CN109104396A - A kind of block chain agent authorization method based on allograph, medium - Google Patents
A kind of block chain agent authorization method based on allograph, medium Download PDFInfo
- Publication number
- CN109104396A CN109104396A CN201710475320.6A CN201710475320A CN109104396A CN 109104396 A CN109104396 A CN 109104396A CN 201710475320 A CN201710475320 A CN 201710475320A CN 109104396 A CN109104396 A CN 109104396A
- Authority
- CN
- China
- Prior art keywords
- user
- commission
- core node
- allograph
- range
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses the block chain agent authorization method based on allograph, medium, the right of part can be entrusted to trustee by user, and can specify range, the timeliness etc. of commission right.Its technical solution are as follows: two class participants in block catenary system: ordinary node and core node.Ordinary node by way of allograph on-demand scope of authority to core node.The mechanism is divided into two stages: commission stage and application execution stage.In the commission stage, user is consigner with core node, generates corresponding proxy signature key and authorized agency's extent of competence.In the application execution stage, user's (can be related side) applies for that core node executes corresponding operating.Core node is signed, and execute operation eventually by intelligent contract after user identity is applied in confirmation using content of the proxy signature key to agency.
Description
Technical field
The present invention relates to the relevant technology of block chain more particularly to the methods of block chain agent authorization, medium.
Background technique
Block chain (Blockchain) is derived from the Floor layer Technology of bit coin, be it is a kind of sequentially in time by data block with
A kind of linked data structure that the connected mode of sequence is combined into, and can not distorting of being guaranteed in a manner of cryptography and can not be pseudo-
It makes, realizes the distributed account book of decentralization.
Node is the basic unit for forming block chain network, and the corresponding computer of a general node saves account book
Copy can serve as different role, such as issue transaction, verifying transaction, book keeping operation.Participant of the node as block catenary system,
A data copy is safeguarded respectively.Node keeps the consistency of backup database data by common recognition algorithm.Due to block linkwork
System is the distributed account book system of decentralization, independent of any trusted third party, so needing a kind of without relying on the
Tripartite mechanism identifies and verifies the mechanism of a certain numerical value or transaction, i.e. common recognition mechanism.Common recognition mechanism is all block chains and divides
The basis of cloth account book application.Each account is made of address (public key) and private key in block catenary system.User by using
Private key controls the assets in account, i.e. user signs to the operation of assets using private key.In block catenary system, user
The ownership of account assets is determined by possessing the private key of account completely.I.e. user is by private key signature to the money of the account
Production is operated.
Under actual business model there are user by part delegation to the scene of other users.Such as alliance's chain
It is close in user in (only the block chain network open to specific individual or entity, the disengaging of network node are strictly managed)
When key is lost or is dead, need that core node is entrusted to transfer assets.The solution for currently meeting the demand is by user's private
Key consigns to trustee completely, or private key is backed up in core node in advance.Such methods are actually by the institute of account
It has the right to consign to trustee completely, and specific permission control cannot be carried out to trustee.In alliance's chain, user needs
Key is provided and gives service for change;Or after password loss, assets transfer service is provided.It, can only in existing block chain technology
The private key of user is backed up at core node.But this method assigns core node excessive right, is not able to satisfy visitor
Family demand.
Although this method can solve the demand of delegation, but trustee can actually fully control account, or even can
To carry out violating the operation of consigner's wish.
The concept of allograph was proposed by Mambo et al. in 1996.Allograph allows user A to press the right of signature
User B need to be entrusted to.In commission range, user B can sign to message with the name of A.Verifier can screen this
Signature is to be carried out by A commission in B, and verify the correctness of signature.
Intelligent contract is the one section of code operated on block chain, it can maintain the state of oneself, the money to draw oneself up
It produces and the external information or assets that receive is responded, code control and management database.The assets of each account
Be stored in the database of intelligent contract, and can by intelligent contract under the conditions of meeting specific to the data in database
Operated (as shown in Figure 1).Under normal circumstances, intelligent contract can check whether the signature of a transaction is correct first, verifying
By rear, assets in database can just be operated.Account can be guaranteed to the control of oneself assets in such a way.
In alliance's chain, the common mode of agent authorization is to confer to the right that core node controls all nodes.Intelligent contract is examined first
The signature of transaction is looked into, if the signature is the effective signature provided by initiator or core node, executes code update number
According to library.But the shortcomings that this method, is, regular account has entrusted excessive permission to core node.
Summary of the invention
A brief summary of one or more aspects is given below to provide to the basic comprehension in terms of these.This general introduction is not
The extensive overview of all aspects contemplated, and be both not intended to identify critical or decisive element in all aspects also non-
Attempt to define the range in terms of any or all.Its unique purpose is to provide the one of one or more aspects in simplified form
A little concepts are with the sequence for more detailed description given later.
The invention proposes a kind of block chain agent authorization method based on allograph (Proxy Signature), it is situated between
The right of part can be entrusted to trustee by matter, user, and can specify range, the timeliness etc. of commission right.?
In alliance's chain, assets transfer can be carried out in the case where user's Lost Security Key.Meanwhile the agent authorization method energy minimization core
The permission of node only allows core node to carry out certain specific operation of user's authorization.
The technical solution of the present invention is as follows: present invention discloses a kind of block chain agent authorization method based on allograph,
Including commission stage and application execution stage, wherein
In commission the first user of stage on demand by a part of delegation of oneself to core node, entrust the stage further
Include:
First user is input, core with public key pk1, signature private key sk1 and customized commission range w as consigner
Node is input with its public key pk2, signature private key sk2 as trustee;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses
Psk signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage is further
Include:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through
Then whether core node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
After core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user
Application content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 and core node of first user within the scope of authority
Public key pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, customized commission model
Enclosing w includes but is not limited to: range, timeliness and the number for the message that can be signed.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, user will entrust range
Delegation in w is related to allograph to the commission process of core node, can be it is interactive be also possible to it is noninteractive.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, the first user and second
User can be same user;It is also possible to different users, wherein second user is the correlation of the first user of matter entrusted
User.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, intelligent contract verifying behaviour
Make whether the processing within the scope of authority refers to whether verifying R (m, w)=1 is correct, and wherein binary crelation R indicates application m and power
The relationship between range w is limited, R (m, w)=1 indicates m within the interest field as defined in w, and R (m, w)=0 indicates that m is not provided in w
Interest field within.
Present invention further teaches a kind of computer-readable mediums, including the computer program stored on medium, the calculating
Machine program is for executing the block chain agent authorization method below based on allograph:
In commission the first user of stage on demand by a part of delegation of oneself to core node, entrust the stage further
Include:
First user is input, core with public key pk1, signature private key sk1 and customized commission range w as consigner
Node is input with its public key pk2, signature private key sk2 as trustee;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses
Psk signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage is further
Include:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through
Then whether core node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
After core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user
Application content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 and core node of first user within the scope of authority
Public key pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
One embodiment of computer-readable medium according to the present invention, customized commission range w includes but is not limited to: institute
Range, timeliness and the number for the message that can be signed.
One embodiment of computer-readable medium according to the present invention, user will entrust the delegation in range w to core
The commission process of heart node is related to allograph, can be it is interactive be also possible to it is noninteractive.
One embodiment of computer-readable medium according to the present invention, the first user and second user can be same use
Family;It is also possible to different users, wherein second user is the associated user of the first user of matter entrusted.
One embodiment of computer-readable medium according to the present invention, whether intelligent contract verification operation is within the scope of authority
Processing refer to whether verifying R (m, w)=1 correct, wherein binary crelation R indicates the relationship between application m and extent of competence w, R
(m, w)=1 indicates m within the interest field as defined in w, and R (m, w)=0 indicates m not within the interest field as defined in w.
The present invention compare the prior art have it is following the utility model has the advantages that the present invention combination allograph and intelligence contract technology,
Realize the agent authorization mechanism in block catenary system.User (trustee) can specify the scope of authority and authorization timeliness, be entrusted
People can only carry out specified operation within the scope of due authority and timeliness.
The mechanism of the block chain agent authorization of industry is carried out by way of super account or commission private key at present.This hair
It is bright to have the advantage that by comparison
1) user does not need to act on behalf of private key to trustee completely, and trustee's permission can be prevented excessive.
2) user can act on behalf of different rights to trustee on demand, and the authorization of trustee is determined by user completely.With
The mode of family agency is more flexible, safer.
3) mode of intelligent contract support is more general, does not need as the specific intelligent contract of each authorization configuration.
Detailed description of the invention
After the detailed description for reading embodiment of the disclosure in conjunction with the following drawings, it better understood when of the invention
Features described above and advantage.In the accompanying drawings, each component is not necessarily drawn to scale, and has similar correlation properties or feature
Component may have same or similar appended drawing reference.
Fig. 1 shows the schematic diagram of intelligent contract deployment.
In the commission stage in the embodiment for the block chain agent authorization method based on allograph that Fig. 2 shows of the invention
Flow chart.
Fig. 3 shows in the embodiment of the block chain agent authorization method of the invention based on allograph and executes in application
The flow chart in stage.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Note that below in conjunction with attached drawing and specifically real
The aspects for applying example description is merely exemplary, and is understood not to carry out any restrictions to protection scope of the present invention.
It illustrates first and realizes the principle of the present invention and mechanism.
Generally speaking, the present invention provides the machine of the flexible agent authorization of account in block catenary system using the technology of allograph
System.Consider two class participants in block catenary system: ordinary node and core node.
Ordinary node by way of allograph on-demand scope of authority to core node.The mechanism is divided into two stages:
Commission stage and application execution stage.In the commission stage, user is consigner with core node, generates corresponding allograph
Key and authorized agency's extent of competence.In the application execution stage, it is corresponding that user's (can be related side) applies for that core node executes
Operation.Core node is signed, and most after user identity is applied in confirmation using content of the proxy signature key to agency
Operation is executed by intelligent contract eventually.
Specifically, allograph allows consigner by part signature delegation to trustee.Allograph is divided into
Commission process, allograph process and verification process.Initial stage consigner and trustee possess respectively verification public key and
Signature private key (pk1, sk1) and (pk2, sk2).Extent of competence w is defined, and indicates message m and extent of competence with binary crelation R
Between relationship.If R (w, m)=1, then it represents that m is within the interest field as defined in w;If R (w, m)=0, then it represents that m does not exist
Within interest field as defined in w.
During commission, consigner selects agent authority of power range w.Consigner is input, trustee with (pk1, sk1, w)
It is input with (pk2, sk2), both sides interact or noninteractive mode is held consultation.Last trustee obtain (w,
Psk), wherein psk is allograph private key within interest field w as defined in consigner.Trustee can use psk in w
In the range of regulation, signed with the name of consigner.
During allograph, trustee after acquisition (w, psk) and consigner's public key pk1, to message m into
Row allograph.Generate allograph psig.
In verification process, verifier is input with w, pk1, pk2, m, psig.If meeting R (w, m)=1, and sign
It is verified, then it represents that the signature is the signature of trustee commission order side in the range of w;It otherwise, then is not legal label
Name is not being entrusted in range.
Fig. 2 and Fig. 3 respectively illustrates the block chain agent authorization method of the invention based on allograph of the invention
Two stages of embodiment: commission stage and application execution stage.Referring to figs. 2 and 3, the implementation steps of the present embodiment are described in detail such as
Under.
In commission phase user on demand by a part of delegation of oneself to core node.Detailed process is as shown in Figure 2.
1. user is input with public key pk1, signature private key sk1 and customized commission range w as consigner.Core section
Point is input with its public key pk2, signature private key sk2 as trustee.Wherein, commission range w can be disappearing of can signing
The range of breath, timeliness and number etc., it is specific to be arranged depending on actual scene.
2. user will entrust the delegation in range w to core node according to the commission process of allograph.Specifically
Commission process is related to allograph, can be it is interactive be also possible to it is noninteractive.
3. core node exports (w, psk), wherein psk is the commission signature private key of corresponding commission range w.Core node makes
It is signed with psk to the message in commission range.
In the application execution stage, user applies for that core node agency executes corresponding operating.Specific process is as shown in Figure 3.
1. user files an application to core node, it is denoted as m.The user can be different from the commission user in stage, can be
The associated user of matter entrusted.User also needs to provide testimonial material proof while filing an application.The testimonial material can be with
It is paper material, is also possible to electronic material.
2. the testimonial material proof of core node certification user.If do not passed through, application failure is returned.If passed through,
Core node checks whether related side is that it entrusts corresponding authority, i.e., whether the opereating specification of inspection user application is in the commission stage
Within the scope of defined w expression.
3. after core node determination possesses corresponding authority, entrusting signature private key psk to the Shen of user using the commission stage
Please content m sign, generate psig.Allograph psig is sent to intelligent contract.
4. intelligent contract first verifies that operation whether within the scope of authority, i.e., whether verifying R (m, w)=1 is correct.Its
It is secondary, it is whether correct using the public key pk1 of user and the public key pk2 verifying allograph psig of core node.If verifying is all logical
It crosses, then intelligent contract executes the operation of user's application.
In addition, storing computer program, computer journey on medium the invention also discloses a kind of computer-readable medium
Sequence is used to execute the block chain agent authorization method based on allograph as in previous embodiment.
Although for simplify explain the above method is illustrated to and is described as a series of actions, it should be understood that and understand,
The order that these methods are not acted is limited, because according to one or more embodiments, some movements can occur in different order
And/or with from it is depicted and described herein or herein it is not shown and describe but it will be appreciated by those skilled in the art that other
Movement concomitantly occurs.
Those skilled in the art will further appreciate that, the various illustratives described in conjunction with the embodiments described herein
Logic plate, module, circuit and algorithm steps can be realized as electronic hardware, computer software or combination of the two.It is clear
Explain to Chu this interchangeability of hardware and software, various illustrative components, frame, module, circuit and step be above with
Its functional form makees generalization description.Such functionality be implemented as hardware or software depend on concrete application and
It is applied to the design constraint of total system.Technical staff can realize every kind of specific application described with different modes
Functionality, but such realization decision should not be interpreted to cause departing from the scope of the present invention.
General place can be used in conjunction with various illustrative logic plates, module and the circuit that presently disclosed embodiment describes
Reason device, digital signal processor (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA) other are compiled
Journey logical device, discrete door or transistor logic, discrete hardware component or its be designed to carry out function described herein
Any combination is realized or is executed.General processor can be microprocessor, but in alternative, which, which can be, appoints
What conventional processor, controller, microcontroller or state machine.Processor is also implemented as calculating the combination of equipment, example
As DSP and the combination of microprocessor, multi-microprocessor, the one or more microprocessors to cooperate with DSP core or it is any its
His such configuration.
The step of method or algorithm for describing in conjunction with embodiment disclosed herein, can be embodied directly in hardware, in by processor
It is embodied in the software module of execution or in combination of the two.Software module can reside in RAM memory, flash memory, ROM and deposit
Reservoir, eprom memory, eeprom memory, register, hard disk, removable disk, CD-ROM or known in the art appoint
In the storage medium of what other forms.Exemplary storage medium is coupled to processor so that the processor can be from/to the storage
Medium reads and writees information.In alternative, storage medium can be integrated into processor.Pocessor and storage media can
It resides in ASIC.ASIC can reside in user terminal.In alternative, pocessor and storage media can be used as discrete sets
Part is resident in the user terminal.
In one or more exemplary embodiments, described function can be in hardware, software, firmware, or any combination thereof
Middle realization.If being embodied as computer program product in software, each function can be used as one or more item instructions or generation
Code may be stored on the computer-readable medium or be transmitted by it.Computer-readable medium includes computer storage medium and communication
Both media comprising any medium for facilitating computer program to shift from one place to another.Storage medium can be can quilt
Any usable medium of computer access.It is non-limiting as example, such computer-readable medium may include RAM, ROM,
EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage apparatus can be used to carrying or store instruction
Or data structure form desirable program code and any other medium that can be accessed by a computer.Any connection is also by by rights
Referred to as computer-readable medium.For example, if software is using coaxial cable, fiber optic cables, twisted pair, digital subscriber line
(DSL) or the wireless technology of such as infrared, radio and microwave etc is passed from web site, server or other remote sources
It send, then the coaxial cable, fiber optic cables, twisted pair, DSL or such as infrared, radio and microwave etc is wireless
Technology is just included among the definition of medium.Disk (disk) and dish (disc) as used herein include compression dish
(CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc, which disk (disk) are often reproduced in a manner of magnetic
Data, and dish (disc) with laser reproduce data optically.Combinations of the above should also be included in computer-readable medium
In the range of.
Offer is to make any person skilled in the art all and can make or use this public affairs to the previous description of the disclosure
It opens.The various modifications of the disclosure all will be apparent for a person skilled in the art, and as defined herein general
Suitable principle can be applied to other variants without departing from the spirit or scope of the disclosure.The disclosure is not intended to be limited as a result,
Due to example described herein and design, but should be awarded and principle disclosed herein and novel features phase one
The widest scope of cause.
Claims (10)
1. a kind of block chain agent authorization method based on allograph, which is characterized in that executed including commission stage and application
Stage, wherein
In commission the first user of stage on demand by a part of delegation of oneself to core node, the commission stage is further wrapped
It includes:
First user is input, core node with public key pk1, signature private key sk1 and customized commission range w as consigner
As trustee with its public key pk2, signature private key sk2 be input;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses psk
It signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage further wraps
It includes:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through core
Whether heart node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
Application after core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user
Content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 of first user and the public key of core node within the scope of authority
Pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
2. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that customized
Commission range w includes but is not limited to: range, timeliness and the number for the message that can be signed.
3. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that user will entrust
Ask the delegation in range w related to allograph to the commission process of core node, can be it is interactive be also possible to it is non-
Interactive.
4. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that the first user
It can be same user with second user;It is also possible to different users, wherein second user is the first user of matter entrusted
Associated user.
5. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that intelligent contract
Whether the processing within the scope of authority refers to whether verifying R (m, w)=1 is correct, and wherein binary crelation R indicates application to verification operation
Relationship between m and extent of competence w, R (m, w)=1 indicate m within the interest field as defined in w, and R (m, w)=0 indicates that m does not exist
Within interest field as defined in w.
6. a kind of computer-readable medium, including the computer program stored on medium, the computer program for execute with
Under the block chain agent authorization method based on allograph:
In commission the first user of stage on demand by a part of delegation of oneself to core node, the commission stage is further wrapped
It includes:
First user is input, core node with public key pk1, signature private key sk1 and customized commission range w as consigner
As trustee with its public key pk2, signature private key sk2 be input;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses psk
It signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage further wraps
It includes:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through core
Whether heart node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
Application after core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user
Content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 of first user and the public key of core node within the scope of authority
Pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
7. computer-readable medium according to claim 6, which is characterized in that customized commission range w includes but not
It is limited to: range, timeliness and the number for the message that can be signed.
8. computer-readable medium according to claim 6, which is characterized in that user will entrust the permission generation in range w
Manage it is related to allograph to the commission process of core node, can be it is interactive be also possible to it is noninteractive.
9. computer-readable medium according to claim 6, which is characterized in that the first user and second user can be together
One user;It is also possible to different users, wherein second user is the associated user of the first user of matter entrusted.
10. computer-readable medium according to claim 6, which is characterized in that whether intelligent contract verification operation is being awarded
Processing in power range refers to whether verifying R (m, w)=1 is correct, and wherein binary crelation R is indicated between application m and extent of competence w
Relationship, R (m, w)=1 indicates that m within the interest field as defined in w, R (m, w)=0 indicate the m not interest field as defined in w
Within.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710475320.6A CN109104396B (en) | 2017-06-21 | 2017-06-21 | Block chain agent authorization method and medium based on agent signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710475320.6A CN109104396B (en) | 2017-06-21 | 2017-06-21 | Block chain agent authorization method and medium based on agent signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109104396A true CN109104396A (en) | 2018-12-28 |
CN109104396B CN109104396B (en) | 2021-03-16 |
Family
ID=64796220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710475320.6A Active CN109104396B (en) | 2017-06-21 | 2017-06-21 | Block chain agent authorization method and medium based on agent signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109104396B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922155A (en) * | 2019-03-18 | 2019-06-21 | 众安信息技术服务有限公司 | The method and device of intelligent agent is realized in block chain network |
CN110009348A (en) * | 2019-03-25 | 2019-07-12 | 杭州秘猿科技有限公司 | A kind of allograph method, system and the electronic equipment of block chain |
CN110177109A (en) * | 2019-06-04 | 2019-08-27 | 北京理工大学 | A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain |
CN110223085A (en) * | 2019-05-25 | 2019-09-10 | 深圳市元征科技股份有限公司 | A kind of data processing method, server and computer-readable medium |
CN110545177A (en) * | 2019-08-29 | 2019-12-06 | 北京艾摩瑞策科技有限公司 | Block chain private key signing method and device for life service platform user |
CN110958223A (en) * | 2019-10-31 | 2020-04-03 | 百度在线网络技术(北京)有限公司 | Delegation authorization method, device, equipment and medium based on block chain |
CN111104688A (en) * | 2019-11-13 | 2020-05-05 | 上海链颉科技有限公司 | Public and private key authority proxy method, system and storage medium based on block chain |
CN111444273A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Data authorization method and device based on block chain |
CN111563273A (en) * | 2020-04-30 | 2020-08-21 | 中国银行股份有限公司 | Information verification method and related equipment |
CN112100178A (en) * | 2020-09-08 | 2020-12-18 | 中国联合网络通信集团有限公司 | Delegation authorization verification method and system |
CN114710507A (en) * | 2022-03-30 | 2022-07-05 | 蚂蚁区块链科技(上海)有限公司 | Consensus method and block link point |
TWI840295B (en) * | 2023-08-23 | 2024-04-21 | 中華電信股份有限公司 | Proxy signature system and method for nft |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI812574B (en) * | 2023-02-01 | 2023-08-11 | 中華電信股份有限公司 | Agent authorization system and agent authorization method using nft technology |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719765A (en) * | 2005-08-03 | 2006-01-11 | 武汉理工大学 | Safety reliable controllable authorization electronic autographing method |
CN1737721A (en) * | 2005-08-03 | 2006-02-22 | 武汉理工大学 | Authorization controlled electronic signature method based on elliptical curve |
CN101262344A (en) * | 2008-04-25 | 2008-09-10 | 武汉理工大学 | An efficient quick authorization electronic signature method |
CN101267296A (en) * | 2008-04-25 | 2008-09-17 | 武汉理工大学 | An efficient authorization electronic signature method without authentication center |
CN102404726A (en) * | 2011-11-18 | 2012-04-04 | 重庆邮电大学 | Distributed control method for information of accessing internet of things by user |
CN103596167A (en) * | 2013-10-25 | 2014-02-19 | 西安电子科技大学 | Machine-type communication authentication and key agreement method based on proxy |
CN103870724A (en) * | 2012-12-12 | 2014-06-18 | 财团法人资讯工业策进会 | Main management device, agent management device, electronic device and authorization management method |
CN106097006A (en) * | 2016-06-09 | 2016-11-09 | 杭州复杂美科技有限公司 | Block chain charge mode |
CN106570681A (en) * | 2016-10-28 | 2017-04-19 | 山东明和软件有限公司 | Anti-tampering private fund electronic contract signing system and method based on block chain |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
-
2017
- 2017-06-21 CN CN201710475320.6A patent/CN109104396B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719765A (en) * | 2005-08-03 | 2006-01-11 | 武汉理工大学 | Safety reliable controllable authorization electronic autographing method |
CN1737721A (en) * | 2005-08-03 | 2006-02-22 | 武汉理工大学 | Authorization controlled electronic signature method based on elliptical curve |
CN101262344A (en) * | 2008-04-25 | 2008-09-10 | 武汉理工大学 | An efficient quick authorization electronic signature method |
CN101267296A (en) * | 2008-04-25 | 2008-09-17 | 武汉理工大学 | An efficient authorization electronic signature method without authentication center |
CN102404726A (en) * | 2011-11-18 | 2012-04-04 | 重庆邮电大学 | Distributed control method for information of accessing internet of things by user |
CN103870724A (en) * | 2012-12-12 | 2014-06-18 | 财团法人资讯工业策进会 | Main management device, agent management device, electronic device and authorization management method |
CN103596167A (en) * | 2013-10-25 | 2014-02-19 | 西安电子科技大学 | Machine-type communication authentication and key agreement method based on proxy |
CN106097006A (en) * | 2016-06-09 | 2016-11-09 | 杭州复杂美科技有限公司 | Block chain charge mode |
CN106570681A (en) * | 2016-10-28 | 2017-04-19 | 山东明和软件有限公司 | Anti-tampering private fund electronic contract signing system and method based on block chain |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109922155B (en) * | 2019-03-18 | 2022-03-04 | 众安信息技术服务有限公司 | Method and device for realizing intelligent agent in block chain network |
CN109922155A (en) * | 2019-03-18 | 2019-06-21 | 众安信息技术服务有限公司 | The method and device of intelligent agent is realized in block chain network |
CN110009348A (en) * | 2019-03-25 | 2019-07-12 | 杭州秘猿科技有限公司 | A kind of allograph method, system and the electronic equipment of block chain |
CN110223085A (en) * | 2019-05-25 | 2019-09-10 | 深圳市元征科技股份有限公司 | A kind of data processing method, server and computer-readable medium |
CN110177109A (en) * | 2019-06-04 | 2019-08-27 | 北京理工大学 | A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain |
CN110545177A (en) * | 2019-08-29 | 2019-12-06 | 北京艾摩瑞策科技有限公司 | Block chain private key signing method and device for life service platform user |
CN110958223A (en) * | 2019-10-31 | 2020-04-03 | 百度在线网络技术(北京)有限公司 | Delegation authorization method, device, equipment and medium based on block chain |
CN110958223B (en) * | 2019-10-31 | 2023-03-24 | 百度在线网络技术(北京)有限公司 | Delegation authorization method, device, equipment and medium based on block chain |
CN111104688A (en) * | 2019-11-13 | 2020-05-05 | 上海链颉科技有限公司 | Public and private key authority proxy method, system and storage medium based on block chain |
CN111444273A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Data authorization method and device based on block chain |
CN111444273B (en) * | 2020-03-24 | 2021-09-10 | 腾讯科技(深圳)有限公司 | Data authorization method and device based on block chain |
CN111563273A (en) * | 2020-04-30 | 2020-08-21 | 中国银行股份有限公司 | Information verification method and related equipment |
CN112100178A (en) * | 2020-09-08 | 2020-12-18 | 中国联合网络通信集团有限公司 | Delegation authorization verification method and system |
CN112100178B (en) * | 2020-09-08 | 2023-05-12 | 中国联合网络通信集团有限公司 | Delegation authorization verification method and system |
CN114710507A (en) * | 2022-03-30 | 2022-07-05 | 蚂蚁区块链科技(上海)有限公司 | Consensus method and block link point |
CN114710507B (en) * | 2022-03-30 | 2023-10-27 | 蚂蚁区块链科技(上海)有限公司 | Consensus method, blockchain node, medium and consensus node |
TWI840295B (en) * | 2023-08-23 | 2024-04-21 | 中華電信股份有限公司 | Proxy signature system and method for nft |
Also Published As
Publication number | Publication date |
---|---|
CN109104396B (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109104396A (en) | A kind of block chain agent authorization method based on allograph, medium | |
CN108701145B (en) | System and method for digital identity management and admissions control in distributed network node | |
CN109314636B (en) | Cryptographic method and system for secure extraction of data from blockchains | |
CN109377198A (en) | A kind of signing system known together in many ways based on alliance's chain | |
CN109345259A (en) | Virtual resource transfer method, device, medium and electronic equipment based on block chain | |
CN113204744B (en) | Software authorization system and method based on distributed identity | |
CN109246197A (en) | Data processing method and device based on intelligent contract | |
CN109194465A (en) | For managing method, user equipment, management equipment, storage medium and the computer program product of key | |
CN108830716A (en) | The transaction system of protection privacy of user based on block chain and encryption | |
CN108876669A (en) | Course notarization system and method applied to multi-platform shared education resources | |
CN110516417A (en) | A kind of method for verifying authority and device of intelligence contract | |
CN111160803A (en) | Business process safety and management method and system based on block chain | |
CN109982150A (en) | The trust chain method for building up and Intelligent television terminal of Intelligent television terminal | |
CN107634989A (en) | A kind of cloud wallet construction method and server | |
CN114418570B (en) | Method and device for processing non-homogeneous pass based on blockchain | |
Grüner et al. | On the relevance of blockchain in identity management | |
Zou et al. | Application of blockchain digital identity technology in healthcare consumer finance system | |
Rustemi et al. | Identification During Verification Of Diplomas In The Blockchain System | |
KR20210086074A (en) | Block Chain Management System To Build Block Chain Network | |
CN114448639B (en) | Decentralized identity system with uniqueness and secret key safety and implementation method | |
Zhang et al. | FutureText: A blockchain-based contract signing prototype with security and convenience | |
CN115760422A (en) | Electric power market transaction system and method based on block chain technology | |
CN112968772B (en) | Cross-chain decoupling method and system for block chain data | |
Kavassalis | Designing an academic electronic identity management system for student mobility using eidas eid and self-sovereign identity technologies | |
CN115345729A (en) | Credit card issuing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230412 Address after: 200127 2nd floor, building 10, Lujiazui Software Park, 91 Eshan Road, Pudong New Area, Shanghai Patentee after: SHANGHAI JUZIX FINANCE INFORMATION SERVICES CO.,LTD. Patentee after: WUHAN University Address before: 200127 2nd floor, building 10, Lujiazui Software Park, 91 Eshan Road, Pudong New Area, Shanghai Patentee before: SHANGHAI JUZIX FINANCE INFORMATION SERVICES CO.,LTD. |