CN110443076A - Card method and system is deposited based on real name block chain - Google Patents

Card method and system is deposited based on real name block chain Download PDF

Info

Publication number
CN110443076A
CN110443076A CN201910726179.1A CN201910726179A CN110443076A CN 110443076 A CN110443076 A CN 110443076A CN 201910726179 A CN201910726179 A CN 201910726179A CN 110443076 A CN110443076 A CN 110443076A
Authority
CN
China
Prior art keywords
address
related side
verified
message request
destination address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910726179.1A
Other languages
Chinese (zh)
Other versions
CN110443076B (en
Inventor
严志
李烨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Core Chain Beijing Technology Co ltd
Original Assignee
Ruizi (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruizi (beijing) Technology Co Ltd filed Critical Ruizi (beijing) Technology Co Ltd
Priority to CN201910726179.1A priority Critical patent/CN110443076B/en
Publication of CN110443076A publication Critical patent/CN110443076A/en
Application granted granted Critical
Publication of CN110443076B publication Critical patent/CN110443076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Card method and system is deposited based on real name block chain this application involves a kind of, it trades in the presence of signature three times and twice, transaction flow is initiated by transaction applicant, after carrying out first time signature to message request, message request is sent to related side, related side is after receiving message request, message request is identified, if and receiving invitation, then carry out first time transaction, message request and behavioural information are carried out second being sent in real name block chain after signing, it is then immutable to receive the behavior traded by related side in this way, to which destination address is after receiving related side and completing information uplink operation, then the behavioural information of related side is interpreted, and third time signature is carried out by obtained card information of depositing is interpreted, and the confirmation message after signature is sent in real name block chain by second of transaction.It can realize that law deposits card on real name block chain using this method.

Description

Card method and system is deposited based on real name block chain
Technical field
This application involves field of computer technology, more particularly to a kind of depositing card method and be based on real name block chain System.
Background technique
Existing block chain technology is that unidirectional, nothing between role is carried out by each role on block chain when being traded Respond and deposit without effective law the transaction of card.
Direction transaction participant is initiated by transaction to trade.In addition to playing coin operation there are other than realistic meaning in transaction, It is invalid that the raw information that transaction carries may be considered unidirectional, law, because this process of exchange is that certain role is unidirectional It issues, does not form closed loop between each role that trades, therefore do not have law and deposit card.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of be capable of providing law deposit card based on real name block Chain deposits card method and system.
It is a kind of that card method is deposited based on real name block chain, which comprises
The applicant that trades obtains message request, and is signed by corresponding first private key of destination address to message request Name, and according to the message request and destination address generation signature field after signature, the signature field is sent to phase Guan Fang;
Message request of the related side after extracting the destination address and signature in the signature field, and pass through institute It states destination address to verify the message request after the signature, if being verified, the related side generates and invites with described Please the corresponding behavioural information of information, by corresponding second private key in the related side address of the related side to the behavioural information and The message request is signed to obtain signing messages, and is initiated to trade for the first time and sent out signing messages and the related side address Send the destination address into real name block chain;
The destination address verifies the signing messages by the related side address, if being verified, institute It states destination address and gets and deposit card information, and card information is deposited and signing messages is signed to described by first private key It is confirmed information, and initiates second of transaction and the confirmation message and the destination address is sent to the real name block chain In the related side address.
The message request includes related side address to be verified in one of the embodiments,;It is described to pass through the target Address is verified by the message request after the signature, comprising:
The message request after the signature is carried out by the destination address related side address to be verified is calculated;
Extract current address;
Judge whether the current address and the related side address to be verified are identical, if they are the same, are then verified, otherwise Verifying does not pass through.
The behavioural information includes destination address to be verified in one of the embodiments,;The destination address passes through institute Related side address is stated to verify the signing messages, comprising:
The destination address carries out the signing messages message request and row is calculated by the related side address For information;
The destination address extracts related side address to be verified from the message request, extracts from the behavioural information Destination address to be verified;
The destination address judges whether the address to be verified and the destination address are identical;If the address to be verified It is identical as the destination address, judge whether the related side address and related side address to be verified are identical;If the related side Address is identical as related side address to be verified, then is verified, otherwise verifies and do not pass through;If the address to be verified and the mesh It is not identical to mark address, then verifies and does not pass through.
The message request includes inviting the time limit in one of the embodiments,;It is described by the destination address to institute Message request after stating signature is verified, further includes:
The message request after the signature be calculated by the destination address and invites the time limit;
It is described judge the current address and the related side address to be verified it is whether identical after, further includes:
If the current address is identical as the related side address to be verified, current time is obtained, is judged described current Whether the time in the invitation time limit, if so, being verified, is otherwise verified and is not passed through.
In one of the embodiments, it is described judge the related side address and related side address to be verified it is whether identical it Afterwards, further includes:
If the related side address is identical as related side address to be verified, the response time in the behavioural information is judged Whether in the invitation time limit, if so, being verified, otherwise verifies and do not pass through.
The message request includes payment information in one of the embodiments,;The related side generates and the invitation The corresponding behavioural information of information, comprising:
Obtain the transaction value of type and quantity corresponding with the payment information;
The behavioural information is generated according to accessed transaction value.
The destination address tests the signing messages by the related side address in one of the embodiments, Card, comprising:
The destination address carries out the signing messages message request and row is calculated by the related side address For information;
The transaction value is extracted from the behavioural information, and the payment information is extracted from the message request;
Judge whether the transaction value is corresponding with the payment information, if corresponding, be verified, otherwise verify and do not lead to It crosses.
A kind of deposit system based on real name block chain, the system comprises transaction applicant, related side and the transaction The corresponding destination address of applicant and related side corresponding with related side address;
The transaction applicant passes through corresponding first private key of destination address to message request for obtaining message request It signs, and according to the message request and destination address generation signature field after signature, the signature field is sent out It send to related side;
The related side is used for the message request after extracting the destination address and signature in the signature field, and leads to It crosses the destination address to verify the message request after the signature, if being verified, the related side generates and institute The corresponding behavioural information of message request is stated, the behavior is believed by corresponding second private key in the related side address of the related side Breath and the message request are signed to obtain signing messages, and initiate to trade for the first time by signing messages and the related side Location is sent to the destination address in real name block chain;
The destination address is for verifying the signing messages by the related side address, if being verified, Then the destination address, which is got, deposits card information, and deposits card information and signing messages progress to described by first private key Signature is confirmed information, and initiates second of transaction and the confirmation message and the destination address are sent to the real name area The related side address in block chain.
The message request includes related side address to be verified in one of the embodiments,;
The related side be also used to by the destination address to the message request after the signature be calculated to Verify related side address;Extract current address;Judge whether the current address and the related side address to be verified are identical, if It is identical, then it is verified, otherwise verifies and do not pass through.
The behavioural information includes destination address to be verified in one of the embodiments,;
The destination address is also used to by the related side address carry out that invitation letter is calculated to the signing messages Breath and behavioural information;Related side address to be verified is extracted from the message request, is extracted from the behavioural information to be verified Destination address;Judge whether the address to be verified and the destination address are identical;If the address to be verified and the target Address is identical, judges whether the related side address and related side address to be verified are identical;If the related side address with it is to be tested It is identical to demonstrate,prove related side address, then is verified, otherwise verifies and do not pass through;If the address to be verified and the destination address not phase Together, then it verifies and does not pass through.
It is above-mentioned that card method and system is deposited based on real name block chain, there is signature three times and trade twice, i.e., by Shen of trading Transaction flow is please just initiated, after carrying out first time signature to message request by the first private key of destination address, message request is sent To related side, related side identifies message request after receiving message request, and if receive invitation, carry out first Message request and behavioural information are carried out second being sent in real name block chain after signing by secondary transaction, such related side connects The behavior traded is then immutable, thus destination address receive related side complete information uplink operation after, then to correlation The behavioural information of side is interpreted, and carries out third time signature for obtained card information of depositing is interpreted, and by the confirmation letter after signature Breath is sent in real name block chain by second of transaction, forms the smallest law card by transaction twice of signing three times in this way According to triangle, so that block chain transaction whole flow process is formed logic from being in harmony, so that entire transaction forms closed loop, form and protected by law Shield and the minimum law of supervision effectively deposit card unit.And by signing three times, signed under a not homologous ray of code insurance Guan San three times Private key signed and issued, and there is very strong logical relation, the system of any one attacked by the hacker for not knowing about business inside story It hits, and is unable to complete the process of a whole set of signing, effective law chain cannot be formed.
Detailed description of the invention
Fig. 1 is the application scenario diagram for depositing card method based on real name block chain in one embodiment;
Fig. 2 is the flow diagram for depositing card method based on real name block chain in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
It is provided by the present application that card method is deposited based on real name block chain, it can be applied in application environment as shown in Figure 1. Wherein, including trade applicant 102 and multiple related sides 104 generate originally wherein transaction applicant 102 initiates transaction flow The destination address 106 of secondary transaction, transaction applicant 102, which can orient, invites the either non-directional of related side 104 to invite related side 104, message request is generated, and carry out first time signature.Related side 104 is in the transaction application for receiving transaction applicant's sending Afterwards, the message request that identification transaction applicant 102 issues, if receiving the transaction application with transaction applicant 102, with target Location 106 is traded, and the cochain of message request and behavioural information is completed, i.e. first time cochain is traded, right by related side 104 here Message request and behavioural information are signed, i.e. second of signature.When destination address 106 confirms on message request and behavioural information It after chain, is returned from process address 106 to related side 104 and deposits card information, is i.e. second of cochain transaction, here by process address to depositing Card information is signed, i.e., third time is signed.Above three main flow is completed due to undergoing " two in entire transaction flow in this way Secondary transaction, three times sign " process, make block chain trade whole process formed closed loop, have law deposit card, by the prison of law Pipe and guarantee.
In one embodiment, as shown in Fig. 2, provide it is a kind of card method is deposited based on real name block chain, in this way Applied to being illustrated in the environment of Fig. 1, comprising the following steps:
S202: transaction applicant obtain message request, and by corresponding first private key of destination address to message request into Row signature, and according to the message request and destination address generation signature field after signature, signature field is sent to related side.
Specifically, application counterparty is for representing the role for proposing this transaction application, and related side is known for identifying Not, receive the role of this transaction application.Destination address is when carrying out the transaction of real name block chain, by a generation of server generation The role of this transaction flow of table.Message request is the main information of this transaction, may include invited party, invited party (relevant people) invites time limit and payment demand etc., and optionally, wherein invited party is either one or more, It can specify relevant people in the message request or identify non-designated relevant people, is i.e. non-directional invitation etc..
In this embodiment, entire trade system is related to inviting, participate in and replying three key steps altogether, shares three times Signature, data are transmitted under the transaction on real name block chain twice and a chain.Step S202 corresponding is to invite step, first Data are transmitted under secondary signature and chain.Specifically, message request can be generated in transaction applicant, and it is defeated which can be user Enter to the corresponding terminal of transaction applicant, so that the information that the corresponding terminal of the applicant that trades can be inputted according to user generates Message request, such as terminal can show corresponding table, and user fills in etc., which may include whether specified participation People's mark can have drop-down table if specified participant, user is needed to input relevant people i.e. address of participant etc., wherein If specified participant, it is possible to specify one or more people, and when the address of user's input relevant people, it can be input relevant people Title, so that the corresponding terminal of the applicant that trades can get correlation according to the pre-stored related list of the name query The address of people, and the address inquired is inserted in drop-down table.Furthermore user can fill in the table invites the time limit, that is, invites Validity period about, such as failure is invited in * * month * day *, therefore only relevant people is responded to inviting before the time, By behavioural information and invite information and be sent in real name block chain, this invite just can effectively, otherwise, invite and fail.In table It is also provided with payment information, for example whether relevant people is needed to invite payment value, the valence paid if necessary to this The type and quantity of value are also required to user and are configured in advance.It should be noted that, it needs to take in the table when most important With raw information, i.e. content of this transaction, such as in the example of one small red and Xiao Ming, Xiao Ming invites small red theory: come, Thing is talked clearly Chu in context 2019 by we.Small red to speak frankly to small: based on your invitation, context 2019, you owe me 20 pieces Money.Xiao Ming replys: context 2019, good, I goes back you next month.Wherein raw information, which refers to, " comes, we are thing, in context Chu is talked clearly in 2019 ".
Transaction applicant is input to the information in table according to user and generates message request, and the mesh generated according to server Corresponding first private key in mark address signs to message request, is to sign for the first time at this time, and applicant is by the invitation after signature Information and destination address are combined to obtain signature field, and will be sent to relevant people under signature field chain, the signature field Cochain does not carry out depositing card, but is transmitted directly to relevant people, and relevant people is waited to receive to carry out remaining operation.
S204: message request of the related side after extracting destination address and signature in signature field, and pass through destination address Message request after signature is verified, if being verified, related side generates behavioural information corresponding with message request, leads to Corresponding second private key in related side address for crossing related side signs behavioural information and message request to obtain signing messages, and Initiate destination address signing messages and related side address being sent in real name block chain of trading for the first time.
Specifically, behavioural information, that is, related side generates for message request, can be the letter for receiving the behavior invited Breath, such as may include confirmation and the delivery operation etc. to message request, related side address is corresponding related side, in reality It is corresponding with an address in name block chain, which is also corresponding with a private key, i.e. the second private key, in this embodiment, the step Rapid S204 is traded on corresponding participation, second of signature and first time chain.
After wherein related side receives the signature field that transaction applicant sends under chain, first from trading signature field Message request after extracting destination address and signature, then verifies message request by the destination address, including phase Verifying, verifying of timeliness of the address of Guan Fang etc., if the verification passes, then the corresponding terminal of related side can show message request To related side, so that related side can determine whether to receive invitation according to corresponding message request, such as according to message request In raw information judged, if receiving invitation, corresponding behavioural information can be generated, for example, if receiving to invite Please, then it can carry out delivery operation and either input the information for receiving to invite, so that the terminal of related side can be according to related side Operation generate corresponding behavioural information.In above-mentioned small red and Xiao Ming example, behavior information can be small red Xiang little Ming Say: based on your invitation, context 2019, you owe me 20 yuan.
Related side then needs behavioural information after generating behavioural information and invites information progress cochain, before cochain It first has to carry out second of signature, i.e., related side is by corresponding second private key in related side address to behavioural information and message request It is signed to obtain signing messages, after the completion of signature, related side initiates transaction for the first time for signing messages and related side address The destination address being sent in real name block chain completes first time cochain and deposits card, and wherein the process of cochain is, related side will sign Information and related side address are sent on real name block chain, then calculate by each node on real name block chain and be deposited Storage, until reaching destination address.Such as the signing messages and related side address can propagate on real name block chain, it is each It after a node receives the signing messages and related side address, can be calculated, if the address of present node and destination address Not identical, then card is deposited in node storage signing messages realization, if identical, destination address is reached, so as to carry out second Secondary transaction specifically may refer to hereafter.
S206: destination address verifies signing messages by related side address, if being verified, destination address is obtained It gets and deposits card information, and and initiated by the first private key to card information is deposited and signing messages carries out signature and is confirmed information Second of transaction will confirm that the related side address that information and destination address are sent in real name block chain.
Specifically, depositing card information is destination address according to signing messages, i.e. message request and behavioural information generates, and is Determine invite information it is legal after, destination address is replied to related side it is primary deposit card, be whole system here in block chain On second transaction, third time sign, i.e., to the answer of behavioural information.This, which deposits card information, can be equivalent to small red and Xiao Ming example Xiao Ming in son replys: context 2019, good, I goes back you next month.
Specifically, destination address passes through related side address first and verifies to signing messages, that is, extracts message request And behavioural information, then message request and behavioural information are verified, i.e., whether message request and behavioural information are correct, if Correctly, then it is verified, deposits card information so as to get, and this is deposited into card information cochain, this deposits card information i.e. to behavior The interpretation of information.Destination address by the first private key to deposit card information and signing messages carry out signature be confirmed information, from And second of transaction can be initiated and will confirm that the related side address that information and destination address are sent in real name block chain, i.e., it will be true Recognize information and destination address is sent on real name block chain, then calculate by each node on real name block chain and deposit Storage, to complete to deposit card.
Private key under a not homologous ray of the code insurance Guan San that signs three times in the embodiment is signed and issued, and is had very strong Logical relation, the system of any one are not known about the hacker attack of business inside story, and are unable to complete the process of a whole set of signing, no Effective law chain can be formed.Compared to traditional block chain technology --- single signature effective framework is promoted in safety Three grades, cannot be by allograph, it is impossible to by hacker attack, can not be distorted halfway.So depositing based on real name block chain Method allow block chain make block chain logic from being in harmony, realize that the law by Legal Regulation and protection has been accomplished in terms of depositing card from 0 To 1, by the whole series system as " trading twice, three signatures " make the transaction of block chain originally unidirectionally, the transaction without response Journey has law to deposit card, and has had been provided with the qualification as rigorous legal argument evidence obtaining, while having accomplished to be supervised by law Pipe and guarantee.And due to the Development System of block chain, the witness of each process of exchange is node all in system.Any authorization The incorrect transaction of information can be all found at the first time by users other in system, this captures the process of bug, is exactly User makes the process of system robustness jointly.There is the support of the above technology, the keeping problem of code key is also addressed.It can be with See, system safety is improved, so minimum law effectively deposit the design of card unit be multi-signature, it is multichannel, more System, the system more verified.
It is above-mentioned that card method and system is deposited based on real name block chain, there is signature three times and trade twice, i.e., by Shen of trading Transaction flow is please just initiated, after carrying out first time signature to message request by the first private key of destination address, message request is sent out Give related side, related side identifies message request after receiving message request, and if receive invitation, carry out Message request and behavioural information are carried out second being sent in real name block chain after signing, such related side by primary transaction Receive transaction behavior it is then immutable, thus destination address receive related side complete information uplink operation after, then to phase The behavioural information of Guan Fang is interpreted, and carries out third time signature for obtained card information of depositing is interpreted, and by the confirmation after signature Information is sent in real name block chain by second of transaction, forms the smallest law by transaction twice of signing three times in this way Evidence triangle makes block chain transaction whole flow process form logic from being in harmony, so that entire transaction forms closed loop, forms by law The minimum law of protection and supervision effectively deposits card unit.And by signing three times, code insurance Guan San not homologous rays of signing three times Under private key signed and issued, and there is very strong logical relation, the system of any one do not known about the hacker of business inside story Attack, and it is unable to complete the process of a whole set of signing, effective law chain cannot be formed.
Message request includes related side address to be verified in one of the embodiments,;By destination address to signature after Message request verified, may include: the message request after signature be calculated by destination address it is to be verified Related side address;Extract current address;Judge whether current address and related side address to be verified are identical, if they are the same, then verify Pass through, otherwise verifies and do not pass through.
Behavioural information includes destination address to be verified in one of the embodiments,;Destination address passes through related side address Signing messages is verified, comprising: destination address carries out signing messages by related side address message request is calculated And behavioural information;Destination address extracts related side address to be verified from message request, extracts mesh to be verified in subordinate act information Mark address;Destination address judges whether address to be verified is identical as destination address;If address to be verified is identical as destination address, sentence Whether disconnected related side address and related side address to be verified are identical;If related side address is identical as related side address to be verified, It is verified, otherwise verifies and do not pass through;If address to be verified is not identical as destination address, verifies and do not pass through.
It is to be verified by the attribute of related side in the above-described embodiments, may determine that by the attribute of related side Whether relevant people is whether invitee and message request are legal etc., and the attribute of the related side can refer to the ground of related side Location, this is corresponding with orientation invitation corresponding in message request, i.e., message request can be orientation and invite, and carries related side Address.Specifically, after related side receives signature field, the message request after signature is extracted first, then according to target Address carries out the message request after the signature related side address to be verified is calculated, i.e., what is carried in message request is to be verified Related side address, then extracts current address, judges whether current address and related side address to be verified are identical, if phase Together, then it is verified, otherwise authentication failed, i.e., currently associated side is not to invite corresponding related side.
In turn, when destination address receives signing messages, carrying out verifying to signing messages can be destination address and passes through Related side address be calculated message request and behavioural information to signing messages, and destination address is so as to from message request It is middle to extract to related side address to be verified, destination address to be verified is extracted in subordinate act information, so as to judge to be verifiedly Whether location is identical as destination address and judges whether related side address and related side address to be verified are identical, if the judgement knot of the two When fruit is all identical, verifying just passes through.
Address is introduced in above-described embodiment, the corresponding related side in an address invites in the presence of orientation and indefinite in this way To the definition of invitation, orient invite when, whether legal etc., ensure that transaction if can verify related side by related side address Be normally carried out.
Message request includes inviting the time limit in one of the embodiments,;By destination address to the invitation letter after signature Breath is verified, further includes: be calculated to the message request after signature by destination address and is invited the time limit;Judgement is current After whether address and related side address to be verified are identical, further includes: if current address is identical as related side address to be verified, Current time is obtained, judges that current time whether in inviting the time limit, if so, being verified, is otherwise verified and do not passed through.
After judging whether related side address and related side address to be verified are identical in one of the embodiments, also wrap It includes: if related side address is identical as related side address to be verified, judging the response time in behavioural information whether when inviting In limit, if so, being verified, otherwise verifies and do not pass through.
It in the above-described embodiments, is verified by the attribute of message request, that is, itself the attribute of trading, the category Property can refer to invite the time limit.Related side the message request after signature be calculated by destination address invite the time limit and Related side address to be verified, judge current address with related side address to be verified it is identical after, can also judge current event Whether in inviting the time limit, if it is, be verified, thus related side message request can be replied to obtain it is relevant Behavioural information, if current time is not in inviting the time limit, i.e., message request fails, even if then related side is to the message request Replied, be also it is invalid, also can authentication failed when succeeding target address is verified.Such as destination address Judge related side address with related side address to be verified it is identical after, then can continue to judge the response time in behavioural information Whether in inviting the time limit, response time therein refers to the generation time of behavioural information, if when response in behavioural information Between when inviting in the time limit, then be verified, otherwise authentication failed, that is, think that this behavioural information is nullity letter Breath, is not considered as effective reply to message request.
In above-described embodiment, is defined in message request and invite the time limit, it is ensured that the timeliness of transaction, and can be It carries out depositing card in stipulated time.
Message request includes payment information in one of the embodiments,;Related side generates row corresponding with message request For information, comprising: obtain the transaction value of type and quantity corresponding with payment information;It is generated according to accessed transaction value Behavioural information.
Destination address verifies signing messages by related side address in one of the embodiments, comprising: target Address carries out signing messages by related side address message request and behavioural information is calculated;It extracts and hands in subordinate act information Easily value, extracts payment information from message request;Judge whether transaction value is corresponding with payment information, if corresponding, verifies Pass through, otherwise verifies and do not pass through.
In this embodiment, whether message request, which contains, beats coin demand, i.e., need relevant people to invite price to this Value, and the type and quantity etc. of payment value.Specifically, relevant people is mentioned from message request after getting message request Payment information is got, and corresponding behavioural information is generated according to the requirement of payment information, such as obtain corresponding with payment information Then accessed transaction value is added in behavioural information, shifts etc. by the transaction value of type and quantity.To Destination address, can be to extract transaction value in subordinate act information, from invitation after message request and behavioural information is calculated Payment information is extracted in information, then whether transaction value is corresponding with payment information, if corresponding, is verified, thus mesh Mark address can be generated it is corresponding deposit card information, that is, complete this closed loop for depositing card.
It trades for this between destination address and relevant people and signs three times twice, form the smallest legal argument three It is angular, so that block chain transaction whole flow process is formed logic from being in harmony, forms the minimum law for being protected by law and supervising and effectively deposit Demonstrate,prove unit.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2 Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out, But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in Figure 1, providing a kind of deposit system based on real name block chain, comprising: transaction Applicant, related side's and transaction corresponding destination address of applicant and related side corresponding with related side address.
Transaction applicant carries out message request for obtaining message request, and by corresponding first private key of destination address Signature, and according to the message request and destination address generation signature field after signature, signature field is sent to related side.
Related side is used for the message request after extracting destination address and signature in signature field, and passes through destination address pair Message request after signature is verified, if being verified, related side generates behavioural information corresponding with message request, is passed through Corresponding second private key in the related side address of related side signs behavioural information and message request to obtain signing messages, concurrently Play destination address signing messages and related side address being sent in real name block chain of trading for the first time.
Destination address is for verifying signing messages by related side address, if being verified, destination address is obtained It gets and deposits card information, and and initiated by the first private key to card information is deposited and signing messages carries out signature and is confirmed information Second of transaction will confirm that the related side address that information and destination address are sent in real name block chain.
Message request includes related side address to be verified in one of the embodiments,.
Related side is also used to carry out related side to be verified is calculated the message request after signature by destination address Location;Extract current address;Judge whether current address and related side address to be verified are identical, if they are the same, are then verified, otherwise Verifying does not pass through.
Behavioural information includes destination address to be verified in one of the embodiments,.
Destination address is also used to carry out signing messages by related side address that message request and behavioural information is calculated; Related side address to be verified is extracted from message request, extracts destination address to be verified in subordinate act information;Judge to be verifiedly Whether location is identical as destination address;If address to be verified is identical as destination address, related side address and related side to be verified are judged Whether address is identical;If related side address is identical as related side address to be verified, it is verified, otherwise verifies and do not pass through;If Address to be verified is not identical as destination address, then verifies and do not pass through.
Message request includes inviting the time limit in one of the embodiments,.
Related side, which is also used to be calculated to the message request after signature by destination address, invites the time limit.
Related side be also used to judge current address and related side address to be verified it is whether identical after, if current address with to It is identical to verify related side address, then obtains current time, current time is judged whether in inviting the time limit, if so, verifying is logical It crosses, otherwise verifies and do not pass through.
Destination address is also used to judge whether are related side address and related side address to be verified in one of the embodiments, After identical, if related side address is identical as related side address to be verified, judge response time in behavioural information whether It invites in the time limit, if so, being verified, otherwise verifies and do not pass through.
Message request includes payment information in one of the embodiments,.
Related side is also used to obtain the transaction value of type and quantity corresponding with payment information;According to accessed transaction Value generates behavioural information.
Destination address is also used to that signing messages is calculated by related side address in one of the embodiments, Message request and behavioural information;Transaction value is extracted in subordinate act information, payment information is extracted from message request;Judgement transaction Whether value is corresponding with payment information, if corresponding, be verified, otherwise verify and do not pass through.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of deposit card method based on real name block chain, which is characterized in that the described method includes:
The applicant that trades obtains message request, and is signed by corresponding first private key of destination address to message request, and According to the message request and destination address generation signature field after signature, the signature field is sent to related side;
Message request of the related side after extracting the destination address and signature in the signature field, and pass through the mesh The message request after the signature is verified in mark address, if being verified, the related side is generated and the invitation letter Corresponding behavioural information is ceased, by corresponding second private key in the related side address of the related side to the behavioural information and described Message request is signed to obtain signing messages, and is initiated to trade for the first time and be sent to signing messages and the related side address The destination address in real name block chain;
The destination address verifies the signing messages by the related side address, if being verified, the mesh Mark address gets and deposits card information, and demonstrate,proves information and signing messages is signed to obtain to described deposit by first private key Confirmation message, and initiate second of transaction and the confirmation message and the destination address are sent in the real name block chain The related side address.
2. the method according to claim 1, wherein the message request includes related side address to be verified;Institute It states and the message request after the signature is verified by the destination address, comprising:
The message request after the signature is carried out by the destination address related side address to be verified is calculated;
Extract current address;
Judge whether the current address and the related side address to be verified are identical, if they are the same, are then verified, otherwise verify Do not pass through.
3. according to the method described in claim 2, it is characterized in that, the behavioural information includes destination address to be verified;It is described Destination address verifies the signing messages by the related side address, comprising:
The destination address to the signing messages carries out that message request is calculated by the related side address and behavior is believed Breath;
The destination address extracts related side address to be verified from the message request, extracts from the behavioural information to be tested Demonstrate,prove destination address;
The destination address judges whether the address to be verified and the destination address are identical;If the address to be verified and institute It is identical to state destination address, judges whether the related side address and related side address to be verified are identical;If the related side address It is identical as related side address to be verified, then it is verified, otherwise verifies and do not pass through;If the address to be verified and the target Location is not identical, then verifies and do not pass through.
4. according to the method described in claim 3, it is characterized in that, the message request includes inviting the time limit;It is described to pass through institute Destination address is stated to verify the message request after the signature, further includes:
The message request after the signature be calculated by the destination address and invites the time limit;
It is described judge the current address and the related side address to be verified it is whether identical after, further includes:
If the current address is identical as the related side address to be verified, current time is obtained, judges the current time Whether in the invitation time limit, if so, being verified, otherwise verifies and do not pass through.
5. according to the method described in claim 4, it is characterized in that, the judgement related side address and related side to be verified After whether address is identical, further includes:
If the related side address is identical as related side address to be verified, judge whether is response time in the behavioural information In the invitation time limit, if so, being verified, otherwise verifies and do not pass through.
6. according to claim 1 to method described in 5 any one, which is characterized in that the message request includes payment information; The related side generates behavioural information corresponding with the message request, comprising:
The related side obtains the transaction value of type and quantity corresponding with the payment information;
The related side generates the behavioural information according to accessed transaction value.
7. according to the method described in claim 6, it is characterized in that, the destination address is by the related side address to described Signing messages is verified, comprising:
The destination address to the signing messages carries out that message request is calculated by the related side address and behavior is believed Breath;
The destination address extracts the transaction value from the behavioural information, and the payment is extracted from the message request Information;
The destination address judges whether the transaction value is corresponding with the payment information, if corresponding, is verified, otherwise Verifying does not pass through.
8. a kind of deposit system based on real name block chain, which is characterized in that the system comprises transaction applicant, related side, And the corresponding destination address of transaction applicant and related side corresponding with related side address;
The transaction applicant carries out message request for obtaining message request, and by corresponding first private key of destination address Signature, and according to the message request and destination address generation signature field after signature, the signature field is sent to Related side;
The related side is used for the message request after extracting the destination address and signature in the signature field, and passes through institute It states destination address to verify the message request after the signature, if being verified, the related side generates and invites with described Please the corresponding behavioural information of information, by corresponding second private key in the related side address of the related side to the behavioural information and The message request is signed to obtain signing messages, and is initiated to trade for the first time and sent out signing messages and the related side address Send the destination address into real name block chain;
The destination address is for verifying the signing messages by the related side address, if being verified, institute It states destination address and gets and deposit card information, and card information is deposited and signing messages is signed to described by first private key It is confirmed information, and initiates second of transaction and the confirmation message and the destination address is sent to the real name block chain In the related side address.
9. system according to claim 8, which is characterized in that the message request includes related side address to be verified;
The related side is also used to be calculated to the message request after the signature by the destination address to be verified Related side address;Extract current address;Judge whether the current address and the related side address to be verified are identical, if phase Together, then it is verified, otherwise verifies and do not pass through.
10. system according to claim 9, which is characterized in that the behavioural information includes destination address to be verified;
The destination address be also used to by the related side address to the signing messages be calculated message request and Behavioural information;Related side address to be verified is extracted from the message request, and target to be verified is extracted from the behavioural information Address;Judge whether the address to be verified and the destination address are identical;If the address to be verified and the destination address It is identical, judge whether the related side address and related side address to be verified are identical;If the related side address and phase to be verified The address Guan Fang is identical, then is verified, and otherwise verifies and does not pass through;If the address to be verified and the destination address be not identical, It then verifies and does not pass through.
CN201910726179.1A 2019-08-07 2019-08-07 Evidence storage method and system based on real-name block chain Active CN110443076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910726179.1A CN110443076B (en) 2019-08-07 2019-08-07 Evidence storage method and system based on real-name block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910726179.1A CN110443076B (en) 2019-08-07 2019-08-07 Evidence storage method and system based on real-name block chain

Publications (2)

Publication Number Publication Date
CN110443076A true CN110443076A (en) 2019-11-12
CN110443076B CN110443076B (en) 2021-06-01

Family

ID=68433785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910726179.1A Active CN110443076B (en) 2019-08-07 2019-08-07 Evidence storage method and system based on real-name block chain

Country Status (1)

Country Link
CN (1) CN110443076B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110954780A (en) * 2019-12-03 2020-04-03 湖南国奥电力设备有限公司 Underground cable fault detection method and device based on block chain
CN113095828A (en) * 2021-04-27 2021-07-09 支付宝(杭州)信息技术有限公司 Data evidence storage method and device based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN108537046A (en) * 2017-03-06 2018-09-14 才信网络科技(上海)有限公司 A kind of online contract signature system and method based on block chain technology
KR20180129027A (en) * 2017-05-24 2018-12-05 라온시큐어(주) Authentification methods and system based on programmable blockchain and one-id
US20190007402A1 (en) * 2016-03-28 2019-01-03 Black Gold Coin, Inc. SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
CN109242450A (en) * 2018-09-21 2019-01-18 北京京东尚科信息技术有限公司 Block catenary system and based on block catenary system realize method of commerce and transaction system
CN109729168A (en) * 2018-12-31 2019-05-07 浙江成功软件开发有限公司 A kind of data share exchange system and method based on block chain
CN109840767A (en) * 2018-01-09 2019-06-04 中国科学院计算技术研究所 Multi-party Fair contract based on block chain technology deposits card method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
US20190007402A1 (en) * 2016-03-28 2019-01-03 Black Gold Coin, Inc. SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION
CN108537046A (en) * 2017-03-06 2018-09-14 才信网络科技(上海)有限公司 A kind of online contract signature system and method based on block chain technology
KR20180129027A (en) * 2017-05-24 2018-12-05 라온시큐어(주) Authentification methods and system based on programmable blockchain and one-id
CN109840767A (en) * 2018-01-09 2019-06-04 中国科学院计算技术研究所 Multi-party Fair contract based on block chain technology deposits card method and system
CN109242450A (en) * 2018-09-21 2019-01-18 北京京东尚科信息技术有限公司 Block catenary system and based on block catenary system realize method of commerce and transaction system
CN109729168A (en) * 2018-12-31 2019-05-07 浙江成功软件开发有限公司 A kind of data share exchange system and method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱兴雄: "区块链技术在电商存证鉴证中的应用", 《网络应用》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110954780A (en) * 2019-12-03 2020-04-03 湖南国奥电力设备有限公司 Underground cable fault detection method and device based on block chain
CN113095828A (en) * 2021-04-27 2021-07-09 支付宝(杭州)信息技术有限公司 Data evidence storage method and device based on block chain
CN113095828B (en) * 2021-04-27 2023-09-01 支付宝(杭州)信息技术有限公司 Data storage method and device based on blockchain

Also Published As

Publication number Publication date
CN110443076B (en) 2021-06-01

Similar Documents

Publication Publication Date Title
Asgaonkar et al. Solving the buyer and seller’s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator
CN108492103B (en) Joint block chain consensus method
CN107330720B (en) Block chain-based integral processing method and system
CN109598149B (en) Service processing method and device
WO2019144745A1 (en) Smart contract generation method and apparatus
CN108846676A (en) Biological characteristic assistant payment method, device, computer equipment and storage medium
CN109598518A (en) Method for anti-counterfeit and device, electronic equipment based on block chain
CN110351133A (en) Method and device for the host node hand-off process in block catenary system
CN109067543A (en) Digital certificate management method, device, computer equipment and storage medium
CN109242675A (en) Assets dissemination method and device, electronic equipment based on block chain
CN108964924A (en) Digital certificate method of calibration, device, computer equipment and storage medium
CN112801658B (en) Cross-border resource transfer authenticity auditing method and device and electronic equipment
CN108985772A (en) A kind of verification method, device, equipment and the storage medium of block chain
CN110689434A (en) Cross-block chain interaction method based on notary group
CN111860865B (en) Model construction and analysis method, device, electronic equipment and medium
CN111383117A (en) Asset management method and device based on block chain and electronic equipment
CN109815138A (en) Business information test method, device, computer equipment and storage medium
CN111383114A (en) Asset information management method and device based on block chain
CN112200569B (en) Digital seal using method and device based on block chain and electronic equipment
CN111324661A (en) User cooperation method, device and medium based on block chain
CN109360070B (en) Tourism information processing method, device, equipment and storage medium based on alliance chain
CN111402033A (en) Asset information management method and device based on block chain
CN112070484B (en) Block chain-based data processing method and device
CN110443076A (en) Card method and system is deposited based on real name block chain
CN109886810B (en) Crowdsourcing transaction method and system, readable storage medium and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230724

Address after: No. 1-370, Enterprise Service Center, Yongledian, Tongzhou District, Beijing 101105

Patentee after: CORE CHAIN (BEIJING) TECHNOLOGY Co.,Ltd.

Address before: 100102 No.21, yard 6, North Fourth Ring Road East, Chaoyang District, Beijing (no.0535, Taiyanggong incubator)

Patentee before: Ruizi (Beijing) Technology Co.,Ltd.

TR01 Transfer of patent right