CN114003925A - Signature combined online declaration method and system based on block chain - Google Patents

Signature combined online declaration method and system based on block chain Download PDF

Info

Publication number
CN114003925A
CN114003925A CN202111185211.3A CN202111185211A CN114003925A CN 114003925 A CN114003925 A CN 114003925A CN 202111185211 A CN202111185211 A CN 202111185211A CN 114003925 A CN114003925 A CN 114003925A
Authority
CN
China
Prior art keywords
user
signature
module
declaration
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111185211.3A
Other languages
Chinese (zh)
Inventor
宋明明
魏金雷
王伟兵
杨海勇
张岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN202111185211.3A priority Critical patent/CN114003925A/en
Publication of CN114003925A publication Critical patent/CN114003925A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a signature combination online declaration method and system based on a block chain, belonging to the field of block chain electronic signature realization; the method comprises the following specific steps: s1, the user in the system acquires the digital identity of the block chain; s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink; s3, verifying the handwritten signature and the digital signature of the declaration information; the system user applies for the asymmetric key pair at the client end in an off-line manner, and the private key of the user is only owned by the user without being transmitted on line, so that the security of the private key is ensured; when the private key is bound with the user for face recognition, the system sends a random number to the user, and the user is required to use the private key for signature, so that the current user is guaranteed to really hold the private key of the key pair.

Description

Signature combined online declaration method and system based on block chain
Technical Field
The invention discloses a signature combination online declaration method and system based on a block chain, and relates to the technical field of block chain electronic signature realization.
Background
The characteristics of decentralization, non-tampering and traceability of the block chain can be used for storing and identifying the electronic evidence in a government affair service platform, and can also provide block chain electronic evidence to prove the key evidence characteristics of the existence, the generation time, the uploading party and the like of the electronic evidence, thereby playing the role of a trusted intermediary.
At present, government affair service vigorously carries out 'blind approval', enterprises and masses transact affairs in government departments, and online pre-approval of materials can be realized through a government affair service network. However, after the pre-examination is passed, the masses need to go down to the office hall for at least one time to provide materials and sign themselves, so that the users are determined to transact themselves, and real 'invisible approval' is not actually realized.
Items which can be examined and approved on the internet are all accepted on the internet to be examined and approved, and the work efficiency is stimulated, which is the direction of reform and effort. The technologies of current block chains, digital signatures, identity authentication, online biological feature identification and the like are increasingly mature, and the possibility of realizing real and whole-course credible 'invisible approval' is provided.
Therefore, a signature and online declaration method and system based on a block chain are invented to solve the problems.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a signature combined online declaration method and system based on a block chain, and the adopted technical scheme is as follows: a signature combined online declaration method based on a block chain comprises the following specific steps:
s1, the user in the system acquires the digital identity of the block chain;
s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink;
s3 verifies the handwritten signature and the digital signature of the declared information.
The specific steps of the S1 for acquiring the blockchain digital identity are as follows:
s101, a user generates an asymmetric key on a mobile phone client off line;
s102, uploading the public key in the asymmetric key to a system, and binding the public key with a user;
s103, the private key in the asymmetric key is verified through face recognition.
The specific steps of the S2 performing the handwritten signature and the digital signature on the declaration information are as follows:
s201, calculating characteristic hash of the declaration information and the handwritten signature in a json string mode as a whole;
s202, reporting information and handwritten signatures are recorded in a business relational database outside a block chain;
s203 calculates a characteristic hash value using the private key of the current user and records the characteristic hash value on the blockchain.
The specific steps of the S3 for verifying the handwritten signature and the digital signature of the declaration information are as follows:
s301, performing online auditing on the declaration information through a background management system;
s302, the public key of the declaration user is used for checking the declaration information.
The specific steps of the S302 using the public key of the declaration user to check the declaration information are as follows:
s3021, calculating a characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the uplink of the declaration user by using a block chain for inquiry;
and S3022, verifying and signing the signature of the characteristic hash by using the public key of the declaration user.
A signature combined online declaration system based on a block chain specifically comprises an identity acquisition module, an information processing module and an identity verification module:
an identity acquisition module: a user in the system acquires a block chain digital identity;
an information processing module: calculating characteristic hash of the declaration information and the handwritten signature, and chaining by using a private key of a user;
an identity verification module: and verifying the handwritten signature and the digital signature of the declared information.
The identity acquisition module specifically comprises a secret key generation module, a public key binding module and a private key verification module:
a key generation module: a user generates an asymmetric key at a mobile phone client off line;
a public key binding module: uploading a public key in the asymmetric key to a system, and binding the public key with a user;
the private key verification module: and verifying the private key in the asymmetric key through face recognition.
The information processing module specifically comprises a feature calculation module, an information recording module and a feature recording module:
a feature calculation module: calculating characteristic hash by taking the declaration information and the handwritten signature as a whole in a json string mode;
an information recording module: recording the declaration information and the handwritten signature into a business relational database outside the block chain;
a characteristic recording module: and calculating a characteristic hash value to be recorded on the block chain by using the private key of the current user.
The identity verification module specifically comprises an online verification module and a public key signature verification module:
an online auditing module: performing online auditing on the declaration information through a background management system;
public key verifies and signs the module: and verifying and signing the declaration information by using the public key of the declaration user.
The public key signature verification module specifically comprises a feature comparison module and a feature signature verification module:
a feature comparison module: calculating characteristic hash by json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the chain of the declaration user by using a block chain for inquiring;
the characteristic signature checking module: and verifying the signature of the characteristic hash by using the public key of the declaration user.
The invention has the beneficial effects that: the system user applies for the asymmetric key pair at the client end in an off-line manner, and the private key of the user is only owned by the user without being transmitted on line, so that the security of the private key is ensured; when the private key is bound with a user for face recognition, the system sends a random number to the user, and the user is required to use the private key for signature, so that the current user is guaranteed to really hold the private key of the key pair;
when a user submits declaration information, the user carries out handwritten signature every time, and one signature is prevented from being repeatedly used; after the handwritten signature and the declaration information are taken as a whole to calculate the characteristic hash, the private key of the user is used for signing and chaining, and the declaration information is guaranteed not to be tampered and cannot be repudiated by the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of the method of the present invention; FIG. 2 is a schematic diagram of the system of the present invention; fig. 3 is a schematic diagram of an embodiment of the present invention.
Detailed Description
The present invention is further described below in conjunction with the following figures and specific examples so that those skilled in the art may better understand the present invention and practice it, but the examples are not intended to limit the present invention.
The first embodiment is as follows:
a signature combined online declaration method based on a block chain comprises the following specific steps:
s1, the user in the system acquires the digital identity of the block chain;
s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink;
s3, verifying the handwritten signature and the digital signature of the declaration information;
as shown in fig. 3, first, a system user needs to register a unified chain digital identity key pair on a block chain and bind with the system user, and the digital identity key is held by the user;
calculating characteristic hash of the declaration information and the handwritten signature together, performing digital signature by using a private key bound by a user, and uploading the digital signature, the declaration information and the handwritten signature to a government affair service system through a public channel; the characteristic hash uses a private key of a user to write into a block chain;
the acceptance personnel of the examination and approval department call declaration information and a handwritten signature from the system, the system automatically calculates the characteristic hash of the declaration information and the handwritten signature, calls a digital signature of the characteristic hash from the block chain, uses the public key of the user to check the signature of the characteristic hash, considers the declaration information to be valid if the signature is correct, and writes the verification process of the electronic signature into the block chain;
the system user applies for the asymmetric key pair at the client end in an off-line manner, and the private key of the user is only owned by the user without being transmitted on line, so that the security of the private key is ensured; when the private key is bound with a user for face recognition, the system sends a random number to the user, and the user is required to use the private key for signature, so that the current user is guaranteed to really hold the private key of the key pair;
when a user submits declaration information, the user carries out handwritten signature every time, and one signature is prevented from being repeatedly used; after the handwritten signature and the declaration information are taken as a whole to calculate the characteristic hash, the private key of the user is used for signing and chaining, and the declaration information is guaranteed not to be tampered and cannot be repudiated by the user;
further, the specific step of S1 obtaining the blockchain digital identity is as follows:
s101, a user generates an asymmetric key on a mobile phone client off line;
s102, uploading the public key in the asymmetric key to a system, and binding the public key with a user;
s103, verifying the private key in the asymmetric key through face recognition;
the traditional user name and password authentication mode is generally used for user interface login; a user sets a user name and a password during registration, and the password is encrypted and then stored in the background by adopting another safer encryption scheme; when logging in, a user inputs a user name and a password, if identity authentication is performed, the system returns an access token, and the token is required to be carried in an HTTP request for subsequent user interface access;
the identity on the block chain is that a private key in an asymmetric key pair replaces a traditional user name and password, a cryptography algorithm proves that a user has control right on a certain private key on the block chain, the user needs to keep the private key properly to avoid exposing to any other person, and the information signed by using the private key can be regarded as the user to sign and issue himself;
before registering the blockchain digital identity, a user can generate an asymmetric key pair (comprising a public key and a private key) in an off-line manner at a mobile phone client, and the private key is stored by the user to avoid exposure; uploading a public key in a key pair to a system during user registration, and binding the public key to a current user during real-name authentication of the user, wherein the public key is disclosed to other users by the system for signature verification; in order to prove that the private key of a certain key pair is really held by the current user, the biometric identification of the user is also needed; the method selects the face recognition technology, the system sends a random number to the mobile phone client while carrying out face recognition, the user is required to use a private key of the user to sign the random number and then send the random number to the system, the system uses a public key of the current user to verify the signature, and the verification shows that the current user really holds the private key of the key pair, so that the registration of the digital identity of the user block chain is completed;
further, the specific steps of performing the handwritten signature and the digital signature on the declaration information in S2 are as follows:
s201, calculating characteristic hash of the declaration information and the handwritten signature in a json string mode as a whole;
s202, reporting information and handwritten signatures are recorded in a business relational database outside a block chain;
s203, calculating a characteristic hash value by using a private key of the current user and recording the characteristic hash value to a block chain;
through the operation of S1, the user acquires the digital identity of the user on the block chain, and the private key of the user is ensured to be held by the user through the identity authentication and face recognition technology;
the declaration information of the government affairs handling is filled by the user, and after the completion of the filling, a signature is handwritten by using a mobile phone client at the lower part; calculating characteristic hash of the declaration information and the handwritten signature in a json string form as a whole, recording the declaration information and the handwritten signature into a business relational database outside a block chain, and recording a calculated characteristic hash value onto the block chain by using a private key of a current user;
the declaration information is guaranteed to be submitted by the user through the handwritten signature and the digital signature, and the declaration information is guaranteed not to be falsified through hashing the characteristics of the declaration information and the handwritten signature by using a private key chain of the user;
further, the step of S3 verifying the handwritten signature and the digital signature of the declaration information includes:
s301, performing online auditing on the declaration information through a background management system;
s302, verifying and signing the declaration information by using the public key of the declaration user;
the acceptance personnel of the examination and approval department audits the declaration information on line through the background management system, and can use the public key of the declaration user to check the declaration information beyond auditing the correctness of the basic declaration information;
still further, the step S302 of using the public key of the claiming user to check the claim of the claim information includes the following steps:
s3021, calculating a characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the uplink of the declaration user by using a block chain for inquiry;
s3022, verifying the signature of the characteristic hash by using the public key of the declaration user;
when checking the signature, calculating the characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, inquiring the characteristic hash of the chain of the declaration user from the block chain, comparing and checking whether the characteristic hashes are completely the same or not; meanwhile, the public key of the declaration user is used for verifying the signature of the characteristic hash, and the declaration information is considered to be effective after verification is correct and is submitted by the declaration user.
Example two:
a signature combined online declaration system based on a block chain specifically comprises an identity acquisition module, an information processing module and an identity verification module:
an identity acquisition module: a user in the system acquires a block chain digital identity;
an information processing module: calculating characteristic hash of the declaration information and the handwritten signature, and chaining by using a private key of a user;
an identity verification module: verifying the handwritten signature and the digital signature of the declared information;
further, the identity obtaining module specifically includes a key generating module, a public key binding module, and a private key verifying module:
a key generation module: a user generates an asymmetric key at a mobile phone client off line;
a public key binding module: uploading a public key in the asymmetric key to a system, and binding the public key with a user;
the private key verification module: verifying a private key in the asymmetric key through face recognition;
further, the information processing module specifically includes a feature calculating module, an information recording module, and a feature recording module:
a feature calculation module: calculating characteristic hash by taking the declaration information and the handwritten signature as a whole in a json string mode;
an information recording module: recording the declaration information and the handwritten signature into a business relational database outside the block chain;
a characteristic recording module: calculating a characteristic hash value by using a private key of a current user and recording the characteristic hash value on a block chain;
further, the identity verification module specifically includes an online auditing module and a public key signature verification module:
an online auditing module: performing online auditing on the declaration information through a background management system;
public key verifies and signs the module: verifying and signing the declaration information by using the public key of the declaration user;
still further, the public key signature verification module specifically comprises a feature comparison module and a feature signature verification module:
a feature comparison module: calculating characteristic hash by json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the chain of the declaration user by using a block chain for inquiring;
the characteristic signature checking module: and verifying the signature of the characteristic hash by using the public key of the declaration user.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A signature combined online declaration method based on a block chain is characterized by comprising the following specific steps:
s1, the user in the system acquires the digital identity of the block chain;
s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink;
s3 verifies the handwritten signature and the digital signature of the declared information.
2. The method as claimed in claim 1, wherein the step of S1 obtaining the blockchain digital identity comprises the following steps:
s101, a user generates an asymmetric key on a mobile phone client off line;
s102, uploading the public key in the asymmetric key to a system, and binding the public key with a user;
s103, the private key in the asymmetric key is verified through face recognition.
3. The method as claimed in claim 2, wherein the step of S2 performing the handwritten signature and the digital signature on the declaration information comprises the steps of:
s201, calculating characteristic hash of the declaration information and the handwritten signature in a json string mode as a whole;
s202, reporting information and handwritten signatures are recorded in a business relational database outside a block chain;
s203 calculates a characteristic hash value using the private key of the current user and records the characteristic hash value on the blockchain.
4. The method as claimed in claim 3, wherein the step of verifying the handwritten signature and the digital signature of the declaration information at S3 is as follows:
s301, performing online auditing on the declaration information through a background management system;
s302, the public key of the declaration user is used for checking the declaration information.
5. The method as claimed in claim 4, wherein the step S302 of using the public key of the claiming user to check the claim of the claim information comprises the following steps:
s3021, calculating a characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the uplink of the declaration user by using a block chain for inquiry;
and S3022, verifying and signing the signature of the characteristic hash by using the public key of the declaration user.
6. A signature combined online declaration system based on a block chain is characterized by specifically comprising an identity acquisition module, an information processing module and an identity verification module:
an identity acquisition module: a user in the system acquires a block chain digital identity;
an information processing module: calculating characteristic hash of the declaration information and the handwritten signature, and chaining by using a private key of a user;
an identity verification module: and verifying the handwritten signature and the digital signature of the declared information.
7. The system according to claim 6, wherein the identity obtaining module specifically comprises a key generating module, a public key binding module and a private key verifying module:
a key generation module: a user generates an asymmetric key at a mobile phone client off line;
a public key binding module: uploading a public key in the asymmetric key to a system, and binding the public key with a user;
the private key verification module: and verifying the private key in the asymmetric key through face recognition.
8. The system of claim 7, wherein the information processing module specifically comprises a feature calculating module, an information recording module, and a feature recording module:
a feature calculation module: calculating characteristic hash by taking the declaration information and the handwritten signature as a whole in a json string mode;
an information recording module: recording the declaration information and the handwritten signature into a business relational database outside the block chain;
a characteristic recording module: and calculating a characteristic hash value to be recorded on the block chain by using the private key of the current user.
9. The system of claim 8, wherein the identity verification module specifically comprises an online audit module and a public key signature verification module:
an online auditing module: performing online auditing on the declaration information through a background management system;
public key verifies and signs the module: and verifying and signing the declaration information by using the public key of the declaration user.
10. The system of claim 9, wherein the public key signature verification module specifically comprises a feature comparison module, a feature signature verification module:
a feature comparison module: calculating characteristic hash by json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the chain of the declaration user by using a block chain for inquiring;
the characteristic signature checking module: and verifying the signature of the characteristic hash by using the public key of the declaration user.
CN202111185211.3A 2021-10-12 2021-10-12 Signature combined online declaration method and system based on block chain Pending CN114003925A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111185211.3A CN114003925A (en) 2021-10-12 2021-10-12 Signature combined online declaration method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111185211.3A CN114003925A (en) 2021-10-12 2021-10-12 Signature combined online declaration method and system based on block chain

Publications (1)

Publication Number Publication Date
CN114003925A true CN114003925A (en) 2022-02-01

Family

ID=79922547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111185211.3A Pending CN114003925A (en) 2021-10-12 2021-10-12 Signature combined online declaration method and system based on block chain

Country Status (1)

Country Link
CN (1) CN114003925A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150150A (en) * 2022-06-28 2022-10-04 北京送好运信息技术有限公司 Information recording method based on block chain technology
CN115396117A (en) * 2022-08-24 2022-11-25 济南超级计算技术研究院 Block chain based tamper-proof electronic document signing and verifying method and system
CN115396096A (en) * 2022-08-29 2022-11-25 北京航空航天大学 Encryption and decryption method and protection system for secret file based on national cryptographic algorithm
CN115459920A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Certificateless alliance chain identity authentication method and system based on intelligent contract

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150150A (en) * 2022-06-28 2022-10-04 北京送好运信息技术有限公司 Information recording method based on block chain technology
CN115150150B (en) * 2022-06-28 2024-01-26 北京送好运信息技术有限公司 Information recording method based on block chain technology
CN115396117A (en) * 2022-08-24 2022-11-25 济南超级计算技术研究院 Block chain based tamper-proof electronic document signing and verifying method and system
CN115459920A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Certificateless alliance chain identity authentication method and system based on intelligent contract
CN115396096A (en) * 2022-08-29 2022-11-25 北京航空航天大学 Encryption and decryption method and protection system for secret file based on national cryptographic algorithm

Similar Documents

Publication Publication Date Title
CN114003925A (en) Signature combined online declaration method and system based on block chain
US8468340B2 (en) Configuring a valid duration period for a digital certificate
CN111010367B (en) Data storage method and device, computer equipment and storage medium
CN103107996B (en) Digital certificate download online method and system, digital certificate are provided platform
CN109035024A (en) Method, system and the storage medium of electronic signature
US20020038290A1 (en) Digital notary system and method
CN112069547B (en) Identity authentication method and system for supply chain responsibility main body
AU2007295134A1 (en) Method and computer system for ensuring authenticity of an electronic transaction
CN110189184B (en) Electronic invoice storage method and device
CN112036834B (en) Method and device for regulating and verifying electronic evidence, computer equipment and storage medium
CN112989309B (en) Login method, authentication method and system based on multi-party authorization and computing equipment
WO2020042508A1 (en) Method, system and electronic device for processing claim incident based on blockchain
CN110113334A (en) Contract processing method, equipment and storage medium based on block chain
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
CN1697376A (en) Method and system for authenticating or enciphering data by using IC card
CN114760114A (en) Identity authentication method, device, equipment and medium
CN112801606A (en) Electronic contract system of cone block chain
CN112905979A (en) Electronic signature authorization method and device, storage medium and electronic device
CN112270636A (en) Block chain-based consignment logistics management method, device, terminal and storage medium
CN113051623B (en) Data processing method and device and electronic equipment
US20220067727A1 (en) Method for operating a distributed database system, distributed database system, and industrial automation system
CN111756531A (en) Communication system and method of LoRa terminal based on CPK
CN111369332A (en) Data processing method and device based on block chain
CN115081015A (en) Block chain-based digital signature implementation method
CN114826613B (en) Identity information query method, device, equipment and storage medium based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination