CN111130795A - Multistage signature method based on block chain technology - Google Patents
Multistage signature method based on block chain technology Download PDFInfo
- Publication number
- CN111130795A CN111130795A CN201911285817.7A CN201911285817A CN111130795A CN 111130795 A CN111130795 A CN 111130795A CN 201911285817 A CN201911285817 A CN 201911285817A CN 111130795 A CN111130795 A CN 111130795A
- Authority
- CN
- China
- Prior art keywords
- signature
- transaction
- transaction information
- block chain
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a multistage signature method based on a block chain.A client requests a digital certificate from a transaction verification mechanism; the transaction verification mechanism applies for a digital certificate from the certificate issuing mechanism and issues the digital certificate to the client; the client carries out primary digital signature on the transaction information through the digital certificate and then sends the transaction information to a transaction verification organization for validity verification; the transaction verification mechanism carries out secondary digital signature on the transaction information which passes the verification by adopting a digital certificate issued by the blockchain platform, carries out tertiary digital signature on the transaction information which is subjected to the secondary signature by adopting the digital certificate issued by the certificate issuing mechanism to the transaction verification mechanism, and sends the transaction information subjected to the tertiary signature to the application layer of the blockchain platform; and the block chain platform application layer checks the transaction information after the third-level signature to obtain the transaction information after the second-level signature and sends the transaction information to the block chain nodes, and the block chain nodes perform consensus after the check of the signature is completed. The invention adopts a multi-level signature mechanism, thereby improving the credibility, the safety and the traceability of the transaction.
Description
Technical Field
The invention relates to a block chain and digital signature technology, in particular to a multistage signature method based on the block chain technology.
Background
The block chain guarantees the non-tampering property, the credibility, the high safety and the traceability of information transmission through technical means, the value of the block chain in the aspects of identification, data right confirmation, credit management, value circulation, transaction clearing and settlement and the like in financial behaviors is determined by the characteristics of the block chain, and the trust problem in a financial scene is solved by utilizing the block chain. In order to ensure credible identity, safe transaction and traceable transaction, a set of certificate, signature and signature verification mechanism is very important and is a key for a financial scene that whether a block chain can fall to the ground or not. However, the signature technology of the current block chain mostly adopts first-level signatures, and the signature mode is single, so that security holes easily exist in transactions, and the traceability is poor.
Disclosure of Invention
The invention aims to provide a multistage signature method based on a block chain technology aiming at the defects of the prior art, so that credibility of identities of organizations, transaction safety and transaction traceability of the block chain in financial scene application are ensured.
In order to achieve the purpose, the invention has the following technical scheme: a multistage signature method based on a block chain comprises the following steps:
a client requests a digital certificate from a transaction verification authority;
the transaction verification mechanism applies for a digital certificate from the certificate issuing mechanism and issues the digital certificate to the client;
after a client carries out primary digital signature on transaction information through a digital certificate, the transaction information is sent to a transaction verification organization for validity verification;
the transaction verification mechanism carries out secondary digital signature on the transaction information passing the validity verification by adopting a digital certificate issued by the blockchain platform, carries out tertiary digital signature on the transaction information subjected to the secondary digital signature by adopting the digital certificate issued by the certificate issuing mechanism to the transaction verification mechanism, and sends the transaction information subjected to the tertiary digital signature to the application layer of the blockchain platform;
and the block chain platform application layer checks the transaction information after the third-level signature to obtain the transaction information after the second-level signature and sends the transaction information to the block chain nodes, and the block chain nodes perform consensus after the check of the signature is completed.
Further, the transaction verification facility may be a financial facility (e.g., a bank, a security, etc.); the certificate authority may be a financial institution or a third party electronic certification service (e.g., a third party institution such as a CFCA); the digital certificate issued by the transaction verification authority to the customer may be a Ukey, a document certificate, or the like.
Further, the client initiates a transaction request at the client, and sends the transaction information to the transaction verification mechanism after the client performs primary digital signature by using the digital certificate.
Further, the primary digital signature is used for realizing the authority control and identity admission of the client, and the primary digital signature can adopt asymmetric key encryption and digital digest technology.
Furthermore, the secondary digital signature improves the non-tampering and traceability of the transaction through a plurality of block chain node endorsement signature verification mechanisms.
Further, the three-level digital signature is used for realizing authority control and identity admission of a transaction verification mechanism and ensuring that the two-level signature data cannot be tampered.
Further, in the multi-stage signature process, a client performs first-stage signature on transaction information by using a private key issued by a certificate issuing mechanism, and a transaction verification mechanism performs signature verification by using a public key of the client;
the transaction verification mechanism carries out secondary signature on the transaction information by using a private key issued to the client by the blockchain platform, and carries out tertiary signature on the transaction information subjected to the secondary signature by using the private key issued to the transaction verification mechanism by the certificate issuing mechanism;
the block chain platform application layer adopts a public key of a transaction verification mechanism to check and sign the transaction information after the third-level signature, obtains the transaction information after the second-level signature, sends the transaction information to a block chain node, and checks and signs the transaction information after the second-level signature by a client public key issued by the block chain platform;
wherein the public key issued by the certificate authority is shared by the whole network; the public key issued by the blockchain platform is communicated with transaction information.
Furthermore, the block chain platform realizes the admission control of the alliance members through a CA system signature authentication mode, and supports two modes of self-establishment CA and CFCA.
Further, the label checking and consensus process of the block chain nodes is as follows:
and the block chain main node and the block chain endorsement node check the signature of the transaction information subjected to the secondary signature, perform consensus verification after the signature check is passed, generate a block after the consensus is passed, perform block broadcasting in the partition, and write the transaction result into an account book.
Further, the consensus verification adopts a PBFT consensus algorithm, when the block link node receives the validity confirmation of other 2f nodes, the transaction is run in a contract virtual machine, wherein f is the number of fault-tolerant nodes, and the total nodes are 3f + 1.
Further, signature and signature verification of the blockchain nodes adopt the cryptographic algorithms SM2, SM3 and SM 4.
The invention has the beneficial effects that: the invention adopts a multi-level signature mechanism, wherein a first-level digital signature is used for realizing the authority control and the identity access of a client, a second-level digital signature is used for carrying out endorsement and signature verification through a plurality of block chain nodes, the non-tampering and traceability of transactions are improved, a third-level digital signature is used for realizing the authority control and the identity access of a transaction verification mechanism, and the second-level signature data is ensured not to be tampered. The invention improves the credibility, the safety and the traceability of the transaction through the cooperation of the three-level signature.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a multi-level signature method based on a block chain technique according to the present invention;
FIG. 2 is a flow chart of the signature verification and consensus of the block link points according to an embodiment of the present invention;
fig. 3 is a block chain digital signature flow chart according to an embodiment of the invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
As shown in fig. 1, the present application provides a multi-level signature method based on a block chain technique, including:
a client requests a digital certificate from a transaction verification authority;
the transaction verification mechanism applies for a digital certificate from the certificate issuing mechanism and issues the digital certificate to the client;
after a client carries out primary digital signature on transaction information through a digital certificate, the transaction information is sent to a transaction verification organization for validity verification;
the transaction verification mechanism carries out secondary digital signature on the transaction information passing the validity verification by adopting a digital certificate issued by the blockchain platform, carries out tertiary digital signature on the transaction information subjected to the secondary digital signature by adopting the digital certificate issued by the certificate issuing mechanism to the transaction verification mechanism, and sends the transaction information subjected to the tertiary digital signature to the application layer of the blockchain platform;
and the block chain platform application layer checks the transaction information after the third-level signature to obtain the transaction information after the second-level signature and sends the transaction information to the block chain nodes, and the block chain nodes perform consensus after the check of the signature is completed.
The first-level digital signature is used for realizing the authority control and the identity access of a client, and the first-level digital signature can adopt asymmetric key encryption and digital digest technology. The secondary digital signature improves the non-falsification and traceability of the transaction through a plurality of block chain node endorsement signature verification mechanisms. The three-level digital signature is used for realizing the authority control and identity admission of a transaction verification mechanism and ensuring that the second-level signature data cannot be tampered.
In the embodiment of the present application, the transaction verification mechanism may be a financial mechanism, such as a bank, a security, etc.; the certificate authority may be a financial institution or a third party electronic certification service institution, such as a third party institution like CFCA; the digital certificate issued by the transaction verification authority to the customer may be a Ukey, a document certificate, or the like.
In some embodiments, the transaction verification authority and the certificate authority are both banks, and a multi-level signature mechanism of the client, the bank network server node and the block link node is established. The bank issues a Ukey digital certificate to the client, the client initiates a transaction request at the client, and sends transaction information to a bank network server node for validity verification after the client uses the Ukey to perform primary digital signature.
In the embodiment of the application, in the multi-stage signature process, a client signs transaction information at one stage by using a private key issued by a certificate issuing mechanism, and a transaction verification mechanism checks the signature by using a public key of the client;
the transaction verification mechanism carries out secondary signature on the transaction information by using a private key issued to the client by the blockchain platform, and carries out tertiary signature on the transaction information subjected to the secondary signature by using the private key issued to the transaction verification mechanism by the certificate issuing mechanism;
the block chain platform application layer adopts a public key of a transaction verification mechanism to check and sign the transaction information after the third-level signature, obtains the transaction information after the second-level signature, sends the transaction information to a block chain node, and checks and signs the transaction information after the second-level signature by a client public key issued by the block chain platform;
wherein the public key issued by the certificate authority is shared by the whole network; the public key issued by the blockchain platform is communicated with transaction information.
In the embodiment of the application, the block chain platform realizes the admission control of the alliance members through a CA system signature authentication mode, and supports two modes of self-establishment CA and CFCA.
As shown in fig. 2, the processes of signature verification and consensus of the blockchain nodes are as follows: and the block chain main node and the block chain endorsement node check the signature of the transaction information subjected to the secondary signature, perform consensus verification after the signature check is passed, generate a block after the consensus is passed, perform block broadcasting in the partition, and write the transaction result into an account book.
Optionally, the consensus verification adopts a PBFT consensus algorithm, and when the block link node receives the validity confirmation of other 2f nodes, the transaction is run in the contract virtual machine, where f is the number of fault-tolerant nodes, and the total node is 3f + 1.
In the embodiment of the application, the signature and signature verification of the blockchain node adopts national cryptographic algorithms SM2, SM3 and SM4, wherein SM2 is a public key cryptographic algorithm standard based on elliptic curve cryptography, comprises digital signature, key exchange and public key encryption, and is used for replacing international algorithms such as RSA/DiffieHellman/ECDSA/ECDH and the like; SM3 is cipher hash algorithm, which is used to replace MD5/SHA-1/SHA-256 international hash algorithm; SM4 is a block cipher algorithm used to replace international symmetric encryption algorithm such as AES/DES/3 DES. The safety of the elliptic curve cryptosystem is based on the difficulty of the elliptic curve discrete logarithm problem, and because the problem has no solution of sub-exponential time, the unit bit intensity of the elliptic curve cryptosystem (ECC for short) is much higher than that of the traditional discrete logarithm system, so the calculation parameter is smaller, the key is shorter, the operation speed is faster, and the signature is shorter. The block chain digital signature flow is shown in fig. 3.
The foregoing is only a preferred embodiment of the present invention, and although the present invention has been disclosed in the preferred embodiments, it is not intended to limit the present invention. Those skilled in the art can make numerous possible variations and modifications to the present teachings, or modify equivalent embodiments to equivalent variations, without departing from the scope of the present teachings, using the methods and techniques disclosed above. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present invention are still within the scope of the protection of the technical solution of the present invention, unless the contents of the technical solution of the present invention are departed.
Claims (10)
1. A multistage signature method based on a block chain is characterized by comprising the following steps:
a client requests a digital certificate from a transaction verification authority;
the transaction verification mechanism applies for a digital certificate from the certificate issuing mechanism and issues the digital certificate to the client;
after the client carries out primary digital signature on the transaction information through the digital certificate, the transaction information is sent to a transaction verification organization for validity verification.
And the transaction verification mechanism carries out secondary digital signature on the transaction information passing the validity verification by adopting the digital certificate issued by the blockchain platform, carries out tertiary digital signature on the transaction information subjected to the secondary signature by adopting the digital certificate issued by the certificate issuing mechanism to the transaction verification mechanism, and sends the transaction information subjected to the tertiary signature to the application layer of the blockchain platform.
And the block chain platform application layer checks the transaction information after the third-level signature to obtain the transaction information after the second-level signature and sends the transaction information to the block chain nodes, and the block chain nodes perform consensus after the check of the signature is completed.
2. The blockchain-based multi-level signature method of claim 1, wherein the transaction verification entity is a financial institution; the certificate authority is a financial institution or a third-party electronic authentication service institution; the digital certificate issued by the transaction verification mechanism to the client adopts Ukey, file certificate and the like.
3. The blockchain-based multi-level signature method as claimed in claim 1, wherein the client initiates a transaction request at the client and sends the transaction information to the transaction verification mechanism after the client performs a first-level digital signature using the digital certificate.
4. The multistage signature method based on the block chain as claimed in claim 1, wherein the one-stage digital signature is used for realizing authority control and identity admission of the client.
5. The blockchain-based multi-stage signature method according to claim 1, wherein the secondary digital signature improves non-falsification and traceability of transactions through a multiple blockchain node endorsement signature verification mechanism.
6. The blockchain-based multi-stage signature method as claimed in claim 1, wherein the three-stage digital signature is used for implementing authority control and identity admission of a transaction verification mechanism and ensuring that the two-stage signature data is not tampered.
7. The multistage signature method based on the blockchain as claimed in claim 1, wherein in the multistage signature process, a client performs primary signature on transaction information by using a private key issued by a certificate authority, and a transaction verification authority performs signature verification by using a public key of the client;
the transaction verification mechanism carries out secondary signature on the transaction information by using a private key issued to the client by the blockchain platform, and carries out tertiary signature on the transaction information subjected to the secondary signature by using the private key issued to the transaction verification mechanism by the certificate issuing mechanism;
the block chain platform application layer adopts a public key of a transaction verification mechanism to check and sign the transaction information after the third-level signature, obtains the transaction information after the second-level signature, sends the transaction information to a block chain node, and checks and signs the transaction information after the second-level signature by a client public key issued by the block chain platform;
wherein the public key issued by the certificate authority is shared by the whole network; the public key issued by the blockchain platform is communicated with transaction information.
8. The multistage signature method based on the block chain as claimed in claim 1, wherein the block chain platform implements admission control of alliance members by a CA system signature authentication mode, and supports two modes of self-established CA and CFCA.
9. The multistage signature method based on the blockchain as claimed in claim 1, wherein the signature verification and consensus process of the blockchain nodes is as follows:
and the block chain main node and the block chain endorsement node check the signature of the transaction information subjected to the secondary signature, perform consensus verification after the signature check is passed, generate a block after the consensus is passed, perform block broadcasting in the partition, and write the transaction result into an account book.
10. The multistage signature method based on the block chain as claimed in claim 1, wherein the consensus verification adopts a PBFT consensus algorithm, and when a block link node receives the validity confirmation of other 2f nodes, the transaction is run in a contract virtual machine, wherein f is the number of fault-tolerant nodes, and the total node is 3f + 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911285817.7A CN111130795B (en) | 2019-12-13 | 2019-12-13 | Multistage signature method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911285817.7A CN111130795B (en) | 2019-12-13 | 2019-12-13 | Multistage signature method based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111130795A true CN111130795A (en) | 2020-05-08 |
CN111130795B CN111130795B (en) | 2022-12-27 |
Family
ID=70498908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911285817.7A Active CN111130795B (en) | 2019-12-13 | 2019-12-13 | Multistage signature method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111130795B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111651745A (en) * | 2020-05-12 | 2020-09-11 | 长春吉大正元信息技术股份有限公司 | Application authorization signature method based on password equipment |
CN111815321A (en) * | 2020-05-21 | 2020-10-23 | 北京金山云网络技术有限公司 | Transaction proposal processing method, device, system, storage medium and electronic device |
CN111861489A (en) * | 2020-07-16 | 2020-10-30 | 中国工商银行股份有限公司 | Financial product transaction share determination method and device based on block chain |
CN111899002A (en) * | 2020-07-27 | 2020-11-06 | 浙江数秦科技有限公司 | Method for efficiently performing cross-chain information transaction interaction in block chain |
CN112150284A (en) * | 2020-09-22 | 2020-12-29 | 浙江数秦科技有限公司 | Block chain heterogeneous chain cross-chain transaction method |
CN112468450A (en) * | 2020-11-06 | 2021-03-09 | 通联支付网络服务股份有限公司 | Method for integrating API interfaces among service providers by API open platform |
CN112765622A (en) * | 2021-01-13 | 2021-05-07 | 中国外运股份有限公司 | Digital certificate management method, device, equipment and medium for electronic bill of lading |
CN112839041A (en) * | 2021-01-05 | 2021-05-25 | 国网浙江省电力有限公司嘉兴供电公司 | Block chain-based power grid identity authentication method, device, medium and equipment |
CN113362181A (en) * | 2021-07-20 | 2021-09-07 | 永旗(北京)科技有限公司 | Transaction method and system based on block chain |
CN113469690A (en) * | 2021-07-23 | 2021-10-01 | 永旗(北京)科技有限公司 | Transaction settlement method based on block chain |
CN114172666A (en) * | 2021-12-10 | 2022-03-11 | 北京泰尔英福科技有限公司 | Block chain identification-based digital certificate multistage processing method and device |
CN114978531A (en) * | 2022-05-11 | 2022-08-30 | 上海健交科技服务有限责任公司 | Deep learning-oriented data credible traceability marking method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2817422A1 (en) * | 2000-11-30 | 2002-05-31 | Gemplus Card Int | MULTI-LEVEL ELECTRONIC SIGNATURE PROCESS |
JP2005210277A (en) * | 2004-01-21 | 2005-08-04 | Ntt Docomo Inc | Multistage signature verification system, electronic signature providing apparatus, data adding apparatus, and electronic signature verification apparatus |
CN110532809A (en) * | 2019-08-21 | 2019-12-03 | 杭州趣链科技有限公司 | A kind of block chain multistage endorsement method based on configuration block |
-
2019
- 2019-12-13 CN CN201911285817.7A patent/CN111130795B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2817422A1 (en) * | 2000-11-30 | 2002-05-31 | Gemplus Card Int | MULTI-LEVEL ELECTRONIC SIGNATURE PROCESS |
JP2005210277A (en) * | 2004-01-21 | 2005-08-04 | Ntt Docomo Inc | Multistage signature verification system, electronic signature providing apparatus, data adding apparatus, and electronic signature verification apparatus |
CN110532809A (en) * | 2019-08-21 | 2019-12-03 | 杭州趣链科技有限公司 | A kind of block chain multistage endorsement method based on configuration block |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111651745B (en) * | 2020-05-12 | 2023-06-30 | 长春吉大正元信息技术股份有限公司 | Application authorization signature method based on password equipment |
CN111651745A (en) * | 2020-05-12 | 2020-09-11 | 长春吉大正元信息技术股份有限公司 | Application authorization signature method based on password equipment |
CN111815321A (en) * | 2020-05-21 | 2020-10-23 | 北京金山云网络技术有限公司 | Transaction proposal processing method, device, system, storage medium and electronic device |
CN111861489A (en) * | 2020-07-16 | 2020-10-30 | 中国工商银行股份有限公司 | Financial product transaction share determination method and device based on block chain |
CN111899002A (en) * | 2020-07-27 | 2020-11-06 | 浙江数秦科技有限公司 | Method for efficiently performing cross-chain information transaction interaction in block chain |
CN111899002B (en) * | 2020-07-27 | 2024-03-22 | 浙江数秦科技有限公司 | Method for efficiently performing cross-chain information transaction interaction in blockchain |
CN112150284A (en) * | 2020-09-22 | 2020-12-29 | 浙江数秦科技有限公司 | Block chain heterogeneous chain cross-chain transaction method |
CN112150284B (en) * | 2020-09-22 | 2024-04-12 | 浙江数秦科技有限公司 | Blockchain heterogeneous chain cross-chain transaction method |
CN112468450A (en) * | 2020-11-06 | 2021-03-09 | 通联支付网络服务股份有限公司 | Method for integrating API interfaces among service providers by API open platform |
CN112839041B (en) * | 2021-01-05 | 2022-09-23 | 国网浙江省电力有限公司嘉兴供电公司 | Block chain-based power grid identity authentication method, device, medium and equipment |
CN112839041A (en) * | 2021-01-05 | 2021-05-25 | 国网浙江省电力有限公司嘉兴供电公司 | Block chain-based power grid identity authentication method, device, medium and equipment |
CN112765622A (en) * | 2021-01-13 | 2021-05-07 | 中国外运股份有限公司 | Digital certificate management method, device, equipment and medium for electronic bill of lading |
CN112765622B (en) * | 2021-01-13 | 2024-04-16 | 中国外运股份有限公司 | Digital certificate management method, device, equipment and medium for electronic bill of lading |
CN113362181A (en) * | 2021-07-20 | 2021-09-07 | 永旗(北京)科技有限公司 | Transaction method and system based on block chain |
CN113362181B (en) * | 2021-07-20 | 2023-11-24 | 佳乔(深圳)投资有限公司 | Transaction method and system based on blockchain |
CN113469690A (en) * | 2021-07-23 | 2021-10-01 | 永旗(北京)科技有限公司 | Transaction settlement method based on block chain |
CN113469690B (en) * | 2021-07-23 | 2024-03-26 | 佳乔(深圳)投资有限公司 | Transaction settlement method based on blockchain |
CN114172666A (en) * | 2021-12-10 | 2022-03-11 | 北京泰尔英福科技有限公司 | Block chain identification-based digital certificate multistage processing method and device |
CN114978531A (en) * | 2022-05-11 | 2022-08-30 | 上海健交科技服务有限责任公司 | Deep learning-oriented data credible traceability marking method and system |
CN114978531B (en) * | 2022-05-11 | 2024-04-30 | 上海健交科技服务有限责任公司 | Deep learning-oriented data credible traceability marking method and system |
Also Published As
Publication number | Publication date |
---|---|
CN111130795B (en) | 2022-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111130795B (en) | Multistage signature method based on block chain technology | |
US20230327880A1 (en) | Quantumproof blockchain | |
CN110046996B (en) | Data processing method and device | |
CN107240017B (en) | Block chain transaction management system and method | |
CN109829326B (en) | Cross-domain authentication and fair audit de-duplication cloud storage system based on block chain | |
CN107438002B (en) | Block chain based system and electronic device and method in system | |
US10742420B1 (en) | Quantum-resistant double signature system | |
US11212081B2 (en) | Method for signing a new block in a decentralized blockchain consensus network | |
US20200313897A1 (en) | Blockchain-based authentication and authorization | |
US11038689B2 (en) | Efficient block chain generation | |
Varshney et al. | Authentication & encryption based security services in blockchain technology | |
CN112437938A (en) | System and method for block chain address and owner verification | |
CN107171812A (en) | It is a kind of based on block chain without key signature infrastructure construction method | |
EP4073733A1 (en) | Digital currency minting in a system of network nodes implementing a distributed ledger | |
CN111160909B (en) | Hidden static supervision system and method for blockchain supply chain transaction | |
CN114499952A (en) | Alliance chain consensus identity authentication method | |
CN110868295A (en) | Anti-quantum computing alliance chain system based on secret sharing and communication method | |
CN110557247B (en) | Identity-based blockchain method and system | |
CN112184245B (en) | Transaction identity confirmation method and device for cross-region block chain | |
Huang et al. | zkChain: A privacy‐preserving model based on zk‐SNARKs and hash chain for efficient transfer of assets | |
Boontaetae et al. | RDI: Real digital identity based on decentralized PKI | |
CN109687967B (en) | Electronic signature method and device | |
CN112163917B (en) | Bill processing method and device based on blockchain, medium and electronic equipment | |
CN103347085B (en) | The public audit method for designing of many writes model of cloud data security | |
Hajar et al. | Blockchain Security Attacks: A Review Study |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |