first identifying code of the first enterprise customer.
Wherein, the authentication that the first public key and the first private key participate in node for first, the first private key are participated in by first
Node is held oneself, and the first public key is sent to block chain network in the form broadcasted, so that the phase communicated with the first participation node
Corresponding relationship of the artis based on the first public key and the first private key participates in node to first and carries out authentication.
In addition, above-mentioned first enterprise customer is corresponding with the first participation node, the corresponding enterprise of the first participation node can be,
First enterprise customer mark can be node ID etc. for indicating node identification of the first participation node in block chain network,
Likewise, the second enterprise customer mark is for indicating node identification of the second participation node in block chain network, it can be section
Point ID etc., the both sides that can orient transaction based on the first enterprise customer mark and the second enterprise customer mark participate in node.First
The company information of enterprise customer can be enterprise name, corporate tax number, the name of legal representative and ID card No., registration
Capital, registered address, Business Registration Number (number of registration 569876654324567), establishment time etc., the first enterprise of mark used
The information of the true identity at family, the incomplete information of the first enterprise customer can be the information of hidden parts company information, for example,
Certain key messages: * * star company, the number of paying taxes 1234***90 are replaced using asterisk.
The first identifying code of first enterprise customer is the complete company information meter according to one-way function to the first enterprise customer
It obtains, wherein the first identifying code and the complete company information of the first enterprise customer uniquely correspond to, and add via one-way function
The first identifying code after close, cannot inversely export the complete company information of the first enterprise customer, even if there is artis acquisition as a result,
To the first identifying code, the complete company information of the first enterprise customer can not be also exported, to ensure that the first enterprise customer's is hidden
Private avoids the rival of the first enterprise customer from finding its trading activity etc., in addition, in an embodiment of the present invention, in order into
One step avoids identifying code from being cracked, and identifying code, which can be, to be calculated by multinomial enterprise's complete information, for example, there is one-way function
Complete Business Name, legal representative's (name+identification card number), registered capital, registered address, enterprise to the first enterprise customer
Multinomial enterprise's complete informations such as industry number of registration (number of registration 569876654324567), establishment time are calculated first and test
Demonstrate,prove code.
Specifically, the first participation node is sent after the first private key signature of the first enterprise customer in block chain network
Transaction prepare broadcast message after, first, can based on the second enterprise customer in the broadcast message identify further orient
The Correspondent Node of transaction;Second, it can be identified based on the first enterprise customer and show its identity in block chain network, in order to
The Correspondent Node of transaction further carries out authentication to first enterprise customer;Third, based on the transmission of the first identifying code, with
Node progress real-name authentication can be participated in first convenient for the Correspondent Node of transaction, convenient for guaranteeing the legitimacy of transaction;
4th, include incomplete company information in broadcast message, gets the incomplete company information even if the node in block chain
The true identity that can not know the first enterprise customer protects the privacy of the first enterprise customer.Wherein, in order to ensure the first enterprise
The personal secrets of user avoid illegal node from deriving complete company information, incomplete enterprise's letter by incomplete company information
Most information that is hiding or masking complete company information or important message part in breath, for example, concealing identity
Latter four etc. for demonstrate,proving number.;5th, in order to avoid not being that other illegal enterprises first enterprise customer that disguises oneself as trades, hand over
Easily prepare in broadcast message to further include by the financial statement of the private key signature of audit server in block chain network as a result, one
Aspect, only enterprise customer itself possess the financial statement, thus, which can be used to confirm that the first enterprise customer's
On the other hand identity can guarantee the authenticity of financial statement via the financial statement after audit server private key signature, avoid
Illegal node forges financial statement, wherein in order to guarantee that the real reliability of company information, financial statement need actual life
In the office with financial audit qualification proof of affixing one's seal, or by there is financial audit qualification in block chain
The financial statement that the private key signature of the corresponding audit server of office is crossed.
Step 102, the second participation node receives transaction and prepares after broadcasting the message, and uses using the first enterprise obtained in advance
First public key at family carries out signature verification to the first private key, if being verified, by enterprise of the own node in block chain network
Compared with industry user identifier is identified with the second enterprise customer, if knowing, the two is identical, is looked into according to the node identification of audit server
Local block chain account book is ask, public key corresponding with the node identification of audit server is obtained, the finance are reported using public key
Table carries out signature verification.
As analyzing above, the first public key and the first private key public key pair each other, thus, the second participation node receives friendship
After easily preparing broadcast message, signature verification is carried out to the first private key using the first public key of the first enterprise customer obtained in advance,
To ensure that transaction broadcast message participates in what node was sent for first, rather than what other nodes illegally pretended were sent etc., into
And if the verification passes, then whether verifying second is participated in node is the current Correspondent Node that communicates of first participation node,
With ensure both parties identity it is correct.
Specifically, second enterprise customer mark and second enterprise use of the node by own node in block chain network are participated in
Family mark compares, and to ensure that the first participation node is the node communicated with, if being verified, shows current first ginseng
It is that second communicated with participates in node with node, after transaction node both sides confirmation, not in order to further ensure financial statement
It is to forge, avoids illegal transaction, further the authenticity of financial statement is verified.
Specifically, inquiring local block chain account book, acquisition and audit server according to the node identification of audit server
Corresponding public key, the public key and private key are a pair of secret keys pair, can be used for verifying the identity of audit server, using public key to wealth
Business report carries out signature verification, to ensure the authenticity of financial statement.
Step 103, if the second participation node passes through verification of financial statement using public key, basis first passes through non-block in advance
Whether the incomplete company information of complete company information detection for the first enterprise customer that chain network obtains is all correct, if knowing non-
Complete company information is all correct, then is counted according to complete company information of the preset one-way function to the first enterprise customer
It calculates, obtains the second identifying code of the first enterprise customer, wherein the company information class of complete company information and incomplete company information
Type is identical.
Step 104, the second participation node compares the first identifying code and the second identifying code, if both know it is identical, to the
The authentication of one enterprise customer passes through, and participating in node feeding back to first includes the transaction preparation sound that the second enterprise customer identifies
It answers.
Specifically, if the second participation node passes through verification of financial statement using public key, i.e., public key and financial statement are signed
Private key matching, then show that financial statement is true and reliable, thus, second participate in node to first participate in node it is corresponding first enterprise
Whether industry user carries out real-name authentication, all correct according to the incomplete company information of complete company information detection, if knowing non-complete
Whole company information is all correct, then is further carried out according to complete company information of the preset one-way function to the first enterprise customer
It calculates, obtains the second identifying code of the first enterprise customer, compare the first identifying code and the second identifying code, as described above,
First identifying code and the second identifying code and the complete company information of enterprise customer are uniquely corresponding, thus, if the two is identical, table
The bright authentication to the first enterprise customer passes through, so that participating in node feeding back to first includes the friendship that the second enterprise customer identifies
It is easily ready to respond to, to allow the first participation node to trade with the second participation node.
In this example, it is not all of correctly if detecting incomplete company information according to complete company information, such as phase
With the information of position, there are inconsistent, it is determined that and incomplete information is incorrect, thus, determine the real-name authentication of the first participation node
Failure, refusal are communicated with the first participation node.Alternatively, the first identifying code and the second identifying code be not identical, it is determined that complete
Information is incorrect, thus, determine the real-name authentication failure of the first participation node, refusal is communicated with the first participation node.
It is emphasized that in this example, being detected first than more complete company information and whether incomplete company information
Unanimously carry out the preliminary real-name authentication of carry out for participating in node to first, after consistent, by comparing the first identifying code and the second verifying
Whether code identical to participate in node to first and carries out further real-name authentication, as a result, when complete company information detect with it is non-complete
When whole company information is inconsistent, it is confirmed that first participates in the failure of node real-name authentication, the first identifying code and the are not needed to compare again
Whether two identifying codes are consistent, improve real-name authentication efficiency.
In an embodiment of the present invention, in order to protect the personal secrets of the first participation node, the first enterprise customer's is complete
Company information does not store in the higher block chain network of transparency, and is stored in the relevant position of non-block chain network, than
Such as, it is stored in the corresponding equipment of the first participation node, second participates in node can be by way of communicating from first face-to-face
Participate in the complete company information that corresponding first enterprise customer is got in the corresponding equipment of node.
For the ease of the subsequent real-name authentication for participating in node to first, complete company information in the present embodiment with it is incomplete
Company information type is identical, for example, complete company information is that then incomplete company information is also corporate tax to corporate tax information
Information.
It should be noted that in practical applications, according to the difference of application scenarios, realize complete company information with it is incomplete
The identical mode of company information type is different, illustrates as follows:
As an example:
Second participation node determines the company information type of incomplete company information, for example, according to the enterprise of incomplete information
Industry information type carries out keyword match, determines the company information type of incomplete company information, in turn, passes through non-block link network
Network obtains complete company information corresponding with company information type.
As another example:
First participation node actively sends the complete company information received with the second participation node to the second participation node
The corresponding incomplete information of type is sent in block chain network in the first participation node by the first enterprise in this example
Before transaction after the first private key signature of user prepares broadcast message, first participates in node by non-block chain network to second
The complete company information that node sends the first enterprise customer is participated in, and records the second enterprise customer mark and complete company information
The corresponding relationship of company information type, to generate the first enterprise according to corresponding relationship and use when sending transaction preparation broadcast message
The incomplete company information at family.Complete enterprise corresponding with the second enterprise customer mark is got according to the corresponding relationship to believe
The company information type of breath generates the consistent incomplete company information of company information type with the complete company information in turn
Type.
As another example:
The friendship after the first private key signature of the first enterprise customer is sent in block chain network in the first participation node
Before easily preparing broadcast message, first, which participates in node, sends transaction verification broadcast message by block chain network, wherein transaction is tested
Card broadcast message include: the first enterprise customer the first public key and the first enterprise customer company information type so that other
The enterprise customer for carrying out communication interaction with the first enterprise customer passes through non-block according to the company information type of the first enterprise customer
Chain network obtains the complete company information of the first enterprise customer, thus, first participates in its enterprise to be sent of node active broadcast
The information type of information is sent with guaranteeing that the second participation node communicated with the first participation node is got with the first enterprise customer
Incomplete company information the corresponding complete company information of company information type.
In order to enable those skilled in the art more understands that the privacy of the block chain real name communication of the embodiment of the present invention is protected
Maintaining method is illustrated below with reference to specifically application scenarios:
In this example, as shown in fig. 6, it is enterprise customer B that the first participation node, which is corresponding first enterprise customer, second
Participating in the corresponding enterprise customer of node is enterprise customer A, and company information includes Business Name, legal representative, registered capital, note
Time, financial statement, the number of paying taxes, are set up at Business Registration Number in volume address, when enterprise customer A and enterprise customer B will trade
It waits, other real-life channels that enterprise customer A passes through non-block chain first obtain the complete company name of enterprise customer B
Title, registered capital, registered address, Business Registration Number, sets up time, the number of paying taxes at legal representative.In turn, enterprise customer A passes through
One-way function F calculates the second identifying code, the second identifying code=F (Business Name (Hai great Xing stationery company), legal representative
(name+identification card number, part name horse rise greatly+320322456812345678), registered capital (20000), registered address are (deep
The Nanshan District Zhen Shi HuaLian Building), Business Registration Number (569876654324567), set up December 1 2002 time), the number of paying taxes
(560808199001021X)), for example one-way function F is Hash function, can only pass through complete corporate tax number and enterprise's name
Title calculates the second identifying code, and in this example, the second identifying code of calculating is 67890.
In turn, enterprise customer B sends transaction in block chain and prepares to broadcast the message, and it includes: enterprise that transaction, which prepares broadcast message,
The enterprise customer of industry user A identifies, Business Name (the big * * * in sea of the incomplete company information of enterprise customer B oneself, that is, simple
Company), legal representative's (name+identification card number, part name horse * rise+3203224568********), registered capital
The time (2002, is set up at Business Registration Number (569876654324***) in (200**), registered address (area * * of the Shenzhen mansion * *)
Year * month * day), the number of paying taxes (56080819900****X) and the first identifying code: 67890, the transaction broadcast the message in further include
The financial statement by the private key signature of audit server in block chain network of enterprise customer B.The broadcast message passes through enterprise
It is broadcast out again after the private key signature of user B.
Enterprise customer A has received the broadcast message of enterprise customer B, whether just to first verify that the private key signature of enterprise customer B
Really.If correct, enterprise customer A learns enterprise customer according to the mark of the enterprise customer A of the searching counterparty in the broadcast message
B, which is found, oneself to trade, thus according to the local block chain account book of the node identification inquiry of audit server, obtain with
The corresponding public key of the node identification of audit server carries out signature verification to financial statement using public key, if using public key to wealth
Business report is verified, then according to the complete public affairs for the enterprise customer B for first passing through the block chain that non-block chain network obtains in advance
Take charge of title (Hai great Xing stationery company), legal representative (name+identification card number, part name horse rises greatly+
320322456812345678), registered capital (20000), registered address (Nanshan District, Shenzhen City HuaLian Building), Business Registration Number
(569876654324567), set up December 1 2002 time), financial report (not showing herein), the number of paying taxes in recent years
(560808199001021X) and omit that treated incomplete Business Name (the big * * * company in sea), legal representative's (name
+ identification card number, part name horse * rise+3203224568********), registered capital (200**), registered address (Shenzhen * *
The area mansion * *), Business Registration Number (569876654324***), set up time (* month * day in 2002), the number of paying taxes
Whether (56080819900****X) be consistent, if the information such as the number of the non-omission numerical digit of the two and Chinese character are completely the same, looks forward to
Industry user A is calculated according to complete company information of the individual event function to enterprise B, obtains the second verifying of the first enterprise customer
Code finds first identifying code according to the first identifying code in the broadcast message and with the complete Business Name of enterprise customer B, method
Determine representative, registered capital, registered address, Business Registration Number, set up time, the number of paying taxes and calculated according to one-way function
The second identifying code of enterprise customer B be consistent, if unanimously, illustrating simple Business Name in the broadcast message, method
Determine representative, registered capital, registered address, Business Registration Number, set up time, the number of paying taxes and corresponded to real-life enterprise and use
Family B.Then enterprise customer B real-name authentication success, enterprise customer A can be trusted and enterprise customer B trade.
In conclusion the method for secret protection that the block chain real name of the embodiment of the present invention communicates, first participate in node and
When the second participation node communication, first participates in the incomplete company information of node broadcasts, knows first to avoid other nodes
The company information of enterprise customer avoids the privacy leakage of the first enterprise customer, meanwhile, second participates in available first enterprise of node
The complete company information of industry user, and the reality based on the complete company information and incomplete company information the first enterprise customer of progress
Thus name certification is carrying out real-name authentication to the first participation node to guarantee the basis convenient for being supervised to the legitimacy of transaction
On, protect the privacy information of the first participation node.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program
The now method for secret protection of the block chain real name communication as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon
Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor
The method for secret protection of name communication.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite
Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright
Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two
It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with
It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists
Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of
First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below "
One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, modifies, replacement and variant.
Claims (10)
1. a kind of method for secret protection of block chain real name communication characterized by comprising
First participation node sends the preparation of the transaction after the first private key signature of the first enterprise customer in block chain network
Broadcast message, wherein it includes: first enterprise of first enterprise customer in block chain network that the transaction, which prepares broadcast message,
Second enterprise customer mark of second enterprise customer of industry user identifier and pending communication transaction in block chain network,
The incomplete company information of first enterprise customer and the finance for passing through the private key signature of audit server in block chain network
Report and the first identifying code of first enterprise customer;
Second participation node receives the transaction and prepares after broadcasting the message, using first enterprise customer's obtained in advance
First public key carries out signature verification to first private key, if being verified, by enterprise of the own node in block chain network
Compared with industry user identifier is identified with second enterprise customer, if knowing, the two is identical, according to the section of the audit server
The local block chain account book of point identification inquiry, obtains public key corresponding with the node identification of the audit server, using described
Public key carries out signature verification to the financial statement;
If the second participation node passes through the verification of financial statement using the public key, basis first passes through non-block in advance
Whether the complete company information detection incomplete company information for first enterprise customer that chain network obtains is all correct,
If knowing, the incomplete company information is all correct, according to preset one-way function to the complete of first enterprise customer
Company information is calculated, and the second identifying code of first enterprise customer is obtained, wherein the complete company information with it is described
The company information type of incomplete company information is identical;
Described second participates in node first identifying code and second identifying code, if knowing, the two is identical, to institute
The authentication for stating the first enterprise customer passes through, and participates in node feeding back to described first and identify comprising second enterprise customer
Transaction be ready to respond to.
2. the method as described in claim 1, which is characterized in that receive the transaction in the second participation node and prepare extensively
After broadcasting after message, further includes:
The second participation node determines the company information type of incomplete company information, and obtains institute by non-block chain network
State the complete company information corresponding with the company information type of the first enterprise customer.
3. the method as described in claim 1, which is characterized in that send warp in block chain network in the first participation node
Transaction after crossing the first private key signature of the first enterprise customer prepares before broadcast message, further includes:
The first participation node sends first enterprise customer's to the second participation node by non-block chain network
Complete company information, and it is corresponding with the company information type of the complete company information to record the second enterprise customer mark
Relationship, to generate the non-of first enterprise customer according to the corresponding relationship when sending the transaction preparation broadcast message
Complete company information.
4. the method as described in claim 1, which is characterized in that send warp in block chain network in the first participation node
Transaction after crossing the first private key signature of the first enterprise customer prepares before broadcast message, further includes:
Described first, which participates in node, sends transaction verification broadcast message by block chain network, wherein the transaction verification broadcast
Message includes: the first public key of first enterprise customer and the company information type of first enterprise customer, so that its
He and first enterprise customer carry out the enterprise customer of communication interaction according to the company information type of first enterprise customer,
The complete company information of first enterprise customer is obtained by non-block chain network.
5. the method as described in claim 1, which is characterized in that further include:
If the second participation node knows that the incomplete company information is not all of correctly, alternatively, first identifying code
It is not identical with second identifying code, it is determined that fail to the authentication of first enterprise customer, and join to described first
The transaction for including second enterprise customer mark with node feeding back refuses to respond.
6. a kind of intimacy protection system of block chain real name communication characterized by comprising first participates in node, the second participation
Node, wherein
Described first participates in node, for sending after the first private key signature of the first enterprise customer in block chain network
Transaction prepares broadcast message, wherein it includes: first enterprise customer in block chain network that the transaction, which prepares broadcast message,
The first enterprise customer mark and second enterprise of second enterprise customer in block chain network of pending communication transaction use
Family mark, the incomplete company information of first enterprise customer and the private key signature by audit server in block chain network
Financial statement and first enterprise customer the first identifying code;Described second participates in node, for receiving the friendship
After easily preparing broadcast message, first private key is signed using the first public key of first enterprise customer obtained in advance
Name verifying identifies enterprise customer of the own node in block chain network and second enterprise customer if being verified
Mark compares, if knowing, the two is identical, according to the local block chain account book of the node identification of audit server inquiry, obtains
Public key corresponding with the node identification of the audit server is taken, signature is carried out to the financial statement using the public key and is tested
Card;
Described second participates in node, if being also used to pass through the verification of financial statement using the public key, according to logical in advance
Whether the complete company information for crossing first enterprise customer that non-block chain network obtains detects the incomplete company information
All correct, if knowing, the incomplete company information is all correct, according to preset one-way function to first enterprise
The complete company information of user calculates, and obtains the second identifying code of first enterprise customer, wherein the complete enterprise
Information is identical as the company information type of the incomplete company information;
Described second participates in node, is also used to the first identifying code described in comparison and second identifying code, if knowing, the two is identical,
Then the authentication of first enterprise customer is passed through, and participates in node feeding back to described first and is used comprising second enterprise
The transaction of family mark is ready to respond to.
7. system as claimed in claim 6, which is characterized in that
Described second participates in node, is also used to after receiving the transaction and preparing after broadcast message, determines incomplete enterprise
The company information type of information, and it is obtaining first enterprise customer with the company information type by non-block chain network
Corresponding complete company information.
8. system as claimed in claim 6, which is characterized in that
Described first participates in node, is also used to send after the first private key signature of the first enterprise customer in block chain network
Transaction prepare broadcast message before, node is participated in described second by non-block chain network and sends first enterprise customer
Complete company information, and record pair of second enterprise customer mark and the company information type of the complete company information
It should be related to, to generate first enterprise customer's according to the corresponding relationship when sending the transaction preparation broadcast message
Incomplete company information.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage
The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5
Block chain real name communication method for secret protection.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The method for secret protection such as block chain real name as claimed in any one of claims 1 to 5 communication is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810900976.2A CN109102404B (en) | 2018-08-09 | 2018-08-09 | Privacy protection method and system for block chain real-name communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810900976.2A CN109102404B (en) | 2018-08-09 | 2018-08-09 | Privacy protection method and system for block chain real-name communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109102404A true CN109102404A (en) | 2018-12-28 |
CN109102404B CN109102404B (en) | 2021-07-30 |
Family
ID=64849189
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810900976.2A Active CN109102404B (en) | 2018-08-09 | 2018-08-09 | Privacy protection method and system for block chain real-name communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109102404B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149335A (en) * | 2019-05-24 | 2019-08-20 | 众安信息技术服务有限公司 | Establish the method and apparatus of the home zone for the protection of block chain data-privacy |
CN110493261A (en) * | 2019-09-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Identifying code acquisition methods, client, server and storage medium based on block chain |
CN110751485A (en) * | 2019-10-28 | 2020-02-04 | 腾讯科技(深圳)有限公司 | Data processing method and equipment |
CN111050326A (en) * | 2019-11-28 | 2020-04-21 | 泰康保险集团股份有限公司 | Short message verification method, device, equipment and medium based on block chain |
CN111080292A (en) * | 2019-11-25 | 2020-04-28 | 支付宝(杭州)信息技术有限公司 | Method and device for acquiring block chain transaction signature data |
CN111815272A (en) * | 2020-06-30 | 2020-10-23 | 平安国际智慧城市科技股份有限公司 | Application auditing method and device, electronic equipment and storage medium |
CN113095937A (en) * | 2021-03-31 | 2021-07-09 | 携程商旅信息服务(上海)有限公司 | Bill generation method, system, equipment and storage medium based on enterprise WeChat |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105978855A (en) * | 2016-04-18 | 2016-09-28 | 南开大学 | System and method for protecting personal information security in real-name system |
CN107146157A (en) * | 2017-04-30 | 2017-09-08 | 杭州复杂美科技有限公司 | Block chain wallet prepays consumption system |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
CN107330681A (en) * | 2017-06-27 | 2017-11-07 | 中链科技有限公司 | A kind of method and apparatus of exchange hour for being used to determine to merchandise outside block chain chain |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
CN107423333A (en) * | 2017-04-21 | 2017-12-01 | 博大莱哲科技(北京)有限公司 | A kind of real name identification method and device |
US20170352027A1 (en) * | 2016-06-07 | 2017-12-07 | Cornell University | Authenticated data feed for blockchains |
CN107453865A (en) * | 2017-07-18 | 2017-12-08 | 众安信息技术服务有限公司 | A kind of multiparty data sharing method and system for protecting data transmission source privacy |
CN107682378A (en) * | 2017-11-22 | 2018-02-09 | 国民认证科技(北京)有限公司 | A kind of real name identification method and system based on block chain |
CN108229926A (en) * | 2018-01-31 | 2018-06-29 | 深圳慧通商务有限公司 | Business accounting method and relevant apparatus |
CN108234478A (en) * | 2017-12-29 | 2018-06-29 | 重庆小犀智能科技有限公司 | A kind of personal credit information share system and method based on block chain |
-
2018
- 2018-08-09 CN CN201810900976.2A patent/CN109102404B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105978855A (en) * | 2016-04-18 | 2016-09-28 | 南开大学 | System and method for protecting personal information security in real-name system |
US20170352027A1 (en) * | 2016-06-07 | 2017-12-07 | Cornell University | Authenticated data feed for blockchains |
CN107423333A (en) * | 2017-04-21 | 2017-12-01 | 博大莱哲科技(北京)有限公司 | A kind of real name identification method and device |
CN107146157A (en) * | 2017-04-30 | 2017-09-08 | 杭州复杂美科技有限公司 | Block chain wallet prepays consumption system |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
CN107330681A (en) * | 2017-06-27 | 2017-11-07 | 中链科技有限公司 | A kind of method and apparatus of exchange hour for being used to determine to merchandise outside block chain chain |
CN107453865A (en) * | 2017-07-18 | 2017-12-08 | 众安信息技术服务有限公司 | A kind of multiparty data sharing method and system for protecting data transmission source privacy |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
CN107682378A (en) * | 2017-11-22 | 2018-02-09 | 国民认证科技(北京)有限公司 | A kind of real name identification method and system based on block chain |
CN108234478A (en) * | 2017-12-29 | 2018-06-29 | 重庆小犀智能科技有限公司 | A kind of personal credit information share system and method based on block chain |
CN108229926A (en) * | 2018-01-31 | 2018-06-29 | 深圳慧通商务有限公司 | Business accounting method and relevant apparatus |
Non-Patent Citations (6)
Title |
---|
NING ZHANG 等: "Using Blockchain to Protect Personal Privacy in the Scenario of Online Taxi-hailing", 《INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL》 * |
RYAN HENRY 等: "Blockchain Access Privay:Challenges and Directions", 《IEEE SECURITY & PRIVACY》 * |
唐盛区块链: "区块链隐私保护的两大"保镖"", 《HTTPS://WWW.SOHU.COM/A/145403666_694835》 * |
李兆森 等: "基于区块链的电子数据存证应用研究", 《软件》 * |
李鸣 等: "区块链标准化现状及思路", 《中国信息安全》 * |
梅颖: "安全存储医疗记录的区块链方法研究", 《江西师范大学学报(自然科学版)》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149335A (en) * | 2019-05-24 | 2019-08-20 | 众安信息技术服务有限公司 | Establish the method and apparatus of the home zone for the protection of block chain data-privacy |
CN110149335B (en) * | 2019-05-24 | 2022-06-21 | 众安信息技术服务有限公司 | Method and equipment for establishing private area for block chain data privacy protection |
CN110493261A (en) * | 2019-09-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Identifying code acquisition methods, client, server and storage medium based on block chain |
CN110751485A (en) * | 2019-10-28 | 2020-02-04 | 腾讯科技(深圳)有限公司 | Data processing method and equipment |
CN110751485B (en) * | 2019-10-28 | 2021-08-17 | 腾讯科技(深圳)有限公司 | Data processing method and equipment |
CN111080292A (en) * | 2019-11-25 | 2020-04-28 | 支付宝(杭州)信息技术有限公司 | Method and device for acquiring block chain transaction signature data |
CN111050326A (en) * | 2019-11-28 | 2020-04-21 | 泰康保险集团股份有限公司 | Short message verification method, device, equipment and medium based on block chain |
CN111050326B (en) * | 2019-11-28 | 2023-08-25 | 泰康保险集团股份有限公司 | Block chain-based short message verification method, device, equipment and medium |
CN111815272A (en) * | 2020-06-30 | 2020-10-23 | 平安国际智慧城市科技股份有限公司 | Application auditing method and device, electronic equipment and storage medium |
CN113095937A (en) * | 2021-03-31 | 2021-07-09 | 携程商旅信息服务(上海)有限公司 | Bill generation method, system, equipment and storage medium based on enterprise WeChat |
CN113095937B (en) * | 2021-03-31 | 2022-10-28 | 携程商旅信息服务(上海)有限公司 | Bill generation method, system, equipment and storage medium based on enterprise WeChat |
Also Published As
Publication number | Publication date |
---|---|
CN109102404B (en) | 2021-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109102404A (en) | The method for secret protection and system of block chain real name communication | |
Zheng et al. | Blockchain challenges and opportunities: A survey | |
CN108960832A (en) | The method for secret protection and system of block chain real name communication | |
Soni et al. | A comprehensive survey on blockchain: Working, security analysis, privacy threats and potential applications | |
CN106485167B (en) | Credit recording system and method based on block chain | |
Moreno-Sanchez et al. | Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network | |
CN109636599A (en) | License block chain secret protection and monitoring and managing method based on group ranking | |
CN108876374A (en) | The network identity certificate authentication method and system of block chain | |
CN109274501A (en) | License block chain method for secret protection based on Proxy Signature | |
CN108418689A (en) | A kind of the zero-knowledge proof method and medium of suitable block chain secret protection | |
CN111770198B (en) | Information sharing method, device and equipment | |
CN108900507A (en) | Block chain real name identification method and system | |
CN113781073B (en) | Subsidizing method capable of hiding real names based on matrix alliance chain | |
ul Hassan et al. | Blockchain and the future of the internet: a comprehensive review | |
CN108880832A (en) | Block chain real name identification method and system | |
US20220253813A1 (en) | Cryptographicaly secured hybrid (on and off blockchain) cryptocurrency system | |
Jeon et al. | RMBC: Randomized mesh blockchain using DBFT consensus algorithm | |
CN111444267A (en) | Government information sharing platform and method based on block chain | |
CN111339550A (en) | Comment information credibility method based on block chain technology | |
Suryanarayana et al. | Architectural support for trust models in decentralized applications | |
CN114548989A (en) | Rights and interests management system based on NFR | |
CN112347517A (en) | KYC compliance supervision system based on multi-party safety calculation | |
CN115277122A (en) | Cross-border data flow and supervision system based on block chain | |
CN110321730A (en) | A kind of method, block chain node and the storage medium of operation data processing | |
CN111698254B (en) | Alliance chain Baas platform building method based on sharing organization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing Applicant after: IALLCHAIN Co.,Ltd. Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing. Applicant before: IALLCHAIN Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |