CN111311210A - Asymmetric encryption digital currency transaction data processing method and device - Google Patents

Asymmetric encryption digital currency transaction data processing method and device Download PDF

Info

Publication number
CN111311210A
CN111311210A CN202010079664.7A CN202010079664A CN111311210A CN 111311210 A CN111311210 A CN 111311210A CN 202010079664 A CN202010079664 A CN 202010079664A CN 111311210 A CN111311210 A CN 111311210A
Authority
CN
China
Prior art keywords
digital currency
client
currency
public key
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010079664.7A
Other languages
Chinese (zh)
Other versions
CN111311210B (en
Inventor
夏禾
陈朝明
肖月亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202010079664.7A priority Critical patent/CN111311210B/en
Publication of CN111311210A publication Critical patent/CN111311210A/en
Application granted granted Critical
Publication of CN111311210B publication Critical patent/CN111311210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a method and a device for processing digital currency transaction data by asymmetric encryption, comprising the following steps: performing identity authentication on a second client according to an authentication instruction sent by a first client; signing the first digital currency sent by the second client side which passes the identity authentication; sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number. The method and the system at least solve the problems that in the prior art, various digital currency systems must be operated independently, currency cannot cross the systems, and account concepts need to be established.

Description

Asymmetric encryption digital currency transaction data processing method and device
Technical Field
The application belongs to the field of financial science and technology, and particularly relates to a method and a device for processing digital currency transaction data with asymmetric encryption.
Background
With the continuous development of information technology, mobile payment has penetrated into various fields of life and becomes a great revolution for converting social consumption behaviors. Meanwhile, digital currency has been widely used in people's economic life in recent years as a medium for mobile payment, a new form of currency, a new economic term, and the digital currency has been taken out of laboratories to go to the market for nearly 20 years, and with the implementation of new development policies, the promotion activity of "no paper money" in cities has been fully developed. Currently, digital currencies can be divided into five major categories: debit card type digital currency, credit card type digital currency, prepaid card type digital currency (bus cards), prepaid card-like type digital currency (Q-currency), and virtual currency. Of these five categories, the unit of charge of the top 4 categories of electronic money is consistent with the money whose intrinsic value is issued by the country, and can be considered as an electronic representation of the conventional money. However, the following problems are present in both electronic money and virtual money, although the virtual money is different and is significantly different in terms of the unit of charge and the manner of issuance:
1. various digital currency systems operate independently, sharing is difficult, and currency cannot exist across the systems.
2. Conventional electronic money must have a concept of an account, which is closely related to the funds therein.
3. The currency and the system cannot be divided, and all account information must be stored in a central service system; for virtual currency, bitcoin distributed ledgers require clients to expend significant resources for storage and computation.
Disclosure of Invention
The application provides a method and a device for processing digital currency transaction data with asymmetric encryption, which at least solve the problems that in the prior art, various digital currency systems must operate independently, currency cannot cross the systems and account concepts need to be established.
According to one aspect of the present application, there is provided an asymmetrically encrypted digital currency transaction data processing method, comprising:
performing identity authentication on a second client according to an authentication instruction sent by a first client;
signing the first digital currency sent by the second client side which passes the identity authentication;
sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In an embodiment, performing identity authentication on a second client according to an authentication instruction sent by a first client includes:
sending a random number to the second client to enable the second client to generate a random number signature;
verifying whether the received random number signature is correct.
In one embodiment, signing the first digital currency sent by the authenticated second client comprises:
searching a corresponding server public key through a currency serial number in the first digital currency, and verifying the validity of the first digital currency through the server public key;
after the verification is passed, a new server public key and a new server private key are generated by using an asymmetric encryption algorithm;
and signing the verified first digital currency by using the server private key.
In one embodiment, the present application further provides an asymmetrically encrypted digital currency transaction data processing method, including:
generating a second digital currency according to the first digital currency provided by the client;
generating a local public key and a local private key by using an asymmetric encryption algorithm;
sending the local public key and the second digital currency to the client, and initiating a verification instruction to the server so that the server verifies the client and completes the signature of the second digital currency;
receiving the second digital currency signed by the server.
In one embodiment, the present application further provides an asymmetrically encrypted digital currency transaction data processing method, including:
sending the first digital currency to a client so that the client generates second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm;
the received second digital currency is changed by using the received client public key and then is sent to the server, so that the server signs the second digital currency;
and receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
In one embodiment, altering the received second digital currency with the received client public key comprises:
filling the client public key into a second digital currency;
the second digital currency populated with the client public key is signed with the local private key.
According to another aspect of the present application, there is also provided an asymmetrically encrypted digital currency transaction data processing apparatus comprising:
the identity authentication unit is used for authenticating the identity of the second client according to the authentication instruction sent by the first client;
the first signature unit is used for signing the first digital currency sent by the second client side which passes the identity authentication;
the basic information updating unit is used for sending the signed first digital currency to the second client for confirmation, and updating basic information of the first digital currency after the second client confirms; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In one embodiment, the authentication unit includes:
the random number sending module is used for sending a random number to the second client so that the second client generates a random number signature;
and the random number signature verification module is used for verifying whether the received random number signature is correct or not.
In one embodiment, the first signature unit comprises:
the public key verification module is used for searching a corresponding server public key through a currency serial number in the first digital currency and verifying the validity of the first digital currency through the server public key;
the public key and private key generation module is used for generating a new server public key and a new server private key by using an asymmetric encryption algorithm after verification is passed;
and the new signature module is used for signing the verified first digital currency by using the server private key.
In one embodiment, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a second digital currency generation unit for generating a second digital currency from the first digital currency provided by the client;
the asymmetric encryption generating unit is used for generating a local public key and a local private key by using an asymmetric encryption algorithm;
the second signature unit is used for sending the local public key and the second digital currency to the client side and sending a verification instruction to the server side so that the server side verifies the client side and completes signature of the second digital currency;
a receiving unit for receiving the second digital currency signed by the server.
In one embodiment, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a sending unit, configured to send the first digital currency to the client, so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm;
the change unit is used for changing the received second digital currency by using the received client public key and then sending the changed second digital currency to the server so as to enable the server to sign the second digital currency;
and the receiving and forwarding unit is used for receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
In one embodiment, the alteration unit includes:
the public key filling module is used for filling the client public key into the second digital currency;
and the third signature module is used for signing the second digital currency filled in the client public key by using the local private key.
The application provides a brand-new digital currency composition and transaction data processing method, and particularly comprises a digital currency issuing, transaction and safety guarantee method. The brand-new digital currency structure and the transaction data processing method have the advantages that the issuer of the digital currency does not need to store any characteristics of the currency and record owner information of the currency, and the function that the owner of the currency can check the account information of the owner of the currency without logging in a server is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow chart of a method for processing data of an asymmetrically encrypted digital currency transaction provided by the present application.
Fig. 2 is a flowchart of a method for authenticating a second client according to a verification instruction sent by a first client in the embodiment of the present application.
Fig. 3 is a flowchart of a method for signing a first digital currency sent by a second client that passes authentication according to an embodiment of the present application.
Fig. 4 is a flowchart of a method for processing data of an asymmetrically encrypted digital currency transaction according to an embodiment of the present application.
Fig. 5 is a flow chart of another asymmetric encrypted digital currency transaction data processing method according to an embodiment of the present application.
Fig. 6 is a flowchart of a method for changing the received second digital currency by using the received client public key in the embodiment of the present application.
Fig. 7 is a block diagram of an asymmetric encrypted digital currency transaction data processing apparatus according to the present application.
Fig. 8 is a block diagram of an authentication unit in the embodiment of the present application.
Fig. 9 is a block diagram of a first signature unit in the embodiment of the present application.
Fig. 10 is a block diagram of an asymmetric encrypted digital currency transaction data processing apparatus according to an embodiment of the present application.
Fig. 11 is a block diagram of another asymmetric encryption digital currency transaction data processing apparatus according to an embodiment of the present application.
Fig. 12 is a block diagram showing a configuration of a modification unit in the embodiment of the present application.
Fig. 13 is a specific implementation of an electronic device in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Digital currencies currently on the market can be divided into five major categories: debit card type digital currency, credit card type digital currency, prepaid card type digital currency (bus cards), prepaid card-like type digital currency (Q-currency), and virtual currency. Of these five categories, the unit of charge of the top 4 categories of electronic money is consistent with the money whose intrinsic value is issued by the country, and can be considered as an electronic representation of the conventional money. However, the following problems are present in both electronic money and virtual money, although the virtual money is different and is significantly different in terms of the unit of charge and the manner of issuance:
1. various digital currency systems operate independently, sharing is difficult, and currency cannot exist across the systems.
2. Conventional electronic money must have a concept of an account, which is closely related to the funds therein.
3. The currency and the system cannot be divided, and all account information must be stored in a central service system; for virtual currency, bitcoin distributed ledgers require clients to expend significant resources for storage and computation.
In order to solve the above problems, the present application proposes a new type of digital money composed of information such as face value, unique serial number, issue time, owner's public key, and issuer's digital signature. And the money account corresponding to the digital money is composed of the digital money and the private key of the owner. By adding the owner's public key to the digital currency, the function of knowing who the digital currency is owned without a traditional account can be realized.
Before the specific scheme of the present application is introduced, a key encryption mode, namely an asymmetric encryption algorithm, which is different from the prior art and is required by the present application is introduced.
Concept of asymmetric encryption: two keys are required for encryption and decryption, a public key (public key for short) and a private key (private key for short), information encrypted by the public key can be decrypted only by the private key, and information encrypted by the private key can be decrypted only by the public key.
Principle of asymmetric encryption: the public key and the private key are required to be in pairs, if the data is encrypted by the public key, the data can be decrypted only by using the corresponding private key, so that the data is safe as long as the private key is not leaked.
Common asymmetric encryption: RSA, ECC (elliptic Curve cryptography), Diffie-Hellman, El Gamal, DSA (for digital signatures).
The RSA algorithm describes:
the first step is as follows: two prime numbers P and Q are randomly found, and the larger the P and Q are, the safer the two prime numbers are.
Such as P67 and Q71. And calculating the product n, P, Q and 4757 of the two, converting the product into 1001010010101, wherein the encryption algorithm is 13 bits, the actual algorithm is 1024 bits or 2048 bits, and the longer the bit number is, the more difficult the algorithm is to break.
The second step is that: an euler function phi (n) for n is calculated.
Phi (n) represents the number of numbers which form a relatively prime relationship with n among positive integers of n or less. For example: among 1 to 8, 1, 3, 5, and 7, which form a relatively prime relationship with 8, so that Φ (n) is 4.
If n is equal to P × Q and P and Q are both prime numbers, then Φ (n) ═ Φ (P × Q) ═ Φ (P-1) Φ (Q-1) ═ P-1) (Q-1).
In this example, phi (n) is 66 × 70 is 4620, here denoted m, and m is phi (n) is 4620
The third step: an integer e is randomly chosen, provided that 1< e < m, and e is coprime to m.
The common divisor is only two integers of 1, called coprime integers, where we randomly choose e 101. Note that 4619 is not to be chosen, and if this is chosen, the public and private keys will become the same.
The fourth step: there is an integer d, such that the remainder of e x d divided by m is 1.
I.e. find an integer d such that (e × d)% m ═ 1. Equivalent to e d-1 y m (y is an integer), finding d is essentially solving the following one-dimensional equation. e x-m y 1, wherein e 101, m 4620
The equation 101x-4620y ═ 1 can be solved by an "extended euclidean algorithm", and a specific procedure is omitted here. In summary, a set of integer solutions (x, y) ═ (1601, 35) is calculated, i.e., d ═ 1601. By this time the key pair is generated. Different e's generate different d's, and thus multiple key pairs can be generated.
The fifth step: a public key and a private key are generated.
In this example, the public key is (n, e) ═ 4757,101, the private key is (n, d) ═ 4757, 1601, and only (n, e) ═ 4757,101 is disclosed, and the remaining numbers are not disclosed.
It can be imagined that if only n and e are available, how to deduce d can only be cracked by violence, and the longer the number of bits, the longer the time for violent cracking.
Application of asymmetric encryption algorithm:
asymmetric encryption algorithms are commonly used for encryption and digital signatures.
For encrypted communication: public key encryption and private key decryption. After all, the public key can be published, but the private key is only known and therefore can only be decrypted.
For digital signatures: private key encryption and public key decryption. The good biyan signature is true only if you sign themselves, and others sign false.
In the present application, an asymmetric encryption algorithm is chosen. The longest RSA key that is cracked today is 768 bits. In practical application, the key length of RSA is 1024 bits, and in important occasions, the key length is 2048 bits, so that the RSA cannot be cracked in the next half century. The method provided by the application has higher safety requirement and can be realized by adopting an RSA-2056 algorithm. The specific implementation method is described in the RSA algorithm.
Based on the novel digital currency, the application provides an asymmetric encrypted digital currency transaction data processing method, which comprises the following steps:
s101: and performing identity authentication on the second client according to the authentication instruction sent by the first client.
In one embodiment, when a digital currency transaction is performed, a client a wishes to send digital currency to a client B, and a server of a digital currency issuer (server) authenticates the client a after receiving an authentication instruction.
S102: the first digital currency sent by the second authenticated client is signed.
In a specific embodiment, a client A transfers original digital currency held by the client A to a client B, the client B generates a public key PK _ B and a private key SK _ B through an asymmetric encryption algorithm, sends the public key PK _ B and the original digital currency to the client A, and stores the private key SK _ B. The client A generates new digital currency (first digital currency) according to the sent public key PK _ B and the original digital currency, then sends the new digital currency to the server, and the server generates a server private key and a server public key according to the new digital currency by using an asymmetric encryption algorithm and signs the new digital currency by using the server private key.
S103: sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In a specific embodiment, after a server signs a new digital currency by a server private key, the new digital currency is sent to a client A, the client A returns an acknowledgement message to the server after receiving the acknowledgement message, then the client A sends the digital currency to a client B, and the client B stores the digital currency and SK _ B corresponding to the digital currency until a digital currency transaction from the client A to the client B is completed.
In an embodiment, as shown in fig. 2, performing authentication on the second client according to the authentication instruction sent by the first client includes:
s201: and sending the random number to the second client so that the second client generates a random number signature.
In an embodiment, during the authentication, the server sends a random number to the client a, so that the client a generates a random number signature according to the random number.
S202: verifying whether the received random number signature is correct.
In a specific embodiment, after the client a generates the random number signature according to the random number, the random number signature is sent to the server, the server verifies whether the random number signature is correct, if so, the identity verification is successful, and if not, the transaction is stopped.
In one embodiment, as shown in fig. 3, signing the first digital currency sent by the authenticated second client comprises:
s301: and searching a corresponding server public key through the currency serial number in the first digital currency, and verifying the validity of the first digital currency through the server public key.
In a specific embodiment, when the server receives a new digital currency (first digital currency) sent by the client a, the server looks up a server public key pre-stored in the server according to a currency serial number of the new digital currency, and verifies whether the first digital currency is valid, such as whether the first digital currency has expired, by using the server public key.
S302: and after the verification is passed, generating a new server public key and a new server private key by using an asymmetric encryption algorithm.
In a specific embodiment, after the first digital currency is verified by the server public key, if the first digital currency is valid, the server generates a new pair of server public key and server private key according to the first digital currency by using an asymmetric encryption algorithm.
S303: and signing the verified first digital currency by using the server private key.
In a particular embodiment, the first digital currency is signed with the new server-side private key generated in S302.
In one embodiment, as shown in fig. 4, the present application further provides an asymmetrically encrypted digital currency transaction data processing method, including:
s401: the second digital currency is generated from the first digital currency provided by the client.
In a specific embodiment, the client B receives the digital currency entity (first digital currency) sent by the client a, then generates a client public key PK _ B and a private key SK _ B of the client B according to the first digital currency, and sends the digital currency (second digital currency) and the client public key PK _ B to the client a.
S402: and generating a local public key and a local private key by using an asymmetric encryption algorithm.
In a specific embodiment, the client B generates the public key PK _ B and the private key SK _ B by using an asymmetric encryption algorithm after receiving the first digital currency sent by the client a.
S403: and sending the local public key and the second digital currency to the client, and sending a verification instruction to the server so that the server verifies the client and completes the signature of the second digital currency.
In one embodiment, client B sends the second digital currency and client public key PK _ B to client a to enable client a to complete the signature.
S404: receiving the second digital currency signed by the server.
In a specific embodiment, the client a receives the second digital currency, signs the second digital currency, and forwards the second digital currency to the server, and the server signs the second digital currency and sends the signed second digital currency to the client a, and then the client a sends the signed second digital currency to the client B.
In one embodiment, as shown in fig. 5, the present application further provides an asymmetric encrypted digital currency transaction data processing method, including:
s501: and sending the first digital currency to the client so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm.
In a specific embodiment, if the client a wants to trade the digital currency to the client B, the client a sends the entity of the digital currency to the client B, the client B generates the public key PK _ B and the private key SK _ B according to the digital currency by using an asymmetric encryption algorithm, then sends the public key PK _ B and the digital currency to the client a, the client a replaces the original public key in the digital currency with the public key PK _ B, and fills the public key PK _ B into the digital currency to obtain new digital currency.
S502: and changing the received second digital currency by using the received client public key and then sending the changed second digital currency to the server so that the server signs the second digital currency.
In a specific embodiment, the client a generates a local public key PK _ a and a local private key SK _ a through an asymmetric encryption algorithm, and then replaces an original public key in the digital currency with the received public key PK _ B sent by the client B.
S503: and receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
In a specific embodiment, the client a sends the obtained new digital currency to the server, the server returns the new digital currency to the client a for acknowledgement after completing the signature, and then the client a forwards the digital currency to the client B.
In one embodiment, as shown in fig. 6, the changing the received second digital currency with the received client public key includes:
s601: the client public key is filled in the second digital currency.
In one embodiment, the client a replaces the original public key in the digital currency with the received public key PK _ B sent by the client B.
S602: the second digital currency populated with the client public key is signed with the local private key.
In a specific embodiment, the client a sends the obtained new digital currency to the server, and the server returns the new digital currency to the client a for acknowledgement after completing the signature.
In addition to the transaction process of the digital currency between two clients, the application also comprises an issuing process of the digital currency, and the specific steps are as follows:
the server performs basic information construction of digital currency, including filling in the currency issue unit number (this field may be the issuer's unique signature), the currency serial number, the currency issue date, the currency denomination, and initializing the version number vno to 0. The digital currency is sent to a client, the client generates a public key PK _ A and a private key SK _ A by adopting an asymmetric encryption algorithm, the public key is filled in the digital currency and sent to a server, and the private key is stored in the client. The server also generates a public key PK _ S and a private key SK _ S by using an asymmetric encryption algorithm, signs the digital currency except the server signature by using the private key SK _ S and fills the digital currency to generate complete digital currency. The digital currency is sent to the client for validation. And after receiving the confirmation message, the server side stores the information of the currency serial numbers sn, PK _ S and SK _ S.
In the actual use process, when the authenticity of the digital currency needs to be verified, the digital currency adopts the non-public property of the private key in the asymmetric encryption to ensure the safety of the digital currency. The currency authenticity verification comprises two aspects: monetary entity authentication and monetary owner (client) authentication. (1) And (3) currency entity verification: inquiring a corresponding public key from a server through the sn in the currency entity, and verifying whether the signature of the currency entity is correct or not by using the public key; (2) currency owner verification: by sending the random number to the owner, the owner signs it with the currency private key, and the verifier verifies the currency owner with the owner's public key in the currency entity.
When the face value of the digital currency needs to be exchanged, the issuer verifies the identity of the currency owner through the digital currency authenticity verification method, recycles the currency with large face value, and issues the equal-face value currency consisting of a plurality of small face values through the digital currency issuing method to realize the exchange of the large face value and the small face value of the currency.
Based on the same inventive concept, the embodiment of the present application further provides an asymmetric encrypted digital currency transaction data processing apparatus, which can be used to implement the method described in the above embodiments, as described in the following embodiments. Because the principle of solving the problems of the asymmetric encryption digital currency transaction data processing device is similar to the asymmetric encryption digital currency transaction data processing method, the implementation of the asymmetric encryption digital currency transaction data processing device can refer to the implementation of the asymmetric encryption digital currency transaction data processing method, and repeated parts are not described again. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. While the system described in the embodiments below is preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
As shown in fig. 7, the present application also provides an asymmetrically encrypted digital money transaction data processing apparatus, comprising:
an identity authentication unit 701, configured to perform identity authentication on a second client according to an authentication instruction sent by a first client;
a first signature unit 702, configured to sign the first digital currency sent by the authenticated second client;
a basic information updating unit 703, configured to send the signed first digital currency to the second client for acknowledgement, and update basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In one embodiment, as shown in fig. 8, the authentication unit 701 includes:
a random number sending module 801, configured to send a random number to the second client, so that the second client generates a random number signature;
a random number signature verification module 802, configured to verify whether the received random number signature is correct.
In one embodiment, as shown in fig. 9, the first signature unit 702 includes:
the public key verification module 901 is configured to search a corresponding server public key through a currency serial number in the first digital currency, and verify validity of the first digital currency through the server public key;
a public key and private key generation module 902, configured to generate a new server public key and a new server private key by using an asymmetric encryption algorithm after verification passes;
and a new signature module 903, configured to sign the verified first digital currency with a server-side private key.
In one embodiment, as shown in fig. 10, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a second digital money generation unit 1001 for generating second digital money from the first digital money supplied from the client;
an asymmetric encryption generation unit 1002, configured to generate a local public key and a local private key by using an asymmetric encryption algorithm;
the second signature unit 1003 is configured to send the local public key and the second digital currency to the client, and initiate a verification instruction to the server, so that the server verifies the client and completes signature of the second digital currency;
a receiving unit 1004 for receiving the second digital currency signed by the server.
In one embodiment, as shown in fig. 11, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a sending unit 1101 for sending the first digital currency to the client, so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric cryptographic algorithm;
a changing unit 1102, configured to change the received second digital currency with the received client public key and send the changed second digital currency to the server, so that the server signs the second digital currency;
and a receiving and forwarding unit 1103, configured to receive the second digital currency signed by the server and forward the second digital currency to the client.
In one embodiment, as shown in fig. 12, the changing unit 1102 includes:
a public key filling module 1201, configured to fill the client public key into the second digital currency;
a third signing module 1202 for signing the second digital currency populated with the client public key with the local private key.
Compared with the existing digital currency, the digital currency based on the asymmetric encryption algorithm has the following advantages:
the method is weakly centralized, the information of the digital currency is stored on the terminal of each owner, each owner ensures the safety of the currency, and the owner of the currency can check the account information of the owner without logging in a server; the security is high, the security of the digital currency is ensured by adopting an asymmetric encryption algorithm, and the owner can ensure the security of the digital currency only by ensuring the security of a private key corresponding to a currency entity. Meanwhile, the digital currency is stored on the terminal of the owner, and hackers cannot acquire the currency by attacking the server, so that the safety of the currency is improved; the circulation is strong, and the issued digital currency can be used across systems without conversion and processing in a plurality of systems; the complexity is low, the digital currency issuer weakens the concept of the electronic account, only a small amount of information of the digital currency needs to be recorded, the development, storage, operation and maintenance costs of the server are reduced, the safety of the digital currency is guaranteed based on an asymmetric encryption algorithm, and the safety is high; meanwhile, the digital currency has the characteristics of weak centralization, strong circulation, low complexity and the like; in addition, the management method of the digital currency is transparent to disclosure.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
An embodiment of the present application further provides a specific implementation manner of an electronic device capable of implementing all steps in the method in the foregoing embodiment, and referring to fig. 13, the electronic device specifically includes the following contents:
a processor (processor)1301, a memory 1302, a Communications Interface (Communications Interface)1303, a bus 1304, and a non-volatile memory 1305;
the processor 1301, the memory 1302 and the communication interface 1303 complete communication with each other through the bus 1304;
the processor 1301 is configured to call the computer programs in the memory 1302 and the non-volatile storage 1305, and the processor implements all the steps of the method in the above embodiments when executing the computer programs, for example, the processor implements the following steps when executing the computer programs:
s101: and performing identity authentication on the second client according to the authentication instruction sent by the first client.
S102: the first digital currency sent by the second authenticated client is signed.
S103: sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
Embodiments of the present application also provide a computer-readable storage medium capable of implementing all the steps of the method in the above embodiments, where the computer-readable storage medium stores thereon a computer program, and the computer program when executed by a processor implements all the steps of the method in the above embodiments, for example, the processor implements the following steps when executing the computer program:
s101: and performing identity authentication on the second client according to the authentication instruction sent by the first client.
S102: the first digital currency sent by the second authenticated client is signed.
S103: sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment. Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction. The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.

Claims (14)

1. An asymmetrically encrypted digital currency transaction data processing method, comprising:
performing identity authentication on a second client according to an authentication instruction sent by a first client;
signing the first digital currency sent by the second client side which passes the identity authentication;
sending the signed first digital currency to the second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
2. The transaction data processing method of claim 1, wherein the authenticating the second client according to the authentication instruction sent by the first client comprises:
sending a random number to the second client to cause the second client to generate a random number signature;
verifying whether the received random number signature is correct.
3. The transaction data processing method of claim 1, wherein said signing the first digital currency sent by the authenticated second client comprises:
searching a corresponding server public key through a currency serial number in the first digital currency, and verifying the validity of the first digital currency through the server public key;
after the verification is passed, a new server public key and a new server private key are generated by using an asymmetric encryption algorithm;
and signing the first digital currency which passes the verification by using the server private key.
4. An asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
the identity authentication unit is used for authenticating the identity of the second client according to the authentication instruction sent by the first client;
the first signature unit is used for signing the first digital currency sent by the second client side which passes the identity authentication;
the basic information updating unit is used for sending the signed first digital currency to the second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
5. The transaction data processing device of claim 4, wherein the identity verification unit comprises:
a random number sending module, configured to send a random number to the second client, so that the second client generates a random number signature;
and the random number signature verification module is used for verifying whether the received random number signature is correct or not.
6. The transaction data processing device of claim 4, wherein the first signature unit comprises:
the public key verification module is used for searching a corresponding server public key through a currency serial number in the first digital currency and verifying the validity of the first digital currency through the server public key;
the public key and private key generation module is used for generating a new server public key and a new server private key by using an asymmetric encryption algorithm after verification is passed;
and the new signature module is used for signing the first digital currency which passes the verification by using the server private key.
7. An asymmetrically encrypted digital currency transaction data processing method, comprising:
generating a second digital currency according to the first digital currency provided by the client;
generating a local public key and a local private key by using an asymmetric encryption algorithm;
sending the local public key and the second digital currency to the client side, and initiating a verification instruction to a server side to enable the server side to verify the client side and complete the signature of the second digital currency;
receiving the second digital currency signed by the server.
8. An asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a second digital currency generation unit for generating a second digital currency from the first digital currency provided by the client;
the asymmetric encryption generating unit is used for generating a local public key and a local private key by using an asymmetric encryption algorithm;
the second signature unit is used for sending the local public key and the second digital currency to the client and sending a verification instruction to a server so that the server verifies the client and completes the signature of the second digital currency;
a receiving unit for receiving the second digital currency signed by the server.
9. An asymmetrically encrypted digital currency transaction data processing method, comprising:
sending the first digital currency to a client side so that the client side generates second digital currency and generates a client side public key and a client side private key according to an asymmetric encryption algorithm;
the received second digital currency is changed by using the received client public key and then is sent to a server, so that the server signs the second digital currency;
and receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
10. The transaction data processing method of claim 9, wherein said altering the received second digital currency with the received client public key comprises:
filling the client public key into the second digital currency;
signing the second digital currency populated with the client public key with a local private key.
11. An asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a sending unit, configured to send the first digital currency to a client, so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm;
the changing unit is used for changing the received second digital currency by using the received client public key and then sending the changed second digital currency to a server so that the server signs the second digital currency;
and the receiving and forwarding unit is used for receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
12. The transaction data processing device according to claim 11, wherein the changing unit includes:
a public key filling module used for filling the client public key into the second digital currency;
and the third signature module is used for signing the second digital currency filled in the client public key by using a local private key.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the asymmetrically encrypted digital currency transaction data processing method of any of claims 1 to 3, 7, 9 to 10.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the asymmetrically encrypted digital currency transaction data processing method according to any one of claims 1 to 3, 7, 9 to 10.
CN202010079664.7A 2020-02-04 2020-02-04 Asymmetric encryption digital currency transaction data processing method and device Active CN111311210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010079664.7A CN111311210B (en) 2020-02-04 2020-02-04 Asymmetric encryption digital currency transaction data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010079664.7A CN111311210B (en) 2020-02-04 2020-02-04 Asymmetric encryption digital currency transaction data processing method and device

Publications (2)

Publication Number Publication Date
CN111311210A true CN111311210A (en) 2020-06-19
CN111311210B CN111311210B (en) 2023-12-26

Family

ID=71146965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010079664.7A Active CN111311210B (en) 2020-02-04 2020-02-04 Asymmetric encryption digital currency transaction data processing method and device

Country Status (1)

Country Link
CN (1) CN111311210B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711742A (en) * 2020-11-23 2021-04-27 中国联合网络通信集团有限公司 Digital currency anti-counterfeiting method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096118A (en) * 2015-08-21 2015-11-25 廖小谦 Electronic currency transfer payment system and method
CN106910072A (en) * 2017-02-15 2017-06-30 捷德(中国)信息科技有限公司 Digital cash management method and system
CN108122098A (en) * 2018-01-10 2018-06-05 晋商博创(北京)科技有限公司 Digital coin systems, method of payment and terminal based on CPK
CN108805538A (en) * 2018-06-14 2018-11-13 清华大学 A kind of digital cash method of commerce and device
CN109934582A (en) * 2019-02-25 2019-06-25 矩阵元技术(深圳)有限公司 Digital cash transaction data processing method, server, client and system
CN109961276A (en) * 2019-02-27 2019-07-02 深圳市朗科科技股份有限公司 Digital cash wallet, method of commerce, transaction system and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096118A (en) * 2015-08-21 2015-11-25 廖小谦 Electronic currency transfer payment system and method
CN106910072A (en) * 2017-02-15 2017-06-30 捷德(中国)信息科技有限公司 Digital cash management method and system
CN108122098A (en) * 2018-01-10 2018-06-05 晋商博创(北京)科技有限公司 Digital coin systems, method of payment and terminal based on CPK
CN108805538A (en) * 2018-06-14 2018-11-13 清华大学 A kind of digital cash method of commerce and device
CN109934582A (en) * 2019-02-25 2019-06-25 矩阵元技术(深圳)有限公司 Digital cash transaction data processing method, server, client and system
CN109961276A (en) * 2019-02-27 2019-07-02 深圳市朗科科技股份有限公司 Digital cash wallet, method of commerce, transaction system and computer storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112711742A (en) * 2020-11-23 2021-04-27 中国联合网络通信集团有限公司 Digital currency anti-counterfeiting method and device
CN112711742B (en) * 2020-11-23 2023-06-06 中国联合网络通信集团有限公司 Digital currency anti-counterfeiting method and device

Also Published As

Publication number Publication date
CN111311210B (en) 2023-12-26

Similar Documents

Publication Publication Date Title
US11842317B2 (en) Blockchain-based authentication and authorization
US11930100B2 (en) Fund conversion between blockchains
EP3725029B1 (en) Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords
Zamani et al. Rapidchain: Scaling blockchain via full sharding
US20240095728A1 (en) Blockchain system for confidential and anonymous smart contracts
US20230120742A1 (en) Quantumproof blockchain
JP7244537B2 (en) Computer-implemented systems and methods suitable for enhancing the security of instant offline blockchain transactions
US11212081B2 (en) Method for signing a new block in a decentralized blockchain consensus network
CN111316615B (en) System and method for ensuring correct execution of a computer program using a mediator computer system
CN113874897A (en) Computer-implemented system and method for effecting transfers over blockchain networks
US11728969B2 (en) Blockchain-implemented security systems and methods for blinded outcome selection
JP2022534056A (en) hash function attack
CN109919611B (en) Quantum computation resistant blockchain transaction method and system based on symmetric key pool server
CN111064583A (en) Threshold SM2 digital signature method and device, electronic equipment and storage medium
CN112470423A (en) Computer-implemented system and method for asset blending
CN113939821A (en) System and method for non-parallel mining on a workload justification blockchain network
CN111311210B (en) Asymmetric encryption digital currency transaction data processing method and device
Maharramov et al. The Dusk network whitepaper
Rezaeighaleh Improving security of crypto wallets in blockchain technologies
CN114417389A (en) Method for storing user asset limit through addition homomorphic encryption in block chain
Alnajjar et al. Mitigating MEV Attacks with a Two-Tiered Architecture Utilizing Verifiable Decryption
Bafna Mathematical Aspects and Challenges of the Algorand Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220922

Address after: 12 / F, 15 / F, 99 Yincheng Road, Pudong New Area pilot Free Trade Zone, Shanghai, 200120

Applicant after: Jianxin Financial Science and Technology Co.,Ltd.

Address before: 25 Financial Street, Xicheng District, Beijing 100033

Applicant before: CHINA CONSTRUCTION BANK Corp.

Applicant before: Jianxin Financial Science and Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant