CN114003925A - Signature combined online declaration method and system based on block chain - Google Patents
Signature combined online declaration method and system based on block chain Download PDFInfo
- Publication number
- CN114003925A CN114003925A CN202111185211.3A CN202111185211A CN114003925A CN 114003925 A CN114003925 A CN 114003925A CN 202111185211 A CN202111185211 A CN 202111185211A CN 114003925 A CN114003925 A CN 114003925A
- Authority
- CN
- China
- Prior art keywords
- user
- signature
- module
- declaration
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000012795 verification Methods 0.000 claims description 27
- 230000010365 information processing Effects 0.000 claims description 9
- 238000007726 management method Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 4
- 238000012550 audit Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 description 3
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a signature combination online declaration method and system based on a block chain, belonging to the field of block chain electronic signature realization; the method comprises the following specific steps: s1, the user in the system acquires the digital identity of the block chain; s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink; s3, verifying the handwritten signature and the digital signature of the declaration information; the system user applies for the asymmetric key pair at the client end in an off-line manner, and the private key of the user is only owned by the user without being transmitted on line, so that the security of the private key is ensured; when the private key is bound with the user for face recognition, the system sends a random number to the user, and the user is required to use the private key for signature, so that the current user is guaranteed to really hold the private key of the key pair.
Description
Technical Field
The invention discloses a signature combination online declaration method and system based on a block chain, and relates to the technical field of block chain electronic signature realization.
Background
The characteristics of decentralization, non-tampering and traceability of the block chain can be used for storing and identifying the electronic evidence in a government affair service platform, and can also provide block chain electronic evidence to prove the key evidence characteristics of the existence, the generation time, the uploading party and the like of the electronic evidence, thereby playing the role of a trusted intermediary.
At present, government affair service vigorously carries out 'blind approval', enterprises and masses transact affairs in government departments, and online pre-approval of materials can be realized through a government affair service network. However, after the pre-examination is passed, the masses need to go down to the office hall for at least one time to provide materials and sign themselves, so that the users are determined to transact themselves, and real 'invisible approval' is not actually realized.
Items which can be examined and approved on the internet are all accepted on the internet to be examined and approved, and the work efficiency is stimulated, which is the direction of reform and effort. The technologies of current block chains, digital signatures, identity authentication, online biological feature identification and the like are increasingly mature, and the possibility of realizing real and whole-course credible 'invisible approval' is provided.
Therefore, a signature and online declaration method and system based on a block chain are invented to solve the problems.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a signature combined online declaration method and system based on a block chain, and the adopted technical scheme is as follows: a signature combined online declaration method based on a block chain comprises the following specific steps:
s1, the user in the system acquires the digital identity of the block chain;
s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink;
s3 verifies the handwritten signature and the digital signature of the declared information.
The specific steps of the S1 for acquiring the blockchain digital identity are as follows:
s101, a user generates an asymmetric key on a mobile phone client off line;
s102, uploading the public key in the asymmetric key to a system, and binding the public key with a user;
s103, the private key in the asymmetric key is verified through face recognition.
The specific steps of the S2 performing the handwritten signature and the digital signature on the declaration information are as follows:
s201, calculating characteristic hash of the declaration information and the handwritten signature in a json string mode as a whole;
s202, reporting information and handwritten signatures are recorded in a business relational database outside a block chain;
s203 calculates a characteristic hash value using the private key of the current user and records the characteristic hash value on the blockchain.
The specific steps of the S3 for verifying the handwritten signature and the digital signature of the declaration information are as follows:
s301, performing online auditing on the declaration information through a background management system;
s302, the public key of the declaration user is used for checking the declaration information.
The specific steps of the S302 using the public key of the declaration user to check the declaration information are as follows:
s3021, calculating a characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the uplink of the declaration user by using a block chain for inquiry;
and S3022, verifying and signing the signature of the characteristic hash by using the public key of the declaration user.
A signature combined online declaration system based on a block chain specifically comprises an identity acquisition module, an information processing module and an identity verification module:
an identity acquisition module: a user in the system acquires a block chain digital identity;
an information processing module: calculating characteristic hash of the declaration information and the handwritten signature, and chaining by using a private key of a user;
an identity verification module: and verifying the handwritten signature and the digital signature of the declared information.
The identity acquisition module specifically comprises a secret key generation module, a public key binding module and a private key verification module:
a key generation module: a user generates an asymmetric key at a mobile phone client off line;
a public key binding module: uploading a public key in the asymmetric key to a system, and binding the public key with a user;
the private key verification module: and verifying the private key in the asymmetric key through face recognition.
The information processing module specifically comprises a feature calculation module, an information recording module and a feature recording module:
a feature calculation module: calculating characteristic hash by taking the declaration information and the handwritten signature as a whole in a json string mode;
an information recording module: recording the declaration information and the handwritten signature into a business relational database outside the block chain;
a characteristic recording module: and calculating a characteristic hash value to be recorded on the block chain by using the private key of the current user.
The identity verification module specifically comprises an online verification module and a public key signature verification module:
an online auditing module: performing online auditing on the declaration information through a background management system;
public key verifies and signs the module: and verifying and signing the declaration information by using the public key of the declaration user.
The public key signature verification module specifically comprises a feature comparison module and a feature signature verification module:
a feature comparison module: calculating characteristic hash by json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the chain of the declaration user by using a block chain for inquiring;
the characteristic signature checking module: and verifying the signature of the characteristic hash by using the public key of the declaration user.
The invention has the beneficial effects that: the system user applies for the asymmetric key pair at the client end in an off-line manner, and the private key of the user is only owned by the user without being transmitted on line, so that the security of the private key is ensured; when the private key is bound with a user for face recognition, the system sends a random number to the user, and the user is required to use the private key for signature, so that the current user is guaranteed to really hold the private key of the key pair;
when a user submits declaration information, the user carries out handwritten signature every time, and one signature is prevented from being repeatedly used; after the handwritten signature and the declaration information are taken as a whole to calculate the characteristic hash, the private key of the user is used for signing and chaining, and the declaration information is guaranteed not to be tampered and cannot be repudiated by the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of the method of the present invention; FIG. 2 is a schematic diagram of the system of the present invention; fig. 3 is a schematic diagram of an embodiment of the present invention.
Detailed Description
The present invention is further described below in conjunction with the following figures and specific examples so that those skilled in the art may better understand the present invention and practice it, but the examples are not intended to limit the present invention.
The first embodiment is as follows:
a signature combined online declaration method based on a block chain comprises the following specific steps:
s1, the user in the system acquires the digital identity of the block chain;
s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink;
s3, verifying the handwritten signature and the digital signature of the declaration information;
as shown in fig. 3, first, a system user needs to register a unified chain digital identity key pair on a block chain and bind with the system user, and the digital identity key is held by the user;
calculating characteristic hash of the declaration information and the handwritten signature together, performing digital signature by using a private key bound by a user, and uploading the digital signature, the declaration information and the handwritten signature to a government affair service system through a public channel; the characteristic hash uses a private key of a user to write into a block chain;
the acceptance personnel of the examination and approval department call declaration information and a handwritten signature from the system, the system automatically calculates the characteristic hash of the declaration information and the handwritten signature, calls a digital signature of the characteristic hash from the block chain, uses the public key of the user to check the signature of the characteristic hash, considers the declaration information to be valid if the signature is correct, and writes the verification process of the electronic signature into the block chain;
the system user applies for the asymmetric key pair at the client end in an off-line manner, and the private key of the user is only owned by the user without being transmitted on line, so that the security of the private key is ensured; when the private key is bound with a user for face recognition, the system sends a random number to the user, and the user is required to use the private key for signature, so that the current user is guaranteed to really hold the private key of the key pair;
when a user submits declaration information, the user carries out handwritten signature every time, and one signature is prevented from being repeatedly used; after the handwritten signature and the declaration information are taken as a whole to calculate the characteristic hash, the private key of the user is used for signing and chaining, and the declaration information is guaranteed not to be tampered and cannot be repudiated by the user;
further, the specific step of S1 obtaining the blockchain digital identity is as follows:
s101, a user generates an asymmetric key on a mobile phone client off line;
s102, uploading the public key in the asymmetric key to a system, and binding the public key with a user;
s103, verifying the private key in the asymmetric key through face recognition;
the traditional user name and password authentication mode is generally used for user interface login; a user sets a user name and a password during registration, and the password is encrypted and then stored in the background by adopting another safer encryption scheme; when logging in, a user inputs a user name and a password, if identity authentication is performed, the system returns an access token, and the token is required to be carried in an HTTP request for subsequent user interface access;
the identity on the block chain is that a private key in an asymmetric key pair replaces a traditional user name and password, a cryptography algorithm proves that a user has control right on a certain private key on the block chain, the user needs to keep the private key properly to avoid exposing to any other person, and the information signed by using the private key can be regarded as the user to sign and issue himself;
before registering the blockchain digital identity, a user can generate an asymmetric key pair (comprising a public key and a private key) in an off-line manner at a mobile phone client, and the private key is stored by the user to avoid exposure; uploading a public key in a key pair to a system during user registration, and binding the public key to a current user during real-name authentication of the user, wherein the public key is disclosed to other users by the system for signature verification; in order to prove that the private key of a certain key pair is really held by the current user, the biometric identification of the user is also needed; the method selects the face recognition technology, the system sends a random number to the mobile phone client while carrying out face recognition, the user is required to use a private key of the user to sign the random number and then send the random number to the system, the system uses a public key of the current user to verify the signature, and the verification shows that the current user really holds the private key of the key pair, so that the registration of the digital identity of the user block chain is completed;
further, the specific steps of performing the handwritten signature and the digital signature on the declaration information in S2 are as follows:
s201, calculating characteristic hash of the declaration information and the handwritten signature in a json string mode as a whole;
s202, reporting information and handwritten signatures are recorded in a business relational database outside a block chain;
s203, calculating a characteristic hash value by using a private key of the current user and recording the characteristic hash value to a block chain;
through the operation of S1, the user acquires the digital identity of the user on the block chain, and the private key of the user is ensured to be held by the user through the identity authentication and face recognition technology;
the declaration information of the government affairs handling is filled by the user, and after the completion of the filling, a signature is handwritten by using a mobile phone client at the lower part; calculating characteristic hash of the declaration information and the handwritten signature in a json string form as a whole, recording the declaration information and the handwritten signature into a business relational database outside a block chain, and recording a calculated characteristic hash value onto the block chain by using a private key of a current user;
the declaration information is guaranteed to be submitted by the user through the handwritten signature and the digital signature, and the declaration information is guaranteed not to be falsified through hashing the characteristics of the declaration information and the handwritten signature by using a private key chain of the user;
further, the step of S3 verifying the handwritten signature and the digital signature of the declaration information includes:
s301, performing online auditing on the declaration information through a background management system;
s302, verifying and signing the declaration information by using the public key of the declaration user;
the acceptance personnel of the examination and approval department audits the declaration information on line through the background management system, and can use the public key of the declaration user to check the declaration information beyond auditing the correctness of the basic declaration information;
still further, the step S302 of using the public key of the claiming user to check the claim of the claim information includes the following steps:
s3021, calculating a characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the uplink of the declaration user by using a block chain for inquiry;
s3022, verifying the signature of the characteristic hash by using the public key of the declaration user;
when checking the signature, calculating the characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, inquiring the characteristic hash of the chain of the declaration user from the block chain, comparing and checking whether the characteristic hashes are completely the same or not; meanwhile, the public key of the declaration user is used for verifying the signature of the characteristic hash, and the declaration information is considered to be effective after verification is correct and is submitted by the declaration user.
Example two:
a signature combined online declaration system based on a block chain specifically comprises an identity acquisition module, an information processing module and an identity verification module:
an identity acquisition module: a user in the system acquires a block chain digital identity;
an information processing module: calculating characteristic hash of the declaration information and the handwritten signature, and chaining by using a private key of a user;
an identity verification module: verifying the handwritten signature and the digital signature of the declared information;
further, the identity obtaining module specifically includes a key generating module, a public key binding module, and a private key verifying module:
a key generation module: a user generates an asymmetric key at a mobile phone client off line;
a public key binding module: uploading a public key in the asymmetric key to a system, and binding the public key with a user;
the private key verification module: verifying a private key in the asymmetric key through face recognition;
further, the information processing module specifically includes a feature calculating module, an information recording module, and a feature recording module:
a feature calculation module: calculating characteristic hash by taking the declaration information and the handwritten signature as a whole in a json string mode;
an information recording module: recording the declaration information and the handwritten signature into a business relational database outside the block chain;
a characteristic recording module: calculating a characteristic hash value by using a private key of a current user and recording the characteristic hash value on a block chain;
further, the identity verification module specifically includes an online auditing module and a public key signature verification module:
an online auditing module: performing online auditing on the declaration information through a background management system;
public key verifies and signs the module: verifying and signing the declaration information by using the public key of the declaration user;
still further, the public key signature verification module specifically comprises a feature comparison module and a feature signature verification module:
a feature comparison module: calculating characteristic hash by json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the chain of the declaration user by using a block chain for inquiring;
the characteristic signature checking module: and verifying the signature of the characteristic hash by using the public key of the declaration user.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A signature combined online declaration method based on a block chain is characterized by comprising the following specific steps:
s1, the user in the system acquires the digital identity of the block chain;
s2, calculating characteristic hash of the declaration information and the handwritten signature, and using a private key of the user to uplink;
s3 verifies the handwritten signature and the digital signature of the declared information.
2. The method as claimed in claim 1, wherein the step of S1 obtaining the blockchain digital identity comprises the following steps:
s101, a user generates an asymmetric key on a mobile phone client off line;
s102, uploading the public key in the asymmetric key to a system, and binding the public key with a user;
s103, the private key in the asymmetric key is verified through face recognition.
3. The method as claimed in claim 2, wherein the step of S2 performing the handwritten signature and the digital signature on the declaration information comprises the steps of:
s201, calculating characteristic hash of the declaration information and the handwritten signature in a json string mode as a whole;
s202, reporting information and handwritten signatures are recorded in a business relational database outside a block chain;
s203 calculates a characteristic hash value using the private key of the current user and records the characteristic hash value on the blockchain.
4. The method as claimed in claim 3, wherein the step of verifying the handwritten signature and the digital signature of the declaration information at S3 is as follows:
s301, performing online auditing on the declaration information through a background management system;
s302, the public key of the declaration user is used for checking the declaration information.
5. The method as claimed in claim 4, wherein the step S302 of using the public key of the claiming user to check the claim of the claim information comprises the following steps:
s3021, calculating a characteristic hash of json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the uplink of the declaration user by using a block chain for inquiry;
and S3022, verifying and signing the signature of the characteristic hash by using the public key of the declaration user.
6. A signature combined online declaration system based on a block chain is characterized by specifically comprising an identity acquisition module, an information processing module and an identity verification module:
an identity acquisition module: a user in the system acquires a block chain digital identity;
an information processing module: calculating characteristic hash of the declaration information and the handwritten signature, and chaining by using a private key of a user;
an identity verification module: and verifying the handwritten signature and the digital signature of the declared information.
7. The system according to claim 6, wherein the identity obtaining module specifically comprises a key generating module, a public key binding module and a private key verifying module:
a key generation module: a user generates an asymmetric key at a mobile phone client off line;
a public key binding module: uploading a public key in the asymmetric key to a system, and binding the public key with a user;
the private key verification module: and verifying the private key in the asymmetric key through face recognition.
8. The system of claim 7, wherein the information processing module specifically comprises a feature calculating module, an information recording module, and a feature recording module:
a feature calculation module: calculating characteristic hash by taking the declaration information and the handwritten signature as a whole in a json string mode;
an information recording module: recording the declaration information and the handwritten signature into a business relational database outside the block chain;
a characteristic recording module: and calculating a characteristic hash value to be recorded on the block chain by using the private key of the current user.
9. The system of claim 8, wherein the identity verification module specifically comprises an online audit module and a public key signature verification module:
an online auditing module: performing online auditing on the declaration information through a background management system;
public key verifies and signs the module: and verifying and signing the declaration information by using the public key of the declaration user.
10. The system of claim 9, wherein the public key signature verification module specifically comprises a feature comparison module, a feature signature verification module:
a feature comparison module: calculating characteristic hash by json formed by declaration information submitted by a declaration user and a handwritten signature by the system, and comparing the characteristic hash of the chain of the declaration user by using a block chain for inquiring;
the characteristic signature checking module: and verifying the signature of the characteristic hash by using the public key of the declaration user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111185211.3A CN114003925A (en) | 2021-10-12 | 2021-10-12 | Signature combined online declaration method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111185211.3A CN114003925A (en) | 2021-10-12 | 2021-10-12 | Signature combined online declaration method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114003925A true CN114003925A (en) | 2022-02-01 |
Family
ID=79922547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111185211.3A Pending CN114003925A (en) | 2021-10-12 | 2021-10-12 | Signature combined online declaration method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114003925A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115150150A (en) * | 2022-06-28 | 2022-10-04 | 北京送好运信息技术有限公司 | Information recording method based on block chain technology |
CN115396117A (en) * | 2022-08-24 | 2022-11-25 | 济南超级计算技术研究院 | Block chain based tamper-proof electronic document signing and verifying method and system |
CN115396096A (en) * | 2022-08-29 | 2022-11-25 | 北京航空航天大学 | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm |
CN115459920A (en) * | 2022-08-25 | 2022-12-09 | 浪潮云信息技术股份公司 | Certificateless alliance chain identity authentication method and system based on intelligent contract |
-
2021
- 2021-10-12 CN CN202111185211.3A patent/CN114003925A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115150150A (en) * | 2022-06-28 | 2022-10-04 | 北京送好运信息技术有限公司 | Information recording method based on block chain technology |
CN115150150B (en) * | 2022-06-28 | 2024-01-26 | 北京送好运信息技术有限公司 | Information recording method based on block chain technology |
CN115396117A (en) * | 2022-08-24 | 2022-11-25 | 济南超级计算技术研究院 | Block chain based tamper-proof electronic document signing and verifying method and system |
CN115459920A (en) * | 2022-08-25 | 2022-12-09 | 浪潮云信息技术股份公司 | Certificateless alliance chain identity authentication method and system based on intelligent contract |
CN115396096A (en) * | 2022-08-29 | 2022-11-25 | 北京航空航天大学 | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114003925A (en) | Signature combined online declaration method and system based on block chain | |
US8468340B2 (en) | Configuring a valid duration period for a digital certificate | |
CN111010367B (en) | Data storage method and device, computer equipment and storage medium | |
CN103107996B (en) | Digital certificate download online method and system, digital certificate are provided platform | |
CN109035024A (en) | Method, system and the storage medium of electronic signature | |
US20020038290A1 (en) | Digital notary system and method | |
CN112069547B (en) | Identity authentication method and system for supply chain responsibility main body | |
AU2007295134A1 (en) | Method and computer system for ensuring authenticity of an electronic transaction | |
CN110189184B (en) | Electronic invoice storage method and device | |
CN112036834B (en) | Method and device for regulating and verifying electronic evidence, computer equipment and storage medium | |
CN112989309B (en) | Login method, authentication method and system based on multi-party authorization and computing equipment | |
WO2020042508A1 (en) | Method, system and electronic device for processing claim incident based on blockchain | |
CN110113334A (en) | Contract processing method, equipment and storage medium based on block chain | |
KR101253683B1 (en) | Digital Signing System and Method Using Chained Hash | |
CN1697376A (en) | Method and system for authenticating or enciphering data by using IC card | |
CN114760114A (en) | Identity authentication method, device, equipment and medium | |
CN112801606A (en) | Electronic contract system of cone block chain | |
CN112905979A (en) | Electronic signature authorization method and device, storage medium and electronic device | |
CN112270636A (en) | Block chain-based consignment logistics management method, device, terminal and storage medium | |
CN113051623B (en) | Data processing method and device and electronic equipment | |
US20220067727A1 (en) | Method for operating a distributed database system, distributed database system, and industrial automation system | |
CN111756531A (en) | Communication system and method of LoRa terminal based on CPK | |
CN111369332A (en) | Data processing method and device based on block chain | |
CN115081015A (en) | Block chain-based digital signature implementation method | |
CN114826613B (en) | Identity information query method, device, equipment and storage medium based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |