CN110009348B - Block chain proxy signature method and system and electronic equipment - Google Patents

Block chain proxy signature method and system and electronic equipment Download PDF

Info

Publication number
CN110009348B
CN110009348B CN201910228469.3A CN201910228469A CN110009348B CN 110009348 B CN110009348 B CN 110009348B CN 201910228469 A CN201910228469 A CN 201910228469A CN 110009348 B CN110009348 B CN 110009348B
Authority
CN
China
Prior art keywords
signature
transaction
proxy
user
proxy signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910228469.3A
Other languages
Chinese (zh)
Other versions
CN110009348A (en
Inventor
王晓亮
陈迪波
包俊
王博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Cryptape Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryptape Co ltd filed Critical Cryptape Co ltd
Priority to CN201910228469.3A priority Critical patent/CN110009348B/en
Publication of CN110009348A publication Critical patent/CN110009348A/en
Application granted granted Critical
Publication of CN110009348B publication Critical patent/CN110009348B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention discloses a block chain proxy signature method, a block chain proxy signature system and electronic equipment, wherein the block chain proxy signature method comprises the following steps: receiving agent signature information set by a user and generating a brand-new public and private key pair and an agent signature address; generating a first transaction based on a user address, an agent signature address, an application address and agent signature information, and requesting and acquiring the authorization of the user to the first transaction signature so as to complete the setting of the agent signature; and executing the transaction request of the user by applying the proxy signature. Therefore, in the process of applying the signature to the block chain, the user can carry out the password-free signature with limited time and limited quota, and the password is prevented from being frequently input, so that the use cost of the block chain is simplified, and the use experience of the user is improved.

Description

Block chain proxy signature method and system and electronic equipment
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a method and a system for proxy signature of a block chain, and an electronic device.
Background
In the traditional internet banking/third party payment application, because the secret key is stored in a centralized manner, developers can easily carry out time-limited and quota non-signed payment, so that the user experience is greatly improved in a small-quota and multi-frequency scene. Due to the unique technical characteristics of the blockchain application, a user needs to input a password of a private key to sign a transaction each time the user interacts with the blockchain. Therefore, when the blockchain application is used, the password needs to be input continuously, so that the use experience of the blockchain is greatly reduced, and the requirement of commercial use cannot be met.
With the continuous development of blockchain applications, the problem will become more severe due to the abundance of blockchain application scenarios.
Disclosure of Invention
The embodiment of the specification provides a proxy signature method and system of a block chain and electronic equipment, and is used for solving the problem that a user needs to input a password frequently when applying a signature to the block chain.
In order to solve the above technical problem, the embodiments of the present specification adopt the following technical solutions:
in a first aspect, a method for proxy signature of a blockchain is provided, where the method includes:
receiving agent signature information set by a user, and generating a brand-new public and private key pair and an agent signature address based on the agent signature information;
generating a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requesting the user to sign and authorize the first transaction;
acquiring the authorization of the first transaction signature by the user to complete the setting of the proxy signature;
acquiring a request of a user for executing a second transaction by applying the proxy signature; the transaction information carried by the second transaction comprises transaction time and transaction amount;
and signing and sending the second transaction by using a private key in the brand new public and private key pair to complete the transaction.
In a second aspect, a proxy signature system for a blockchain is provided, the system comprising:
a setting generation module: receiving agent signature information set by a user, and generating a brand-new public and private key pair and an agent signature address based on the agent signature information; and generating a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requesting and acquiring the authorization of the first transaction signature by the user to complete the setting of the proxy signature.
A signature calling module: when a user requests to apply the proxy signature to execute transaction, judging whether the information of the transaction is matched with the proxy signature information set by the user; and if the judgment result is matching, using the private key in the public and private keys to sign and send the transaction, and finishing the transaction.
In a third aspect, a computer device is provided, the device comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the blockchain proxy signature method as described in the embodiments above.
In a fourth aspect, a storage medium is provided, in which a computer program is stored, the computer program, when executed by a processor, implementing the block chain proxy signature method according to the above embodiments.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
according to the technical scheme of the specification, the setting of the proxy signature is realized based on the user address, the proxy signature address, the application address and the proxy signature information set by the user; and when the user initiates the transaction, applying the proxy signature to execute the transaction. Therefore, in the process of applying the signature to the block chain, the user can carry out the password-free signature with limited time and limited quota, and the password is prevented from being frequently input, so that the use cost of the block chain is simplified, and the use experience of the user is improved; the embodiment of the specification has better safety, point-to-point authorization can only carry out proxy signature in authorization application, so that an attacker has no profit and can trace all transactions by one hundred percent, and disputes are avoided.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative efforts.
Fig. 1 is a schematic flowchart of a proxy signature method for a blockchain according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a proxy signature system architecture of a block chain according to an embodiment of the present application;
fig. 3 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without any creative effort belong to the protection scope of the embodiments in the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Example one
Referring to fig. 1, a schematic flow chart of a proxy signature method for a blockchain according to an embodiment of the present disclosure is shown, where the proxy signature method is used by a blockchain application developer, and as long as a user authorizes the application developer to use the method, the user can perform a limited time secret-free signature, which is particularly suitable for an application scenario of small-amount high-frequency transaction. The proxy signature method comprises the following steps:
step 101: and receiving agent signature information set by a user, and generating a brand new public and private key pair and an agent signature address based on the agent signature information.
When the method is used, an application generates a brand new public and private key pair. The public-private key pair corresponds to a blockchain address, which is a proxy signature address (signature account) and is an address for carrying out limited-time secret-free transaction with a user during proxy signature. Once the user inputs the password for the first time to authorize the application developer to use the method, the application developer can initiate the password-free transaction with limited time and quota by using the private key generated by the application developer within the authorization range without repeated signature of the user.
In the embodiment of the application, a user signature interface is configured, a user can select to use the proxy signature or the autonomous signature in the user signature interface, and proxy signature information can be set.
In specific implementation, the proxy signature information set by the user in the embodiment of the present application at least includes one of a proxy signature time range, a maximum number of times of proxy signatures, a single maximum value of proxy signatures, and an overall maximum value of proxy signatures.
It should be understood that the proxy signature time range refers to the time range between the start time and the end time of the proxy signature. Start time: the time at which the transaction of the authorized agent signature method is determined by the blockchain. End time: a desired end time entered by the user. Within this time frame, the user is able to conduct a limited time limit of a privacy-exempt transaction.
It should be understood that the maximum number of times a proxy signature is signed refers to the number of times the user succeeds in cryptographically-free signing. First, the maximum number of times of proxy signature is the number of times of successful secret-free signature. Assuming that the monetary parameter in a certain signature is higher than the single highest value of the proxy signature, the signature will fail. Therefore, the signature is failed and will not be recorded in the number of proxy signatures. Secondly, due to the determined delay of the blockchain transaction, when the transaction with the determined proxy signature and the transaction without the proxy signature are greater than the maximum number of times of the proxy signature, the transaction needs the user to carry out signature or needs the user to carry out a proxy signature method authorized again.
It should be understood that the single highest value of the proxy signature refers to the highest value of the amount that the user is able to transact using the proxy signature.
It should be understood that the agent signature overall highest value refers to the highest total amount of transactions that the agent signature address can proxy for during agent signature authorization. In a successful transaction of the proxy signature, the token numbers of all transactions are added to a proxy signature overall value. Due to the determined delay of the blockchain transaction, when the transaction token value is determined by the proxy signature and the transaction token value is not determined by the proxy signature and is greater than the overall maximum value of the proxy signature, the user is required to carry out signature in the transaction, or the user is required to carry out proxy signature authorization again.
Step 102: and generating a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requesting the user to sign and authorize the first transaction.
It should be understood that in the embodiment of the present application, the user address is an address of an authorized agent signature, and is generally an address of an application user.
It should be understood that, in the embodiment of the present application, the application address is a contract address of an application developer where a transaction is located, and is an address for creating a brand-new public and private key pair and using a proxy signature function.
Step 103: and acquiring the authorization of the user for signing the first transaction to complete the setting of the proxy signature.
Optionally, in this embodiment of the present application, assuming that the user finds the application developer doing malicious, the user may report to the blockchain operator to request to return to the token.
Step 104: a request for the user to perform a second transaction using the proxy signature is obtained.
During specific implementation, a user initiates a second transaction and requests to apply the proxy signature to execute the second transaction; the transaction information carried by the second transaction comprises transaction time and transaction amount.
Step 105: and signing and sending the second transaction by using a private key in the brand new public and private key pair to complete the transaction.
In specific implementation, when a user requests to apply the proxy signature, whether the transaction information of the second transaction is matched with proxy signature information set by the user needs to be judged; and if the judgment result is matching, signing and sending the second transaction.
It should be understood that, it is determined whether the transaction information of the second transaction matches the agent signature information set by the user, specifically, whether the following conditions are simultaneously satisfied:
1) the proxy signature has been authorized by the user;
2) the transaction time is within the proxy signature time range;
3) the number of successful transactions using the proxy signature is less than the maximum number of proxy signatures;
4) the transaction amount is less than or equal to the single highest value of the proxy signature;
5) the sum of the transaction amount and the accumulated amount of successful transactions of the proxy signature is less than or equal to the total maximum value of the proxy signature.
If the two conditions are met, the judgment result is matching, and at the moment, the private key generated when the proxy signature is set can be used for signing and sending the transaction to finish the transaction.
If at least one item is not satisfied, judging that the items are not matched, failing to sign the proxy, and returning to the user signature page. In the user signature interface, the user can choose to use the autonomous signature or reset the proxy signature information so that the proxy signature information is matched with the transaction information of the user, and then the transaction is completed by using the proxy signature.
It should be appreciated that in embodiments of the present application, when the current transaction is completed using the proxy signature, the number of successful transactions and the amount of successful transactions for the proxy signature are updated. And when the agent signature fails, the successful transaction times and the accumulated amount of the successful transactions of the agent signature are not updated.
Optionally, in an embodiment of the present application, a step of proxy signature arbitration is further included. Since the blockchain proxy signature method gives the right to sign to the developer, it is necessary to supervise and restrict the right of the developer and protect the user in case of possible problems, coordinating the relationship between the developer and the user.
In specific implementation, the agent signature arbitration mechanism is as follows: the proxy signature address transactions using the proxy signature can be arbitrated for security when one of the following 2 conditions is met. Specific ways of being arbitrated for security include, but are not limited to, the token amount of the transaction being frozen.
a) The proxy signature time is over;
b) the agent signature reaches the total maximum value within a certain time; the time is set by the user, such as within 24 hours.
It should be understood that in embodiments of the present application, the user may also make an arbitration complaint, assuming the application developer is doing malicious.
It should be noted that, in the embodiment of the present application, the user can use the original private key to revoke the authority of the proxy private key at any time. And, the user can use the original private key to obtain the rights of the proxy private key at any time (for example, the account corresponding to the proxy private key holds some kind of digital assets).
By the technical scheme, an application developer receives agent signature information set by a user and generates a brand-new public and private key pair and an agent signature address based on the agent signature information; the application developer generates a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requests the user to sign and authorize the first transaction; the user confirms and signs and authorizes the first transaction, and the setting of the proxy signature is completed; the user initiates a second transaction, and requests to apply the proxy signature to execute the second transaction; and after application confirmation, an authorized private key generated when the agent signature information is set is used for carrying out signature sending on the transaction, and the transaction is completed. Therefore, in the process of applying the signature to the block chain, the user can carry out the password-free signature with limited time and limited amount, and frequent password input is avoided, so that the use cost of the block chain is simplified, the use experience of the user is improved, and the safety is better.
Next, an embodiment of the present specification will be described with reference to a specific example.
The player A and the player B play a piece of block chain chess game on line, wherein the player A sets block chain agent signature information in advance, and the player B does not set the block chain agent signature information.
Firstly, player a sets block chain agent signature information in advance, and the specific operations are as follows:
the player A sets and selects to use the proxy signature on a Chinese chess user signature interface, sets proxy signature information, and the Chinese chess application generates a brand new public and private key based on the proxy signature information and takes a derived block chain address as a proxy signature address.
The set proxy signature information includes a proxy signature time range: the starting time is the time determined by the block chain for the transaction of the authorized agent signature method, and the ending time is 1 hour later; maximum number of proxy signatures: 100 times; single highest value of proxy signature: 1 unit; overall maximum value of proxy signature: 100 units.
And the chess application assembles a user address, the proxy signature address, an application address and the proxy signature information into a transaction request player A for signature authorization.
In this example, the user address is the player A address.
The proxy signature address is the generated blockchain address.
The application address is a contract address of the chess application.
Player B does not set blockchain agent signature information, i.e., player B selects to use an autonomous signature at the chess user signature interface setting.
Starting a game, wherein a player A starts, the chess application judges that the player A has set an agent signature, the judgment time is in the end time range of the agent signature, the number of times of the agent signature is judged to be less than 100, the transaction cost is judged to be less than 1 unit, the highest accumulated total transaction is judged to be less than 100 units at most, and finally, the agent signature can be confirmed. The chess application then signs the transaction using the authorized private key generated when the agent signature information is set. After the transaction is confirmed, player A completes his chess.
When the player B moves chess, the player B needs to sign independently every time, and the efficiency is very low.
Example two
An embodiment of the present application further provides a proxy signature system for a blockchain, and as shown in fig. 2, the system includes:
the setting generation module 21: receiving agent signature information set by a user, and generating a brand-new public and private key pair and an agent signature address based on the agent signature information; and generating a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requesting and acquiring the authorization of the first transaction signature by the user to complete the setting of the proxy signature.
The signature calling module 22: when a user requests to apply the proxy signature to execute transaction, judging whether the information of the transaction is matched with the proxy signature information set by the user; and if the judgment result is matching, using the private key in the public and private keys to sign and send the transaction, and finishing the transaction.
In specific implementation, the method steps described in the first embodiment may be executed to implement the same functions, which are not described herein again.
By the technical scheme, an application developer receives agent signature information set by a user and generates a brand-new public and private key pair and an agent signature address based on the agent signature information; the application developer generates a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requests the user to sign and authorize the first transaction; the user confirms and signs and authorizes the first transaction, and the setting of the proxy signature is completed; the user initiates a second transaction, and requests to apply the proxy signature to execute the second transaction; and after application confirmation, an authorized private key generated when the agent signature information is set is used for carrying out signature sending on the transaction, and the transaction is completed. Therefore, in the process of applying the signature to the block chain, the user can carry out the password-free signature with limited time and limited amount, and frequent password input is avoided, so that the use cost of the block chain is simplified, the use experience of the user is improved, and the safety is better.
EXAMPLE III
The electronic apparatus of the embodiment of the present specification is described in detail below with reference to fig. 3. Referring to fig. 3, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a Non-Volatile Memory (Non-Volatile Memory), such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be interconnected by an internal bus, which may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 3, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads a corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form an offline signature device (specifically, the offline signature device may be an online wallet side or an offline signature side) on a logic level. And the processor is used for executing the program stored in the memory and is specifically used for executing the method operation executed when the server is taken as an execution main body.
The method disclosed in the embodiment of fig. 1 in the present specification may be applied to a processor, or may be implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present specification may be embodied directly in a hardware decoding processor, or in a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Of course, besides the software implementation, the electronic device of the embodiment of the present disclosure does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
An embodiment of the present specification further provides a computer device, where the computer device includes:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the blockchain proxy signature method as described in the previous embodiments.
Embodiments of the present specification further provide a storage medium storing a computer program, which when executed by a processor implements the block chain proxy signature method described in the foregoing embodiments.
The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the embodiments of the present disclosure should be included in the protection scope of the embodiments of the present disclosure.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are all described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.

Claims (11)

1. A proxy signature method of a blockchain is characterized by comprising the following steps:
receiving agent signature information set by a user, and generating a brand-new public and private key pair and an agent signature address based on the agent signature information;
generating a first transaction based on the user address, the proxy signature address, the application address and the proxy signature information, and requesting the user to sign and authorize the first transaction;
acquiring the authorization of the first transaction signature by the user to complete the setting of the proxy signature;
acquiring a request of a user for executing a second transaction by applying the proxy signature; the transaction information carried by the second transaction comprises transaction time and transaction amount;
judging whether the transaction information of the second transaction is matched with agent signature information set by a user;
if the judgment result is matching, the private key in the brand new public and private key pair is used for signing and sending the second transaction, and the transaction is completed;
if the judgment result is not matched, the proxy signature fails.
2. The method according to claim 1, wherein the proxy signature information includes at least one of a proxy signature time range, a maximum number of times of proxy signature, a single highest value of proxy signature, and an overall highest value of proxy signature.
3. The method of claim 2, wherein the start time of the proxy signature time range is the time determined by the blockchain for the first transaction, and the end time is set by user input; the maximum number of times of the proxy signature is the maximum number of times of transaction using the proxy signature; the single highest value of the proxy signature is the highest single amount which can be traded by using the proxy signature; the overall maximum value of the proxy signature is as follows: and within the agent signature time range, using the agent signature to trade the highest total amount.
4. The method of proxy signing of a blockchain according to claim 1, wherein the proxy signing address is an address of a new public-private key pair; the application address is a contract address of an application where a transaction is located, and is an address for creating a brand-new public and private key pair and using a proxy signature function; the user address is the address signed by the signature authorization agent.
5. The method according to claim 1, wherein it is determined whether the transaction information of the second transaction matches with the proxy signature information set by the user, specifically, whether the following conditions are satisfied at the same time: 1) the proxy signature is authorized by a user, 2) the transaction time is within the proxy signature time range, 3) the successful transaction times using the proxy signature are less than the maximum number of the proxy signature, 4) the transaction amount is less than or equal to the single maximum value of the proxy signature, and 5) the sum of the transaction amount and the accumulated amount of the successful transaction of the proxy signature is less than or equal to the total maximum value of the proxy signature; if the two are met, judging that the two are matched; if at least one item is not satisfied, the judgment result is mismatching.
6. The method of proxy signing of a blockchain according to claim 5, further comprising:
if the judgment result is matching, after the current transaction is finished, updating the successful transaction times and the successful transaction amount of the proxy signature;
and if the judgment result is not matched, the transaction cannot be executed by adopting the proxy signature, and the successful transaction times of the proxy signature and the accumulated amount of the successful transaction are not updated.
7. The method for agent signature of block chain according to any one of claims 1 to 6, characterized in that it further comprises an arbitration step for arbitrating the security of the transaction using the agent signature after the agent signature time is over or within a certain time after the agent signature total maximum value is reached.
8. The method of proxy signing of block chain according to any one of claims 1 to 6, wherein a user has the right to revoke a private key in the new public-private key pair using a legacy private key.
9. A blockchain proxy signature system, comprising:
a setting generation module: receiving agent signature information set by a user, and generating a brand-new public and private key pair and an agent signature address based on the agent signature information; generating a first transaction based on a user address, the proxy signature address, an application address and the proxy signature information, requesting and acquiring the authorization of the first transaction signature by the user to complete the setting of the proxy signature;
a signature calling module: when a user requests to apply the proxy signature to execute transaction, judging whether the information of the transaction is matched with the proxy signature information set by the user; and if the judgment result is matching, using the private key in the public and private keys to sign and send the transaction, and finishing the transaction.
10. A computer device, the device comprising: one or more processors; memory storing one or more programs that, when executed by the one or more processors, cause the one or more processors to implement the blockchain proxy signature method of any one of claims 1-8.
11. A storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the blockchain proxy signature method of any one of claims 1 to 8.
CN201910228469.3A 2019-03-25 2019-03-25 Block chain proxy signature method and system and electronic equipment Active CN110009348B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910228469.3A CN110009348B (en) 2019-03-25 2019-03-25 Block chain proxy signature method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910228469.3A CN110009348B (en) 2019-03-25 2019-03-25 Block chain proxy signature method and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN110009348A CN110009348A (en) 2019-07-12
CN110009348B true CN110009348B (en) 2022-03-11

Family

ID=67167968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910228469.3A Active CN110009348B (en) 2019-03-25 2019-03-25 Block chain proxy signature method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN110009348B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651053A (en) * 2020-12-30 2021-04-13 飞天诚信科技股份有限公司 Secret operation-free method and device for block chain terminal equipment

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825739B (en) * 2014-01-14 2017-03-22 西安电子科技大学 Authorization revocable directed proxy signature method
JP6267658B2 (en) * 2015-01-09 2018-01-24 日本電信電話株式会社 Signature generation apparatus, signature system, signature generation method, and program
CN106372940B (en) * 2016-08-31 2019-10-11 江苏通付盾科技有限公司 Identity identifying method, server and terminal device based on block chain network
CN107256484B (en) * 2017-03-17 2021-01-15 中国银联股份有限公司 Mobile payment authorization transfer method and payment system realized by using same
CN107453862B (en) * 2017-05-15 2023-05-30 杭州复杂美科技有限公司 Scheme for generating, storing and using private key
CN109104396B (en) * 2017-06-21 2021-03-16 上海钜真金融信息服务有限公司 Block chain agent authorization method and medium based on agent signature
GB2569278A (en) * 2017-10-23 2019-06-19 Cygnetise Ltd Methods and apparatus for verifying a user transaction
CN108764924A (en) * 2018-05-31 2018-11-06 飞天诚信科技股份有限公司 A kind of implementation method and device for exempting from close EMV contacts transaction
CN108809982B (en) * 2018-06-12 2020-10-27 飞天诚信科技股份有限公司 Secret-free authentication method and system based on trusted execution environment

Also Published As

Publication number Publication date
CN110009348A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN108898389B (en) Content verification method and device based on block chain and electronic equipment
CN108764870B (en) Transaction processing method and device based on block chain and electronic equipment
JP6940182B2 (en) Blockchain management device, blockchain management method and program
JP6859506B2 (en) Digital certificate management methods, devices, and systems
TWI701573B (en) Data storage method and device based on blockchain, and electronic equipment
JP6788697B2 (en) Methods and systems for information authentication
TWI741314B (en) Block chain-based data storage method and device, and electronic equipment
JP2020517134A (en) Quick decentralized consensus on the blockchain
CN105591743B (en) Method and device for identity authentication through equipment operation characteristics of user terminal
CN112100594B (en) Service processing method, device and equipment based on block chain
US11276069B2 (en) Risk payment processing method and apparatus, and device
WO2020037927A1 (en) Negotiable block chain transaction method, apparatus, device, and storage medium
CN107070871B (en) Identity verification method and device
CN111639308A (en) Software serial number distribution verification method and device based on block chain
TW202038122A (en) Blockchain-based service processing method and apparatus, and electronic device
CN111915317A (en) Payment processing method, device and system
CN110445768B (en) Login method and device and electronic equipment
CN110009348B (en) Block chain proxy signature method and system and electronic equipment
CN110675213A (en) Method and device for putting credit service product and electronic equipment
CN110599176A (en) Data processing method and device based on block chain, storage medium and node equipment
CN111884808B (en) Method and device for preventing transaction cross-chain replay and electronic equipment
CN112990940B (en) Enterprise authentication method and device
US20210342830A1 (en) Privacy-preserving decentralized payment instrument network
CN112861184A (en) Asset certification verification and generation method and device and electronic equipment
CN109150994B (en) Hotspot data processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190712

Assignee: Hangzhou Xita Technology Co.,Ltd.

Assignor: CRYPTAPE Co.,Ltd.

Contract record no.: X2022330000063

Denomination of invention: A proxy signature method, system and electronic device of blockchain

Granted publication date: 20220311

License type: Common License

Record date: 20220406

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231224

Address after: 10/F, Guotou Building, No. 398 Shaoxing Road, Gongshu District, Hangzhou City, Zhejiang Province, 310000

Patentee after: Hangzhou Xita Technology Co.,Ltd.

Address before: Room 1301, block a, Huaxing Times Square, 478 Wensan Road, Xihu District, Hangzhou City, Zhejiang Province, 310013

Patentee before: CRYPTAPE Co.,Ltd.