CN110443076A - Card method and system is deposited based on real name block chain - Google Patents
Card method and system is deposited based on real name block chain Download PDFInfo
- Publication number
- CN110443076A CN110443076A CN201910726179.1A CN201910726179A CN110443076A CN 110443076 A CN110443076 A CN 110443076A CN 201910726179 A CN201910726179 A CN 201910726179A CN 110443076 A CN110443076 A CN 110443076A
- Authority
- CN
- China
- Prior art keywords
- address
- related side
- verified
- message request
- destination address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Technology Law (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Card method and system is deposited based on real name block chain this application involves a kind of, it trades in the presence of signature three times and twice, transaction flow is initiated by transaction applicant, after carrying out first time signature to message request, message request is sent to related side, related side is after receiving message request, message request is identified, if and receiving invitation, then carry out first time transaction, message request and behavioural information are carried out second being sent in real name block chain after signing, it is then immutable to receive the behavior traded by related side in this way, to which destination address is after receiving related side and completing information uplink operation, then the behavioural information of related side is interpreted, and third time signature is carried out by obtained card information of depositing is interpreted, and the confirmation message after signature is sent in real name block chain by second of transaction.It can realize that law deposits card on real name block chain using this method.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of depositing card method and be based on real name block chain
System.
Background technique
Existing block chain technology is that unidirectional, nothing between role is carried out by each role on block chain when being traded
Respond and deposit without effective law the transaction of card.
Direction transaction participant is initiated by transaction to trade.In addition to playing coin operation there are other than realistic meaning in transaction,
It is invalid that the raw information that transaction carries may be considered unidirectional, law, because this process of exchange is that certain role is unidirectional
It issues, does not form closed loop between each role that trades, therefore do not have law and deposit card.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of be capable of providing law deposit card based on real name block
Chain deposits card method and system.
It is a kind of that card method is deposited based on real name block chain, which comprises
The applicant that trades obtains message request, and is signed by corresponding first private key of destination address to message request
Name, and according to the message request and destination address generation signature field after signature, the signature field is sent to phase
Guan Fang;
Message request of the related side after extracting the destination address and signature in the signature field, and pass through institute
It states destination address to verify the message request after the signature, if being verified, the related side generates and invites with described
Please the corresponding behavioural information of information, by corresponding second private key in the related side address of the related side to the behavioural information and
The message request is signed to obtain signing messages, and is initiated to trade for the first time and sent out signing messages and the related side address
Send the destination address into real name block chain;
The destination address verifies the signing messages by the related side address, if being verified, institute
It states destination address and gets and deposit card information, and card information is deposited and signing messages is signed to described by first private key
It is confirmed information, and initiates second of transaction and the confirmation message and the destination address is sent to the real name block chain
In the related side address.
The message request includes related side address to be verified in one of the embodiments,;It is described to pass through the target
Address is verified by the message request after the signature, comprising:
The message request after the signature is carried out by the destination address related side address to be verified is calculated;
Extract current address;
Judge whether the current address and the related side address to be verified are identical, if they are the same, are then verified, otherwise
Verifying does not pass through.
The behavioural information includes destination address to be verified in one of the embodiments,;The destination address passes through institute
Related side address is stated to verify the signing messages, comprising:
The destination address carries out the signing messages message request and row is calculated by the related side address
For information;
The destination address extracts related side address to be verified from the message request, extracts from the behavioural information
Destination address to be verified;
The destination address judges whether the address to be verified and the destination address are identical;If the address to be verified
It is identical as the destination address, judge whether the related side address and related side address to be verified are identical;If the related side
Address is identical as related side address to be verified, then is verified, otherwise verifies and do not pass through;If the address to be verified and the mesh
It is not identical to mark address, then verifies and does not pass through.
The message request includes inviting the time limit in one of the embodiments,;It is described by the destination address to institute
Message request after stating signature is verified, further includes:
The message request after the signature be calculated by the destination address and invites the time limit;
It is described judge the current address and the related side address to be verified it is whether identical after, further includes:
If the current address is identical as the related side address to be verified, current time is obtained, is judged described current
Whether the time in the invitation time limit, if so, being verified, is otherwise verified and is not passed through.
In one of the embodiments, it is described judge the related side address and related side address to be verified it is whether identical it
Afterwards, further includes:
If the related side address is identical as related side address to be verified, the response time in the behavioural information is judged
Whether in the invitation time limit, if so, being verified, otherwise verifies and do not pass through.
The message request includes payment information in one of the embodiments,;The related side generates and the invitation
The corresponding behavioural information of information, comprising:
Obtain the transaction value of type and quantity corresponding with the payment information;
The behavioural information is generated according to accessed transaction value.
The destination address tests the signing messages by the related side address in one of the embodiments,
Card, comprising:
The destination address carries out the signing messages message request and row is calculated by the related side address
For information;
The transaction value is extracted from the behavioural information, and the payment information is extracted from the message request;
Judge whether the transaction value is corresponding with the payment information, if corresponding, be verified, otherwise verify and do not lead to
It crosses.
A kind of deposit system based on real name block chain, the system comprises transaction applicant, related side and the transaction
The corresponding destination address of applicant and related side corresponding with related side address;
The transaction applicant passes through corresponding first private key of destination address to message request for obtaining message request
It signs, and according to the message request and destination address generation signature field after signature, the signature field is sent out
It send to related side;
The related side is used for the message request after extracting the destination address and signature in the signature field, and leads to
It crosses the destination address to verify the message request after the signature, if being verified, the related side generates and institute
The corresponding behavioural information of message request is stated, the behavior is believed by corresponding second private key in the related side address of the related side
Breath and the message request are signed to obtain signing messages, and initiate to trade for the first time by signing messages and the related side
Location is sent to the destination address in real name block chain;
The destination address is for verifying the signing messages by the related side address, if being verified,
Then the destination address, which is got, deposits card information, and deposits card information and signing messages progress to described by first private key
Signature is confirmed information, and initiates second of transaction and the confirmation message and the destination address are sent to the real name area
The related side address in block chain.
The message request includes related side address to be verified in one of the embodiments,;
The related side be also used to by the destination address to the message request after the signature be calculated to
Verify related side address;Extract current address;Judge whether the current address and the related side address to be verified are identical, if
It is identical, then it is verified, otherwise verifies and do not pass through.
The behavioural information includes destination address to be verified in one of the embodiments,;
The destination address is also used to by the related side address carry out that invitation letter is calculated to the signing messages
Breath and behavioural information;Related side address to be verified is extracted from the message request, is extracted from the behavioural information to be verified
Destination address;Judge whether the address to be verified and the destination address are identical;If the address to be verified and the target
Address is identical, judges whether the related side address and related side address to be verified are identical;If the related side address with it is to be tested
It is identical to demonstrate,prove related side address, then is verified, otherwise verifies and do not pass through;If the address to be verified and the destination address not phase
Together, then it verifies and does not pass through.
It is above-mentioned that card method and system is deposited based on real name block chain, there is signature three times and trade twice, i.e., by Shen of trading
Transaction flow is please just initiated, after carrying out first time signature to message request by the first private key of destination address, message request is sent
To related side, related side identifies message request after receiving message request, and if receive invitation, carry out first
Message request and behavioural information are carried out second being sent in real name block chain after signing by secondary transaction, such related side connects
The behavior traded is then immutable, thus destination address receive related side complete information uplink operation after, then to correlation
The behavioural information of side is interpreted, and carries out third time signature for obtained card information of depositing is interpreted, and by the confirmation letter after signature
Breath is sent in real name block chain by second of transaction, forms the smallest law card by transaction twice of signing three times in this way
According to triangle, so that block chain transaction whole flow process is formed logic from being in harmony, so that entire transaction forms closed loop, form and protected by law
Shield and the minimum law of supervision effectively deposit card unit.And by signing three times, signed under a not homologous ray of code insurance Guan San three times
Private key signed and issued, and there is very strong logical relation, the system of any one attacked by the hacker for not knowing about business inside story
It hits, and is unable to complete the process of a whole set of signing, effective law chain cannot be formed.
Detailed description of the invention
Fig. 1 is the application scenario diagram for depositing card method based on real name block chain in one embodiment;
Fig. 2 is the flow diagram for depositing card method based on real name block chain in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
It is provided by the present application that card method is deposited based on real name block chain, it can be applied in application environment as shown in Figure 1.
Wherein, including trade applicant 102 and multiple related sides 104 generate originally wherein transaction applicant 102 initiates transaction flow
The destination address 106 of secondary transaction, transaction applicant 102, which can orient, invites the either non-directional of related side 104 to invite related side
104, message request is generated, and carry out first time signature.Related side 104 is in the transaction application for receiving transaction applicant's sending
Afterwards, the message request that identification transaction applicant 102 issues, if receiving the transaction application with transaction applicant 102, with target
Location 106 is traded, and the cochain of message request and behavioural information is completed, i.e. first time cochain is traded, right by related side 104 here
Message request and behavioural information are signed, i.e. second of signature.When destination address 106 confirms on message request and behavioural information
It after chain, is returned from process address 106 to related side 104 and deposits card information, is i.e. second of cochain transaction, here by process address to depositing
Card information is signed, i.e., third time is signed.Above three main flow is completed due to undergoing " two in entire transaction flow in this way
Secondary transaction, three times sign " process, make block chain trade whole process formed closed loop, have law deposit card, by the prison of law
Pipe and guarantee.
In one embodiment, as shown in Fig. 2, provide it is a kind of card method is deposited based on real name block chain, in this way
Applied to being illustrated in the environment of Fig. 1, comprising the following steps:
S202: transaction applicant obtain message request, and by corresponding first private key of destination address to message request into
Row signature, and according to the message request and destination address generation signature field after signature, signature field is sent to related side.
Specifically, application counterparty is for representing the role for proposing this transaction application, and related side is known for identifying
Not, receive the role of this transaction application.Destination address is when carrying out the transaction of real name block chain, by a generation of server generation
The role of this transaction flow of table.Message request is the main information of this transaction, may include invited party, invited party
(relevant people) invites time limit and payment demand etc., and optionally, wherein invited party is either one or more,
It can specify relevant people in the message request or identify non-designated relevant people, is i.e. non-directional invitation etc..
In this embodiment, entire trade system is related to inviting, participate in and replying three key steps altogether, shares three times
Signature, data are transmitted under the transaction on real name block chain twice and a chain.Step S202 corresponding is to invite step, first
Data are transmitted under secondary signature and chain.Specifically, message request can be generated in transaction applicant, and it is defeated which can be user
Enter to the corresponding terminal of transaction applicant, so that the information that the corresponding terminal of the applicant that trades can be inputted according to user generates
Message request, such as terminal can show corresponding table, and user fills in etc., which may include whether specified participation
People's mark can have drop-down table if specified participant, user is needed to input relevant people i.e. address of participant etc., wherein
If specified participant, it is possible to specify one or more people, and when the address of user's input relevant people, it can be input relevant people
Title, so that the corresponding terminal of the applicant that trades can get correlation according to the pre-stored related list of the name query
The address of people, and the address inquired is inserted in drop-down table.Furthermore user can fill in the table invites the time limit, that is, invites
Validity period about, such as failure is invited in * * month * day *, therefore only relevant people is responded to inviting before the time,
By behavioural information and invite information and be sent in real name block chain, this invite just can effectively, otherwise, invite and fail.In table
It is also provided with payment information, for example whether relevant people is needed to invite payment value, the valence paid if necessary to this
The type and quantity of value are also required to user and are configured in advance.It should be noted that, it needs to take in the table when most important
With raw information, i.e. content of this transaction, such as in the example of one small red and Xiao Ming, Xiao Ming invites small red theory: come,
Thing is talked clearly Chu in context 2019 by we.Small red to speak frankly to small: based on your invitation, context 2019, you owe me 20 pieces
Money.Xiao Ming replys: context 2019, good, I goes back you next month.Wherein raw information, which refers to, " comes, we are thing, in context
Chu is talked clearly in 2019 ".
Transaction applicant is input to the information in table according to user and generates message request, and the mesh generated according to server
Corresponding first private key in mark address signs to message request, is to sign for the first time at this time, and applicant is by the invitation after signature
Information and destination address are combined to obtain signature field, and will be sent to relevant people under signature field chain, the signature field
Cochain does not carry out depositing card, but is transmitted directly to relevant people, and relevant people is waited to receive to carry out remaining operation.
S204: message request of the related side after extracting destination address and signature in signature field, and pass through destination address
Message request after signature is verified, if being verified, related side generates behavioural information corresponding with message request, leads to
Corresponding second private key in related side address for crossing related side signs behavioural information and message request to obtain signing messages, and
Initiate destination address signing messages and related side address being sent in real name block chain of trading for the first time.
Specifically, behavioural information, that is, related side generates for message request, can be the letter for receiving the behavior invited
Breath, such as may include confirmation and the delivery operation etc. to message request, related side address is corresponding related side, in reality
It is corresponding with an address in name block chain, which is also corresponding with a private key, i.e. the second private key, in this embodiment, the step
Rapid S204 is traded on corresponding participation, second of signature and first time chain.
After wherein related side receives the signature field that transaction applicant sends under chain, first from trading signature field
Message request after extracting destination address and signature, then verifies message request by the destination address, including phase
Verifying, verifying of timeliness of the address of Guan Fang etc., if the verification passes, then the corresponding terminal of related side can show message request
To related side, so that related side can determine whether to receive invitation according to corresponding message request, such as according to message request
In raw information judged, if receiving invitation, corresponding behavioural information can be generated, for example, if receiving to invite
Please, then it can carry out delivery operation and either input the information for receiving to invite, so that the terminal of related side can be according to related side
Operation generate corresponding behavioural information.In above-mentioned small red and Xiao Ming example, behavior information can be small red Xiang little Ming
Say: based on your invitation, context 2019, you owe me 20 yuan.
Related side then needs behavioural information after generating behavioural information and invites information progress cochain, before cochain
It first has to carry out second of signature, i.e., related side is by corresponding second private key in related side address to behavioural information and message request
It is signed to obtain signing messages, after the completion of signature, related side initiates transaction for the first time for signing messages and related side address
The destination address being sent in real name block chain completes first time cochain and deposits card, and wherein the process of cochain is, related side will sign
Information and related side address are sent on real name block chain, then calculate by each node on real name block chain and be deposited
Storage, until reaching destination address.Such as the signing messages and related side address can propagate on real name block chain, it is each
It after a node receives the signing messages and related side address, can be calculated, if the address of present node and destination address
Not identical, then card is deposited in node storage signing messages realization, if identical, destination address is reached, so as to carry out second
Secondary transaction specifically may refer to hereafter.
S206: destination address verifies signing messages by related side address, if being verified, destination address is obtained
It gets and deposits card information, and and initiated by the first private key to card information is deposited and signing messages carries out signature and is confirmed information
Second of transaction will confirm that the related side address that information and destination address are sent in real name block chain.
Specifically, depositing card information is destination address according to signing messages, i.e. message request and behavioural information generates, and is
Determine invite information it is legal after, destination address is replied to related side it is primary deposit card, be whole system here in block chain
On second transaction, third time sign, i.e., to the answer of behavioural information.This, which deposits card information, can be equivalent to small red and Xiao Ming example
Xiao Ming in son replys: context 2019, good, I goes back you next month.
Specifically, destination address passes through related side address first and verifies to signing messages, that is, extracts message request
And behavioural information, then message request and behavioural information are verified, i.e., whether message request and behavioural information are correct, if
Correctly, then it is verified, deposits card information so as to get, and this is deposited into card information cochain, this deposits card information i.e. to behavior
The interpretation of information.Destination address by the first private key to deposit card information and signing messages carry out signature be confirmed information, from
And second of transaction can be initiated and will confirm that the related side address that information and destination address are sent in real name block chain, i.e., it will be true
Recognize information and destination address is sent on real name block chain, then calculate by each node on real name block chain and deposit
Storage, to complete to deposit card.
Private key under a not homologous ray of the code insurance Guan San that signs three times in the embodiment is signed and issued, and is had very strong
Logical relation, the system of any one are not known about the hacker attack of business inside story, and are unable to complete the process of a whole set of signing, no
Effective law chain can be formed.Compared to traditional block chain technology --- single signature effective framework is promoted in safety
Three grades, cannot be by allograph, it is impossible to by hacker attack, can not be distorted halfway.So depositing based on real name block chain
Method allow block chain make block chain logic from being in harmony, realize that the law by Legal Regulation and protection has been accomplished in terms of depositing card from 0
To 1, by the whole series system as " trading twice, three signatures " make the transaction of block chain originally unidirectionally, the transaction without response
Journey has law to deposit card, and has had been provided with the qualification as rigorous legal argument evidence obtaining, while having accomplished to be supervised by law
Pipe and guarantee.And due to the Development System of block chain, the witness of each process of exchange is node all in system.Any authorization
The incorrect transaction of information can be all found at the first time by users other in system, this captures the process of bug, is exactly
User makes the process of system robustness jointly.There is the support of the above technology, the keeping problem of code key is also addressed.It can be with
See, system safety is improved, so minimum law effectively deposit the design of card unit be multi-signature, it is multichannel, more
System, the system more verified.
It is above-mentioned that card method and system is deposited based on real name block chain, there is signature three times and trade twice, i.e., by Shen of trading
Transaction flow is please just initiated, after carrying out first time signature to message request by the first private key of destination address, message request is sent out
Give related side, related side identifies message request after receiving message request, and if receive invitation, carry out
Message request and behavioural information are carried out second being sent in real name block chain after signing, such related side by primary transaction
Receive transaction behavior it is then immutable, thus destination address receive related side complete information uplink operation after, then to phase
The behavioural information of Guan Fang is interpreted, and carries out third time signature for obtained card information of depositing is interpreted, and by the confirmation after signature
Information is sent in real name block chain by second of transaction, forms the smallest law by transaction twice of signing three times in this way
Evidence triangle makes block chain transaction whole flow process form logic from being in harmony, so that entire transaction forms closed loop, forms by law
The minimum law of protection and supervision effectively deposits card unit.And by signing three times, code insurance Guan San not homologous rays of signing three times
Under private key signed and issued, and there is very strong logical relation, the system of any one do not known about the hacker of business inside story
Attack, and it is unable to complete the process of a whole set of signing, effective law chain cannot be formed.
Message request includes related side address to be verified in one of the embodiments,;By destination address to signature after
Message request verified, may include: the message request after signature be calculated by destination address it is to be verified
Related side address;Extract current address;Judge whether current address and related side address to be verified are identical, if they are the same, then verify
Pass through, otherwise verifies and do not pass through.
Behavioural information includes destination address to be verified in one of the embodiments,;Destination address passes through related side address
Signing messages is verified, comprising: destination address carries out signing messages by related side address message request is calculated
And behavioural information;Destination address extracts related side address to be verified from message request, extracts mesh to be verified in subordinate act information
Mark address;Destination address judges whether address to be verified is identical as destination address;If address to be verified is identical as destination address, sentence
Whether disconnected related side address and related side address to be verified are identical;If related side address is identical as related side address to be verified,
It is verified, otherwise verifies and do not pass through;If address to be verified is not identical as destination address, verifies and do not pass through.
It is to be verified by the attribute of related side in the above-described embodiments, may determine that by the attribute of related side
Whether relevant people is whether invitee and message request are legal etc., and the attribute of the related side can refer to the ground of related side
Location, this is corresponding with orientation invitation corresponding in message request, i.e., message request can be orientation and invite, and carries related side
Address.Specifically, after related side receives signature field, the message request after signature is extracted first, then according to target
Address carries out the message request after the signature related side address to be verified is calculated, i.e., what is carried in message request is to be verified
Related side address, then extracts current address, judges whether current address and related side address to be verified are identical, if phase
Together, then it is verified, otherwise authentication failed, i.e., currently associated side is not to invite corresponding related side.
In turn, when destination address receives signing messages, carrying out verifying to signing messages can be destination address and passes through
Related side address be calculated message request and behavioural information to signing messages, and destination address is so as to from message request
It is middle to extract to related side address to be verified, destination address to be verified is extracted in subordinate act information, so as to judge to be verifiedly
Whether location is identical as destination address and judges whether related side address and related side address to be verified are identical, if the judgement knot of the two
When fruit is all identical, verifying just passes through.
Address is introduced in above-described embodiment, the corresponding related side in an address invites in the presence of orientation and indefinite in this way
To the definition of invitation, orient invite when, whether legal etc., ensure that transaction if can verify related side by related side address
Be normally carried out.
Message request includes inviting the time limit in one of the embodiments,;By destination address to the invitation letter after signature
Breath is verified, further includes: be calculated to the message request after signature by destination address and is invited the time limit;Judgement is current
After whether address and related side address to be verified are identical, further includes: if current address is identical as related side address to be verified,
Current time is obtained, judges that current time whether in inviting the time limit, if so, being verified, is otherwise verified and do not passed through.
After judging whether related side address and related side address to be verified are identical in one of the embodiments, also wrap
It includes: if related side address is identical as related side address to be verified, judging the response time in behavioural information whether when inviting
In limit, if so, being verified, otherwise verifies and do not pass through.
It in the above-described embodiments, is verified by the attribute of message request, that is, itself the attribute of trading, the category
Property can refer to invite the time limit.Related side the message request after signature be calculated by destination address invite the time limit and
Related side address to be verified, judge current address with related side address to be verified it is identical after, can also judge current event
Whether in inviting the time limit, if it is, be verified, thus related side message request can be replied to obtain it is relevant
Behavioural information, if current time is not in inviting the time limit, i.e., message request fails, even if then related side is to the message request
Replied, be also it is invalid, also can authentication failed when succeeding target address is verified.Such as destination address
Judge related side address with related side address to be verified it is identical after, then can continue to judge the response time in behavioural information
Whether in inviting the time limit, response time therein refers to the generation time of behavioural information, if when response in behavioural information
Between when inviting in the time limit, then be verified, otherwise authentication failed, that is, think that this behavioural information is nullity letter
Breath, is not considered as effective reply to message request.
In above-described embodiment, is defined in message request and invite the time limit, it is ensured that the timeliness of transaction, and can be
It carries out depositing card in stipulated time.
Message request includes payment information in one of the embodiments,;Related side generates row corresponding with message request
For information, comprising: obtain the transaction value of type and quantity corresponding with payment information;It is generated according to accessed transaction value
Behavioural information.
Destination address verifies signing messages by related side address in one of the embodiments, comprising: target
Address carries out signing messages by related side address message request and behavioural information is calculated;It extracts and hands in subordinate act information
Easily value, extracts payment information from message request;Judge whether transaction value is corresponding with payment information, if corresponding, verifies
Pass through, otherwise verifies and do not pass through.
In this embodiment, whether message request, which contains, beats coin demand, i.e., need relevant people to invite price to this
Value, and the type and quantity etc. of payment value.Specifically, relevant people is mentioned from message request after getting message request
Payment information is got, and corresponding behavioural information is generated according to the requirement of payment information, such as obtain corresponding with payment information
Then accessed transaction value is added in behavioural information, shifts etc. by the transaction value of type and quantity.To
Destination address, can be to extract transaction value in subordinate act information, from invitation after message request and behavioural information is calculated
Payment information is extracted in information, then whether transaction value is corresponding with payment information, if corresponding, is verified, thus mesh
Mark address can be generated it is corresponding deposit card information, that is, complete this closed loop for depositing card.
It trades for this between destination address and relevant people and signs three times twice, form the smallest legal argument three
It is angular, so that block chain transaction whole flow process is formed logic from being in harmony, forms the minimum law for being protected by law and supervising and effectively deposit
Demonstrate,prove unit.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this
A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2
Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out,
But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in Figure 1, providing a kind of deposit system based on real name block chain, comprising: transaction
Applicant, related side's and transaction corresponding destination address of applicant and related side corresponding with related side address.
Transaction applicant carries out message request for obtaining message request, and by corresponding first private key of destination address
Signature, and according to the message request and destination address generation signature field after signature, signature field is sent to related side.
Related side is used for the message request after extracting destination address and signature in signature field, and passes through destination address pair
Message request after signature is verified, if being verified, related side generates behavioural information corresponding with message request, is passed through
Corresponding second private key in the related side address of related side signs behavioural information and message request to obtain signing messages, concurrently
Play destination address signing messages and related side address being sent in real name block chain of trading for the first time.
Destination address is for verifying signing messages by related side address, if being verified, destination address is obtained
It gets and deposits card information, and and initiated by the first private key to card information is deposited and signing messages carries out signature and is confirmed information
Second of transaction will confirm that the related side address that information and destination address are sent in real name block chain.
Message request includes related side address to be verified in one of the embodiments,.
Related side is also used to carry out related side to be verified is calculated the message request after signature by destination address
Location;Extract current address;Judge whether current address and related side address to be verified are identical, if they are the same, are then verified, otherwise
Verifying does not pass through.
Behavioural information includes destination address to be verified in one of the embodiments,.
Destination address is also used to carry out signing messages by related side address that message request and behavioural information is calculated;
Related side address to be verified is extracted from message request, extracts destination address to be verified in subordinate act information;Judge to be verifiedly
Whether location is identical as destination address;If address to be verified is identical as destination address, related side address and related side to be verified are judged
Whether address is identical;If related side address is identical as related side address to be verified, it is verified, otherwise verifies and do not pass through;If
Address to be verified is not identical as destination address, then verifies and do not pass through.
Message request includes inviting the time limit in one of the embodiments,.
Related side, which is also used to be calculated to the message request after signature by destination address, invites the time limit.
Related side be also used to judge current address and related side address to be verified it is whether identical after, if current address with to
It is identical to verify related side address, then obtains current time, current time is judged whether in inviting the time limit, if so, verifying is logical
It crosses, otherwise verifies and do not pass through.
Destination address is also used to judge whether are related side address and related side address to be verified in one of the embodiments,
After identical, if related side address is identical as related side address to be verified, judge response time in behavioural information whether
It invites in the time limit, if so, being verified, otherwise verifies and do not pass through.
Message request includes payment information in one of the embodiments,.
Related side is also used to obtain the transaction value of type and quantity corresponding with payment information;According to accessed transaction
Value generates behavioural information.
Destination address is also used to that signing messages is calculated by related side address in one of the embodiments,
Message request and behavioural information;Transaction value is extracted in subordinate act information, payment information is extracted from message request;Judgement transaction
Whether value is corresponding with payment information, if corresponding, be verified, otherwise verify and do not pass through.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of deposit card method based on real name block chain, which is characterized in that the described method includes:
The applicant that trades obtains message request, and is signed by corresponding first private key of destination address to message request, and
According to the message request and destination address generation signature field after signature, the signature field is sent to related side;
Message request of the related side after extracting the destination address and signature in the signature field, and pass through the mesh
The message request after the signature is verified in mark address, if being verified, the related side is generated and the invitation letter
Corresponding behavioural information is ceased, by corresponding second private key in the related side address of the related side to the behavioural information and described
Message request is signed to obtain signing messages, and is initiated to trade for the first time and be sent to signing messages and the related side address
The destination address in real name block chain;
The destination address verifies the signing messages by the related side address, if being verified, the mesh
Mark address gets and deposits card information, and demonstrate,proves information and signing messages is signed to obtain to described deposit by first private key
Confirmation message, and initiate second of transaction and the confirmation message and the destination address are sent in the real name block chain
The related side address.
2. the method according to claim 1, wherein the message request includes related side address to be verified;Institute
It states and the message request after the signature is verified by the destination address, comprising:
The message request after the signature is carried out by the destination address related side address to be verified is calculated;
Extract current address;
Judge whether the current address and the related side address to be verified are identical, if they are the same, are then verified, otherwise verify
Do not pass through.
3. according to the method described in claim 2, it is characterized in that, the behavioural information includes destination address to be verified;It is described
Destination address verifies the signing messages by the related side address, comprising:
The destination address to the signing messages carries out that message request is calculated by the related side address and behavior is believed
Breath;
The destination address extracts related side address to be verified from the message request, extracts from the behavioural information to be tested
Demonstrate,prove destination address;
The destination address judges whether the address to be verified and the destination address are identical;If the address to be verified and institute
It is identical to state destination address, judges whether the related side address and related side address to be verified are identical;If the related side address
It is identical as related side address to be verified, then it is verified, otherwise verifies and do not pass through;If the address to be verified and the target
Location is not identical, then verifies and do not pass through.
4. according to the method described in claim 3, it is characterized in that, the message request includes inviting the time limit;It is described to pass through institute
Destination address is stated to verify the message request after the signature, further includes:
The message request after the signature be calculated by the destination address and invites the time limit;
It is described judge the current address and the related side address to be verified it is whether identical after, further includes:
If the current address is identical as the related side address to be verified, current time is obtained, judges the current time
Whether in the invitation time limit, if so, being verified, otherwise verifies and do not pass through.
5. according to the method described in claim 4, it is characterized in that, the judgement related side address and related side to be verified
After whether address is identical, further includes:
If the related side address is identical as related side address to be verified, judge whether is response time in the behavioural information
In the invitation time limit, if so, being verified, otherwise verifies and do not pass through.
6. according to claim 1 to method described in 5 any one, which is characterized in that the message request includes payment information;
The related side generates behavioural information corresponding with the message request, comprising:
The related side obtains the transaction value of type and quantity corresponding with the payment information;
The related side generates the behavioural information according to accessed transaction value.
7. according to the method described in claim 6, it is characterized in that, the destination address is by the related side address to described
Signing messages is verified, comprising:
The destination address to the signing messages carries out that message request is calculated by the related side address and behavior is believed
Breath;
The destination address extracts the transaction value from the behavioural information, and the payment is extracted from the message request
Information;
The destination address judges whether the transaction value is corresponding with the payment information, if corresponding, is verified, otherwise
Verifying does not pass through.
8. a kind of deposit system based on real name block chain, which is characterized in that the system comprises transaction applicant, related side,
And the corresponding destination address of transaction applicant and related side corresponding with related side address;
The transaction applicant carries out message request for obtaining message request, and by corresponding first private key of destination address
Signature, and according to the message request and destination address generation signature field after signature, the signature field is sent to
Related side;
The related side is used for the message request after extracting the destination address and signature in the signature field, and passes through institute
It states destination address to verify the message request after the signature, if being verified, the related side generates and invites with described
Please the corresponding behavioural information of information, by corresponding second private key in the related side address of the related side to the behavioural information and
The message request is signed to obtain signing messages, and is initiated to trade for the first time and sent out signing messages and the related side address
Send the destination address into real name block chain;
The destination address is for verifying the signing messages by the related side address, if being verified, institute
It states destination address and gets and deposit card information, and card information is deposited and signing messages is signed to described by first private key
It is confirmed information, and initiates second of transaction and the confirmation message and the destination address is sent to the real name block chain
In the related side address.
9. system according to claim 8, which is characterized in that the message request includes related side address to be verified;
The related side is also used to be calculated to the message request after the signature by the destination address to be verified
Related side address;Extract current address;Judge whether the current address and the related side address to be verified are identical, if phase
Together, then it is verified, otherwise verifies and do not pass through.
10. system according to claim 9, which is characterized in that the behavioural information includes destination address to be verified;
The destination address be also used to by the related side address to the signing messages be calculated message request and
Behavioural information;Related side address to be verified is extracted from the message request, and target to be verified is extracted from the behavioural information
Address;Judge whether the address to be verified and the destination address are identical;If the address to be verified and the destination address
It is identical, judge whether the related side address and related side address to be verified are identical;If the related side address and phase to be verified
The address Guan Fang is identical, then is verified, and otherwise verifies and does not pass through;If the address to be verified and the destination address be not identical,
It then verifies and does not pass through.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910726179.1A CN110443076B (en) | 2019-08-07 | 2019-08-07 | Evidence storage method and system based on real-name block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910726179.1A CN110443076B (en) | 2019-08-07 | 2019-08-07 | Evidence storage method and system based on real-name block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110443076A true CN110443076A (en) | 2019-11-12 |
CN110443076B CN110443076B (en) | 2021-06-01 |
Family
ID=68433785
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910726179.1A Active CN110443076B (en) | 2019-08-07 | 2019-08-07 | Evidence storage method and system based on real-name block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110443076B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110954780A (en) * | 2019-12-03 | 2020-04-03 | 湖南国奥电力设备有限公司 | Underground cable fault detection method and device based on block chain |
CN113095828A (en) * | 2021-04-27 | 2021-07-09 | 支付宝(杭州)信息技术有限公司 | Data evidence storage method and device based on block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
CN108537046A (en) * | 2017-03-06 | 2018-09-14 | 才信网络科技(上海)有限公司 | A kind of online contract signature system and method based on block chain technology |
KR20180129027A (en) * | 2017-05-24 | 2018-12-05 | 라온시큐어(주) | Authentification methods and system based on programmable blockchain and one-id |
US20190007402A1 (en) * | 2016-03-28 | 2019-01-03 | Black Gold Coin, Inc. | SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION |
CN109242450A (en) * | 2018-09-21 | 2019-01-18 | 北京京东尚科信息技术有限公司 | Block catenary system and based on block catenary system realize method of commerce and transaction system |
CN109729168A (en) * | 2018-12-31 | 2019-05-07 | 浙江成功软件开发有限公司 | A kind of data share exchange system and method based on block chain |
CN109840767A (en) * | 2018-01-09 | 2019-06-04 | 中国科学院计算技术研究所 | Multi-party Fair contract based on block chain technology deposits card method and system |
-
2019
- 2019-08-07 CN CN201910726179.1A patent/CN110443076B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
US20190007402A1 (en) * | 2016-03-28 | 2019-01-03 | Black Gold Coin, Inc. | SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION |
CN108537046A (en) * | 2017-03-06 | 2018-09-14 | 才信网络科技(上海)有限公司 | A kind of online contract signature system and method based on block chain technology |
KR20180129027A (en) * | 2017-05-24 | 2018-12-05 | 라온시큐어(주) | Authentification methods and system based on programmable blockchain and one-id |
CN109840767A (en) * | 2018-01-09 | 2019-06-04 | 中国科学院计算技术研究所 | Multi-party Fair contract based on block chain technology deposits card method and system |
CN109242450A (en) * | 2018-09-21 | 2019-01-18 | 北京京东尚科信息技术有限公司 | Block catenary system and based on block catenary system realize method of commerce and transaction system |
CN109729168A (en) * | 2018-12-31 | 2019-05-07 | 浙江成功软件开发有限公司 | A kind of data share exchange system and method based on block chain |
Non-Patent Citations (1)
Title |
---|
朱兴雄: "区块链技术在电商存证鉴证中的应用", 《网络应用》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110954780A (en) * | 2019-12-03 | 2020-04-03 | 湖南国奥电力设备有限公司 | Underground cable fault detection method and device based on block chain |
CN113095828A (en) * | 2021-04-27 | 2021-07-09 | 支付宝(杭州)信息技术有限公司 | Data evidence storage method and device based on block chain |
CN113095828B (en) * | 2021-04-27 | 2023-09-01 | 支付宝(杭州)信息技术有限公司 | Data storage method and device based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN110443076B (en) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Asgaonkar et al. | Solving the buyer and seller’s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator | |
CN108492103B (en) | Joint block chain consensus method | |
CN107330720B (en) | Block chain-based integral processing method and system | |
CN109598149B (en) | Service processing method and device | |
WO2019144745A1 (en) | Smart contract generation method and apparatus | |
CN108846676A (en) | Biological characteristic assistant payment method, device, computer equipment and storage medium | |
CN109598518A (en) | Method for anti-counterfeit and device, electronic equipment based on block chain | |
CN110351133A (en) | Method and device for the host node hand-off process in block catenary system | |
CN109067543A (en) | Digital certificate management method, device, computer equipment and storage medium | |
CN109242675A (en) | Assets dissemination method and device, electronic equipment based on block chain | |
CN108964924A (en) | Digital certificate method of calibration, device, computer equipment and storage medium | |
CN112801658B (en) | Cross-border resource transfer authenticity auditing method and device and electronic equipment | |
CN108985772A (en) | A kind of verification method, device, equipment and the storage medium of block chain | |
CN110689434A (en) | Cross-block chain interaction method based on notary group | |
CN111860865B (en) | Model construction and analysis method, device, electronic equipment and medium | |
CN111383117A (en) | Asset management method and device based on block chain and electronic equipment | |
CN109815138A (en) | Business information test method, device, computer equipment and storage medium | |
CN111383114A (en) | Asset information management method and device based on block chain | |
CN112200569B (en) | Digital seal using method and device based on block chain and electronic equipment | |
CN111324661A (en) | User cooperation method, device and medium based on block chain | |
CN109360070B (en) | Tourism information processing method, device, equipment and storage medium based on alliance chain | |
CN111402033A (en) | Asset information management method and device based on block chain | |
CN112070484B (en) | Block chain-based data processing method and device | |
CN110443076A (en) | Card method and system is deposited based on real name block chain | |
CN109886810B (en) | Crowdsourcing transaction method and system, readable storage medium and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230724 Address after: No. 1-370, Enterprise Service Center, Yongledian, Tongzhou District, Beijing 101105 Patentee after: CORE CHAIN (BEIJING) TECHNOLOGY Co.,Ltd. Address before: 100102 No.21, yard 6, North Fourth Ring Road East, Chaoyang District, Beijing (no.0535, Taiyanggong incubator) Patentee before: Ruizi (Beijing) Technology Co.,Ltd. |
|
TR01 | Transfer of patent right |