CN109104396A - A kind of block chain agent authorization method based on allograph, medium - Google Patents

A kind of block chain agent authorization method based on allograph, medium Download PDF

Info

Publication number
CN109104396A
CN109104396A CN201710475320.6A CN201710475320A CN109104396A CN 109104396 A CN109104396 A CN 109104396A CN 201710475320 A CN201710475320 A CN 201710475320A CN 109104396 A CN109104396 A CN 109104396A
Authority
CN
China
Prior art keywords
user
commission
core node
allograph
range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710475320.6A
Other languages
Chinese (zh)
Other versions
CN109104396B (en
Inventor
谢翔
李升林
林森
沈敏文
何德彪
孙立林
陈安伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Juzix Finance Information Services Co ltd
Wuhan University WHU
Original Assignee
Shanghai Great Real Financial Information Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Great Real Financial Information Service Co Ltd filed Critical Shanghai Great Real Financial Information Service Co Ltd
Priority to CN201710475320.6A priority Critical patent/CN109104396B/en
Publication of CN109104396A publication Critical patent/CN109104396A/en
Application granted granted Critical
Publication of CN109104396B publication Critical patent/CN109104396B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses the block chain agent authorization method based on allograph, medium, the right of part can be entrusted to trustee by user, and can specify range, the timeliness etc. of commission right.Its technical solution are as follows: two class participants in block catenary system: ordinary node and core node.Ordinary node by way of allograph on-demand scope of authority to core node.The mechanism is divided into two stages: commission stage and application execution stage.In the commission stage, user is consigner with core node, generates corresponding proxy signature key and authorized agency's extent of competence.In the application execution stage, user's (can be related side) applies for that core node executes corresponding operating.Core node is signed, and execute operation eventually by intelligent contract after user identity is applied in confirmation using content of the proxy signature key to agency.

Description

A kind of block chain agent authorization method based on allograph, medium
Technical field
The present invention relates to the relevant technology of block chain more particularly to the methods of block chain agent authorization, medium.
Background technique
Block chain (Blockchain) is derived from the Floor layer Technology of bit coin, be it is a kind of sequentially in time by data block with A kind of linked data structure that the connected mode of sequence is combined into, and can not distorting of being guaranteed in a manner of cryptography and can not be pseudo- It makes, realizes the distributed account book of decentralization.
Node is the basic unit for forming block chain network, and the corresponding computer of a general node saves account book Copy can serve as different role, such as issue transaction, verifying transaction, book keeping operation.Participant of the node as block catenary system, A data copy is safeguarded respectively.Node keeps the consistency of backup database data by common recognition algorithm.Due to block linkwork System is the distributed account book system of decentralization, independent of any trusted third party, so needing a kind of without relying on the Tripartite mechanism identifies and verifies the mechanism of a certain numerical value or transaction, i.e. common recognition mechanism.Common recognition mechanism is all block chains and divides The basis of cloth account book application.Each account is made of address (public key) and private key in block catenary system.User by using Private key controls the assets in account, i.e. user signs to the operation of assets using private key.In block catenary system, user The ownership of account assets is determined by possessing the private key of account completely.I.e. user is by private key signature to the money of the account Production is operated.
Under actual business model there are user by part delegation to the scene of other users.Such as alliance's chain It is close in user in (only the block chain network open to specific individual or entity, the disengaging of network node are strictly managed) When key is lost or is dead, need that core node is entrusted to transfer assets.The solution for currently meeting the demand is by user's private Key consigns to trustee completely, or private key is backed up in core node in advance.Such methods are actually by the institute of account It has the right to consign to trustee completely, and specific permission control cannot be carried out to trustee.In alliance's chain, user needs Key is provided and gives service for change;Or after password loss, assets transfer service is provided.It, can only in existing block chain technology The private key of user is backed up at core node.But this method assigns core node excessive right, is not able to satisfy visitor Family demand.
Although this method can solve the demand of delegation, but trustee can actually fully control account, or even can To carry out violating the operation of consigner's wish.
The concept of allograph was proposed by Mambo et al. in 1996.Allograph allows user A to press the right of signature User B need to be entrusted to.In commission range, user B can sign to message with the name of A.Verifier can screen this Signature is to be carried out by A commission in B, and verify the correctness of signature.
Intelligent contract is the one section of code operated on block chain, it can maintain the state of oneself, the money to draw oneself up It produces and the external information or assets that receive is responded, code control and management database.The assets of each account Be stored in the database of intelligent contract, and can by intelligent contract under the conditions of meeting specific to the data in database Operated (as shown in Figure 1).Under normal circumstances, intelligent contract can check whether the signature of a transaction is correct first, verifying By rear, assets in database can just be operated.Account can be guaranteed to the control of oneself assets in such a way. In alliance's chain, the common mode of agent authorization is to confer to the right that core node controls all nodes.Intelligent contract is examined first The signature of transaction is looked into, if the signature is the effective signature provided by initiator or core node, executes code update number According to library.But the shortcomings that this method, is, regular account has entrusted excessive permission to core node.
Summary of the invention
A brief summary of one or more aspects is given below to provide to the basic comprehension in terms of these.This general introduction is not The extensive overview of all aspects contemplated, and be both not intended to identify critical or decisive element in all aspects also non- Attempt to define the range in terms of any or all.Its unique purpose is to provide the one of one or more aspects in simplified form A little concepts are with the sequence for more detailed description given later.
The invention proposes a kind of block chain agent authorization method based on allograph (Proxy Signature), it is situated between The right of part can be entrusted to trustee by matter, user, and can specify range, the timeliness etc. of commission right.? In alliance's chain, assets transfer can be carried out in the case where user's Lost Security Key.Meanwhile the agent authorization method energy minimization core The permission of node only allows core node to carry out certain specific operation of user's authorization.
The technical solution of the present invention is as follows: present invention discloses a kind of block chain agent authorization method based on allograph, Including commission stage and application execution stage, wherein
In commission the first user of stage on demand by a part of delegation of oneself to core node, entrust the stage further Include:
First user is input, core with public key pk1, signature private key sk1 and customized commission range w as consigner Node is input with its public key pk2, signature private key sk2 as trustee;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses Psk signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage is further Include:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through Then whether core node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
After core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user Application content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 and core node of first user within the scope of authority Public key pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, customized commission model Enclosing w includes but is not limited to: range, timeliness and the number for the message that can be signed.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, user will entrust range Delegation in w is related to allograph to the commission process of core node, can be it is interactive be also possible to it is noninteractive.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, the first user and second User can be same user;It is also possible to different users, wherein second user is the correlation of the first user of matter entrusted User.
One embodiment of the block chain agent authorization method according to the present invention based on allograph, intelligent contract verifying behaviour Make whether the processing within the scope of authority refers to whether verifying R (m, w)=1 is correct, and wherein binary crelation R indicates application m and power The relationship between range w is limited, R (m, w)=1 indicates m within the interest field as defined in w, and R (m, w)=0 indicates that m is not provided in w Interest field within.
Present invention further teaches a kind of computer-readable mediums, including the computer program stored on medium, the calculating Machine program is for executing the block chain agent authorization method below based on allograph:
In commission the first user of stage on demand by a part of delegation of oneself to core node, entrust the stage further Include:
First user is input, core with public key pk1, signature private key sk1 and customized commission range w as consigner Node is input with its public key pk2, signature private key sk2 as trustee;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses Psk signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage is further Include:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through Then whether core node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
After core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user Application content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 and core node of first user within the scope of authority Public key pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
One embodiment of computer-readable medium according to the present invention, customized commission range w includes but is not limited to: institute Range, timeliness and the number for the message that can be signed.
One embodiment of computer-readable medium according to the present invention, user will entrust the delegation in range w to core The commission process of heart node is related to allograph, can be it is interactive be also possible to it is noninteractive.
One embodiment of computer-readable medium according to the present invention, the first user and second user can be same use Family;It is also possible to different users, wherein second user is the associated user of the first user of matter entrusted.
One embodiment of computer-readable medium according to the present invention, whether intelligent contract verification operation is within the scope of authority Processing refer to whether verifying R (m, w)=1 correct, wherein binary crelation R indicates the relationship between application m and extent of competence w, R (m, w)=1 indicates m within the interest field as defined in w, and R (m, w)=0 indicates m not within the interest field as defined in w.
The present invention compare the prior art have it is following the utility model has the advantages that the present invention combination allograph and intelligence contract technology, Realize the agent authorization mechanism in block catenary system.User (trustee) can specify the scope of authority and authorization timeliness, be entrusted People can only carry out specified operation within the scope of due authority and timeliness.
The mechanism of the block chain agent authorization of industry is carried out by way of super account or commission private key at present.This hair It is bright to have the advantage that by comparison
1) user does not need to act on behalf of private key to trustee completely, and trustee's permission can be prevented excessive.
2) user can act on behalf of different rights to trustee on demand, and the authorization of trustee is determined by user completely.With The mode of family agency is more flexible, safer.
3) mode of intelligent contract support is more general, does not need as the specific intelligent contract of each authorization configuration.
Detailed description of the invention
After the detailed description for reading embodiment of the disclosure in conjunction with the following drawings, it better understood when of the invention Features described above and advantage.In the accompanying drawings, each component is not necessarily drawn to scale, and has similar correlation properties or feature Component may have same or similar appended drawing reference.
Fig. 1 shows the schematic diagram of intelligent contract deployment.
In the commission stage in the embodiment for the block chain agent authorization method based on allograph that Fig. 2 shows of the invention Flow chart.
Fig. 3 shows in the embodiment of the block chain agent authorization method of the invention based on allograph and executes in application The flow chart in stage.
Specific embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Note that below in conjunction with attached drawing and specifically real The aspects for applying example description is merely exemplary, and is understood not to carry out any restrictions to protection scope of the present invention.
It illustrates first and realizes the principle of the present invention and mechanism.
Generally speaking, the present invention provides the machine of the flexible agent authorization of account in block catenary system using the technology of allograph System.Consider two class participants in block catenary system: ordinary node and core node.
Ordinary node by way of allograph on-demand scope of authority to core node.The mechanism is divided into two stages: Commission stage and application execution stage.In the commission stage, user is consigner with core node, generates corresponding allograph Key and authorized agency's extent of competence.In the application execution stage, it is corresponding that user's (can be related side) applies for that core node executes Operation.Core node is signed, and most after user identity is applied in confirmation using content of the proxy signature key to agency Operation is executed by intelligent contract eventually.
Specifically, allograph allows consigner by part signature delegation to trustee.Allograph is divided into Commission process, allograph process and verification process.Initial stage consigner and trustee possess respectively verification public key and Signature private key (pk1, sk1) and (pk2, sk2).Extent of competence w is defined, and indicates message m and extent of competence with binary crelation R Between relationship.If R (w, m)=1, then it represents that m is within the interest field as defined in w;If R (w, m)=0, then it represents that m does not exist Within interest field as defined in w.
During commission, consigner selects agent authority of power range w.Consigner is input, trustee with (pk1, sk1, w) It is input with (pk2, sk2), both sides interact or noninteractive mode is held consultation.Last trustee obtain (w, Psk), wherein psk is allograph private key within interest field w as defined in consigner.Trustee can use psk in w In the range of regulation, signed with the name of consigner.
During allograph, trustee after acquisition (w, psk) and consigner's public key pk1, to message m into Row allograph.Generate allograph psig.
In verification process, verifier is input with w, pk1, pk2, m, psig.If meeting R (w, m)=1, and sign It is verified, then it represents that the signature is the signature of trustee commission order side in the range of w;It otherwise, then is not legal label Name is not being entrusted in range.
Fig. 2 and Fig. 3 respectively illustrates the block chain agent authorization method of the invention based on allograph of the invention Two stages of embodiment: commission stage and application execution stage.Referring to figs. 2 and 3, the implementation steps of the present embodiment are described in detail such as Under.
In commission phase user on demand by a part of delegation of oneself to core node.Detailed process is as shown in Figure 2.
1. user is input with public key pk1, signature private key sk1 and customized commission range w as consigner.Core section Point is input with its public key pk2, signature private key sk2 as trustee.Wherein, commission range w can be disappearing of can signing The range of breath, timeliness and number etc., it is specific to be arranged depending on actual scene.
2. user will entrust the delegation in range w to core node according to the commission process of allograph.Specifically Commission process is related to allograph, can be it is interactive be also possible to it is noninteractive.
3. core node exports (w, psk), wherein psk is the commission signature private key of corresponding commission range w.Core node makes It is signed with psk to the message in commission range.
In the application execution stage, user applies for that core node agency executes corresponding operating.Specific process is as shown in Figure 3.
1. user files an application to core node, it is denoted as m.The user can be different from the commission user in stage, can be The associated user of matter entrusted.User also needs to provide testimonial material proof while filing an application.The testimonial material can be with It is paper material, is also possible to electronic material.
2. the testimonial material proof of core node certification user.If do not passed through, application failure is returned.If passed through, Core node checks whether related side is that it entrusts corresponding authority, i.e., whether the opereating specification of inspection user application is in the commission stage Within the scope of defined w expression.
3. after core node determination possesses corresponding authority, entrusting signature private key psk to the Shen of user using the commission stage Please content m sign, generate psig.Allograph psig is sent to intelligent contract.
4. intelligent contract first verifies that operation whether within the scope of authority, i.e., whether verifying R (m, w)=1 is correct.Its It is secondary, it is whether correct using the public key pk1 of user and the public key pk2 verifying allograph psig of core node.If verifying is all logical It crosses, then intelligent contract executes the operation of user's application.
In addition, storing computer program, computer journey on medium the invention also discloses a kind of computer-readable medium Sequence is used to execute the block chain agent authorization method based on allograph as in previous embodiment.
Although for simplify explain the above method is illustrated to and is described as a series of actions, it should be understood that and understand, The order that these methods are not acted is limited, because according to one or more embodiments, some movements can occur in different order And/or with from it is depicted and described herein or herein it is not shown and describe but it will be appreciated by those skilled in the art that other Movement concomitantly occurs.
Those skilled in the art will further appreciate that, the various illustratives described in conjunction with the embodiments described herein Logic plate, module, circuit and algorithm steps can be realized as electronic hardware, computer software or combination of the two.It is clear Explain to Chu this interchangeability of hardware and software, various illustrative components, frame, module, circuit and step be above with Its functional form makees generalization description.Such functionality be implemented as hardware or software depend on concrete application and It is applied to the design constraint of total system.Technical staff can realize every kind of specific application described with different modes Functionality, but such realization decision should not be interpreted to cause departing from the scope of the present invention.
General place can be used in conjunction with various illustrative logic plates, module and the circuit that presently disclosed embodiment describes Reason device, digital signal processor (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA) other are compiled Journey logical device, discrete door or transistor logic, discrete hardware component or its be designed to carry out function described herein Any combination is realized or is executed.General processor can be microprocessor, but in alternative, which, which can be, appoints What conventional processor, controller, microcontroller or state machine.Processor is also implemented as calculating the combination of equipment, example As DSP and the combination of microprocessor, multi-microprocessor, the one or more microprocessors to cooperate with DSP core or it is any its His such configuration.
The step of method or algorithm for describing in conjunction with embodiment disclosed herein, can be embodied directly in hardware, in by processor It is embodied in the software module of execution or in combination of the two.Software module can reside in RAM memory, flash memory, ROM and deposit Reservoir, eprom memory, eeprom memory, register, hard disk, removable disk, CD-ROM or known in the art appoint In the storage medium of what other forms.Exemplary storage medium is coupled to processor so that the processor can be from/to the storage Medium reads and writees information.In alternative, storage medium can be integrated into processor.Pocessor and storage media can It resides in ASIC.ASIC can reside in user terminal.In alternative, pocessor and storage media can be used as discrete sets Part is resident in the user terminal.
In one or more exemplary embodiments, described function can be in hardware, software, firmware, or any combination thereof Middle realization.If being embodied as computer program product in software, each function can be used as one or more item instructions or generation Code may be stored on the computer-readable medium or be transmitted by it.Computer-readable medium includes computer storage medium and communication Both media comprising any medium for facilitating computer program to shift from one place to another.Storage medium can be can quilt Any usable medium of computer access.It is non-limiting as example, such computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage apparatus can be used to carrying or store instruction Or data structure form desirable program code and any other medium that can be accessed by a computer.Any connection is also by by rights Referred to as computer-readable medium.For example, if software is using coaxial cable, fiber optic cables, twisted pair, digital subscriber line (DSL) or the wireless technology of such as infrared, radio and microwave etc is passed from web site, server or other remote sources It send, then the coaxial cable, fiber optic cables, twisted pair, DSL or such as infrared, radio and microwave etc is wireless Technology is just included among the definition of medium.Disk (disk) and dish (disc) as used herein include compression dish (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc, which disk (disk) are often reproduced in a manner of magnetic Data, and dish (disc) with laser reproduce data optically.Combinations of the above should also be included in computer-readable medium In the range of.
Offer is to make any person skilled in the art all and can make or use this public affairs to the previous description of the disclosure It opens.The various modifications of the disclosure all will be apparent for a person skilled in the art, and as defined herein general Suitable principle can be applied to other variants without departing from the spirit or scope of the disclosure.The disclosure is not intended to be limited as a result, Due to example described herein and design, but should be awarded and principle disclosed herein and novel features phase one The widest scope of cause.

Claims (10)

1. a kind of block chain agent authorization method based on allograph, which is characterized in that executed including commission stage and application Stage, wherein
In commission the first user of stage on demand by a part of delegation of oneself to core node, the commission stage is further wrapped It includes:
First user is input, core node with public key pk1, signature private key sk1 and customized commission range w as consigner As trustee with its public key pk2, signature private key sk2 be input;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses psk It signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage further wraps It includes:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through core Whether heart node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
Application after core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user Content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 of first user and the public key of core node within the scope of authority Pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
2. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that customized Commission range w includes but is not limited to: range, timeliness and the number for the message that can be signed.
3. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that user will entrust Ask the delegation in range w related to allograph to the commission process of core node, can be it is interactive be also possible to it is non- Interactive.
4. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that the first user It can be same user with second user;It is also possible to different users, wherein second user is the first user of matter entrusted Associated user.
5. the block chain agent authorization method according to claim 1 based on allograph, which is characterized in that intelligent contract Whether the processing within the scope of authority refers to whether verifying R (m, w)=1 is correct, and wherein binary crelation R indicates application to verification operation Relationship between m and extent of competence w, R (m, w)=1 indicate m within the interest field as defined in w, and R (m, w)=0 indicates that m does not exist Within interest field as defined in w.
6. a kind of computer-readable medium, including the computer program stored on medium, the computer program for execute with Under the block chain agent authorization method based on allograph:
In commission the first user of stage on demand by a part of delegation of oneself to core node, the commission stage is further wrapped It includes:
First user is input, core node with public key pk1, signature private key sk1 and customized commission range w as consigner As trustee with its public key pk2, signature private key sk2 be input;
According to the commission process of allograph, the first user will entrust the delegation in range w to core node;
Core node exports (w, psk), and wherein psk is the commission signature private key of corresponding commission range w, and core node uses psk It signs to the message in commission range;
In application, execution stage second user application core node agency executes corresponding operating, and the application execution stage further wraps It includes:
Second user files an application m to core node, while providing testimonial material;
Core node authenticates the testimonial material of second user, and application failure is returned if certification does not pass through, if certification passes through core Whether heart node checks the opereating specification of second user application within the commission range w as defined in the commission stage;
Application after core node determination possesses corresponding authority, using the commission signature private key psk in commission stage to second user Content m signs, and is sent to intelligent contract after generating allograph psig;
Whether intelligent contract verification operation recycles the public key pk1 of first user and the public key of core node within the scope of authority Pk2 verifies whether allograph psig is correct, and intelligent contract executes the operation that user applies for m if being verified.
7. computer-readable medium according to claim 6, which is characterized in that customized commission range w includes but not It is limited to: range, timeliness and the number for the message that can be signed.
8. computer-readable medium according to claim 6, which is characterized in that user will entrust the permission generation in range w Manage it is related to allograph to the commission process of core node, can be it is interactive be also possible to it is noninteractive.
9. computer-readable medium according to claim 6, which is characterized in that the first user and second user can be together One user;It is also possible to different users, wherein second user is the associated user of the first user of matter entrusted.
10. computer-readable medium according to claim 6, which is characterized in that whether intelligent contract verification operation is being awarded Processing in power range refers to whether verifying R (m, w)=1 is correct, and wherein binary crelation R is indicated between application m and extent of competence w Relationship, R (m, w)=1 indicates that m within the interest field as defined in w, R (m, w)=0 indicate the m not interest field as defined in w Within.
CN201710475320.6A 2017-06-21 2017-06-21 Block chain agent authorization method and medium based on agent signature Active CN109104396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710475320.6A CN109104396B (en) 2017-06-21 2017-06-21 Block chain agent authorization method and medium based on agent signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710475320.6A CN109104396B (en) 2017-06-21 2017-06-21 Block chain agent authorization method and medium based on agent signature

Publications (2)

Publication Number Publication Date
CN109104396A true CN109104396A (en) 2018-12-28
CN109104396B CN109104396B (en) 2021-03-16

Family

ID=64796220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710475320.6A Active CN109104396B (en) 2017-06-21 2017-06-21 Block chain agent authorization method and medium based on agent signature

Country Status (1)

Country Link
CN (1) CN109104396B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922155A (en) * 2019-03-18 2019-06-21 众安信息技术服务有限公司 The method and device of intelligent agent is realized in block chain network
CN110009348A (en) * 2019-03-25 2019-07-12 杭州秘猿科技有限公司 A kind of allograph method, system and the electronic equipment of block chain
CN110177109A (en) * 2019-06-04 2019-08-27 北京理工大学 A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain
CN110223085A (en) * 2019-05-25 2019-09-10 深圳市元征科技股份有限公司 A kind of data processing method, server and computer-readable medium
CN110545177A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for life service platform user
CN110958223A (en) * 2019-10-31 2020-04-03 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain
CN111104688A (en) * 2019-11-13 2020-05-05 上海链颉科技有限公司 Public and private key authority proxy method, system and storage medium based on block chain
CN111444273A (en) * 2020-03-24 2020-07-24 腾讯科技(深圳)有限公司 Data authorization method and device based on block chain
CN111563273A (en) * 2020-04-30 2020-08-21 中国银行股份有限公司 Information verification method and related equipment
CN112100178A (en) * 2020-09-08 2020-12-18 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN114710507A (en) * 2022-03-30 2022-07-05 蚂蚁区块链科技(上海)有限公司 Consensus method and block link point
TWI840295B (en) * 2023-08-23 2024-04-21 中華電信股份有限公司 Proxy signature system and method for nft

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI812574B (en) * 2023-02-01 2023-08-11 中華電信股份有限公司 Agent authorization system and agent authorization method using nft technology

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719765A (en) * 2005-08-03 2006-01-11 武汉理工大学 Safety reliable controllable authorization electronic autographing method
CN1737721A (en) * 2005-08-03 2006-02-22 武汉理工大学 Authorization controlled electronic signature method based on elliptical curve
CN101262344A (en) * 2008-04-25 2008-09-10 武汉理工大学 An efficient quick authorization electronic signature method
CN101267296A (en) * 2008-04-25 2008-09-17 武汉理工大学 An efficient authorization electronic signature method without authentication center
CN102404726A (en) * 2011-11-18 2012-04-04 重庆邮电大学 Distributed control method for information of accessing internet of things by user
CN103596167A (en) * 2013-10-25 2014-02-19 西安电子科技大学 Machine-type communication authentication and key agreement method based on proxy
CN103870724A (en) * 2012-12-12 2014-06-18 财团法人资讯工业策进会 Main management device, agent management device, electronic device and authorization management method
CN106097006A (en) * 2016-06-09 2016-11-09 杭州复杂美科技有限公司 Block chain charge mode
CN106570681A (en) * 2016-10-28 2017-04-19 山东明和软件有限公司 Anti-tampering private fund electronic contract signing system and method based on block chain
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719765A (en) * 2005-08-03 2006-01-11 武汉理工大学 Safety reliable controllable authorization electronic autographing method
CN1737721A (en) * 2005-08-03 2006-02-22 武汉理工大学 Authorization controlled electronic signature method based on elliptical curve
CN101262344A (en) * 2008-04-25 2008-09-10 武汉理工大学 An efficient quick authorization electronic signature method
CN101267296A (en) * 2008-04-25 2008-09-17 武汉理工大学 An efficient authorization electronic signature method without authentication center
CN102404726A (en) * 2011-11-18 2012-04-04 重庆邮电大学 Distributed control method for information of accessing internet of things by user
CN103870724A (en) * 2012-12-12 2014-06-18 财团法人资讯工业策进会 Main management device, agent management device, electronic device and authorization management method
CN103596167A (en) * 2013-10-25 2014-02-19 西安电子科技大学 Machine-type communication authentication and key agreement method based on proxy
CN106097006A (en) * 2016-06-09 2016-11-09 杭州复杂美科技有限公司 Block chain charge mode
CN106570681A (en) * 2016-10-28 2017-04-19 山东明和软件有限公司 Anti-tampering private fund electronic contract signing system and method based on block chain
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922155B (en) * 2019-03-18 2022-03-04 众安信息技术服务有限公司 Method and device for realizing intelligent agent in block chain network
CN109922155A (en) * 2019-03-18 2019-06-21 众安信息技术服务有限公司 The method and device of intelligent agent is realized in block chain network
CN110009348A (en) * 2019-03-25 2019-07-12 杭州秘猿科技有限公司 A kind of allograph method, system and the electronic equipment of block chain
CN110223085A (en) * 2019-05-25 2019-09-10 深圳市元征科技股份有限公司 A kind of data processing method, server and computer-readable medium
CN110177109A (en) * 2019-06-04 2019-08-27 北京理工大学 A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain
CN110545177A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for life service platform user
CN110958223A (en) * 2019-10-31 2020-04-03 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain
CN110958223B (en) * 2019-10-31 2023-03-24 百度在线网络技术(北京)有限公司 Delegation authorization method, device, equipment and medium based on block chain
CN111104688A (en) * 2019-11-13 2020-05-05 上海链颉科技有限公司 Public and private key authority proxy method, system and storage medium based on block chain
CN111444273A (en) * 2020-03-24 2020-07-24 腾讯科技(深圳)有限公司 Data authorization method and device based on block chain
CN111444273B (en) * 2020-03-24 2021-09-10 腾讯科技(深圳)有限公司 Data authorization method and device based on block chain
CN111563273A (en) * 2020-04-30 2020-08-21 中国银行股份有限公司 Information verification method and related equipment
CN112100178A (en) * 2020-09-08 2020-12-18 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112100178B (en) * 2020-09-08 2023-05-12 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN114710507A (en) * 2022-03-30 2022-07-05 蚂蚁区块链科技(上海)有限公司 Consensus method and block link point
CN114710507B (en) * 2022-03-30 2023-10-27 蚂蚁区块链科技(上海)有限公司 Consensus method, blockchain node, medium and consensus node
TWI840295B (en) * 2023-08-23 2024-04-21 中華電信股份有限公司 Proxy signature system and method for nft

Also Published As

Publication number Publication date
CN109104396B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN109104396A (en) A kind of block chain agent authorization method based on allograph, medium
CN108701145B (en) System and method for digital identity management and admissions control in distributed network node
CN109314636B (en) Cryptographic method and system for secure extraction of data from blockchains
CN109377198A (en) A kind of signing system known together in many ways based on alliance's chain
CN109345259A (en) Virtual resource transfer method, device, medium and electronic equipment based on block chain
CN113204744B (en) Software authorization system and method based on distributed identity
CN109246197A (en) Data processing method and device based on intelligent contract
CN109194465A (en) For managing method, user equipment, management equipment, storage medium and the computer program product of key
CN108830716A (en) The transaction system of protection privacy of user based on block chain and encryption
CN108876669A (en) Course notarization system and method applied to multi-platform shared education resources
CN110516417A (en) A kind of method for verifying authority and device of intelligence contract
CN111160803A (en) Business process safety and management method and system based on block chain
CN109982150A (en) The trust chain method for building up and Intelligent television terminal of Intelligent television terminal
CN107634989A (en) A kind of cloud wallet construction method and server
CN114418570B (en) Method and device for processing non-homogeneous pass based on blockchain
Grüner et al. On the relevance of blockchain in identity management
Zou et al. Application of blockchain digital identity technology in healthcare consumer finance system
Rustemi et al. Identification During Verification Of Diplomas In The Blockchain System
KR20210086074A (en) Block Chain Management System To Build Block Chain Network
CN114448639B (en) Decentralized identity system with uniqueness and secret key safety and implementation method
Zhang et al. FutureText: A blockchain-based contract signing prototype with security and convenience
CN115760422A (en) Electric power market transaction system and method based on block chain technology
CN112968772B (en) Cross-chain decoupling method and system for block chain data
Kavassalis Designing an academic electronic identity management system for student mobility using eidas eid and self-sovereign identity technologies
CN115345729A (en) Credit card issuing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230412

Address after: 200127 2nd floor, building 10, Lujiazui Software Park, 91 Eshan Road, Pudong New Area, Shanghai

Patentee after: SHANGHAI JUZIX FINANCE INFORMATION SERVICES CO.,LTD.

Patentee after: WUHAN University

Address before: 200127 2nd floor, building 10, Lujiazui Software Park, 91 Eshan Road, Pudong New Area, Shanghai

Patentee before: SHANGHAI JUZIX FINANCE INFORMATION SERVICES CO.,LTD.