CN116976890A - Multi-sign encryption transaction system of block chain - Google Patents

Multi-sign encryption transaction system of block chain Download PDF

Info

Publication number
CN116976890A
CN116976890A CN202310851337.2A CN202310851337A CN116976890A CN 116976890 A CN116976890 A CN 116976890A CN 202310851337 A CN202310851337 A CN 202310851337A CN 116976890 A CN116976890 A CN 116976890A
Authority
CN
China
Prior art keywords
transaction
machine
blockchain
client
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310851337.2A
Other languages
Chinese (zh)
Inventor
余欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202310851337.2A priority Critical patent/CN116976890A/en
Publication of CN116976890A publication Critical patent/CN116976890A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a multi-signature encryption transaction system of a blockchain, which comprises a client, a blockchain transaction machine and a hardware encryption machine, wherein the blockchain transaction system is in bidirectional communication with the hardware encryption machine, the blockchain transaction machine is in communication with a public chain, the hardware encryption machine is used for checking a signature transmitted to the blockchain transaction machine by the client and transaction request information, the transaction system also comprises a private key corresponding to the client and a transaction private key of the blockchain transaction machine stored in the hardware encryption machine, the integrity and the accuracy of the signature of a plurality of private keys are checked through the hardware encryption machine, the signing process of the blockchain transaction machine is performed in the safety environment of the hardware encryption machine, the digital signature process is performed by utilizing the blockchain transaction machine with the protection of a multi-signature rule and the private key of the blockchain transaction machine which is the most sensitive and the core, and the high safety is provided under the condition that the private key and the digital signature function are kept on line, and the system is particularly suitable for a blockchain high-frequency transaction scene.

Description

Multi-sign encryption transaction system of block chain
Technical Field
The invention relates to the technical field of blockchains, in particular to a multi-sign encryption transaction system of a blockchain.
Background
In the blockchain architecture, in order for the nodes to recognize and establish trust, a piece of verifiable information, i.e., a digital signature, is required that acts to confirm that a message was sent by the sender of the message and that the message is complete. In order to realize the security of the signature, the public key of a specific receiver is used for encrypting the transmission content through an asymmetric encryption mechanism of the private key and the public key, and only the private key of the receiver can decrypt the transmission content, so that the information transmission security of the designated receiver is ensured. The private key is the most important part of the blockchain technology, and because it can uniquely represent the identity of a user, the storage and use of the private key must be absolutely secure, meaning that this blockchain user is completely stolen and replaced once revealed and used by others.
At present, a cold wallet mode, namely an off-line mode, is mainly adopted for storing and managing the private key, and an on-line mode is read when the private key is used, so that the private key storage device has certain safety, but has very low use efficiency, is completely not suitable for an application scene needing high-frequency operation, and cannot be effectively retrieved once lost or forgotten, and in addition, if an enterprise stores the private key in an off-line mode, the private key management and taking are needed manually, so that the private key is difficult to steal by an inside ghost.
The operation process of digital signature by using a private key must be absolutely controllable, and since the current use mode of digital signature is performed in a computer operating system through program call, there is a risk that the digital signature operation or digital signature function interface is controlled by an attacker. Recently, security events of losing or hijacking private keys and ultimately losing a large amount of virtual currency have occurred for many times, and thus, a technology is needed in the blockchain ecosystem to enable secure and controllable management and use of private keys and digital signatures.
If multi-person management is utilized, multiple signatures are used for simultaneously rechecking the same transaction request, so that the security can be increased, and the security is prevented from being influenced by the security problem of a single private key.
To this end, a blockchain multi-sign encrypted transaction system is proposed.
Disclosure of Invention
The invention aims to provide a multi-signature encryption transaction system of a blockchain, wherein a plurality of signatures can be understood as that a plurality of clients sign the same request by utilizing different private keys, the signatures mark blockchain assets, and in order to improve the safety, the potential risk of the multi-signature verification process in a safety environment is minimum. In order to achieve the above object, the present invention provides the following technical solutions:
the system comprises a client, a blockchain transaction machine and a hardware encryption machine, wherein the blockchain transaction system is in bidirectional communication with the hardware encryption machine, the blockchain transaction machine is in communication with a public chain, the hardware encryption machine is used for checking a signature and transaction request information transmitted to the blockchain transaction machine by the client, and the transaction system further comprises an individual private key corresponding to the client and a transaction private key corresponding to the blockchain transaction machine.
Preferably, the clients include a general user and an auditor, and different clients all have different and unique individual private keys.
Preferably, the blockchain transaction machine exists in one or more of a hardware terminal, a computer program and a mobile phone APP.
Preferably, the blockchain transaction machine stores signature approval rules of auditors.
Preferably, the hardware encryption machine stores a transaction private key of the blockchain transaction machine.
Preferably, signature approval rules and transaction rules of auditors are stored in the hardware encryption machine. The signature approval rules contain standard imprint stamps that should be approved by which auditors and used to verify the accuracy of the auditors' signatures.
An operation mechanism of a multi-sign encryption transaction system of a blockchain comprises the following steps:
s1, a client A signs a transaction request to be performed by using a private key of the client A, generates a data packet D1 and transmits the data packet D1 to a blockchain transaction machine;
s2, after the blockchain transaction machine receives the data packet D1, notifying an auditor to carry out the approval of the transaction request of the client A according to the signature approval rule,
m1, if auditors agree with the transaction request of the client A, signing the transaction request by using a private key of the auditors to generate a data packet D2;
m2, if the auditor does not agree with the transaction request of the client A, no signature action is taken;
s3, the blockchain transaction machine transmits the data packets obtained in S1 and S2 and the coding information B informing the auditors to the hardware encryption machine,
s4, the hardware encryption machine decrypts the received coded information B and then performs multiple data verification,
s4-1, if all the checks pass, the hardware encryption machine signs the transaction request of the client A by using a private key corresponding to the blockchain transaction machine and transmits the private key to the blockchain transaction machine, the blockchain transaction machine uploads the transaction request of the client A to a public chain and returns the information of successful transaction of the client A,
and S4-2, if any one of the checks does not pass, the hardware encryption machine returns data for rejecting the transaction request to the blockchain transaction machine, and the blockchain transaction machine returns information of transaction failure to the client A.
Preferably, the data verification in S4 includes: verifying the validity of all individual private key signatures, verifying whether all transaction requests after data packet decryption are consistent, and verifying whether the coded information B obtained in S3 is consistent with signature approval rules.
Preferably, in the step S4, the hardware encryptor further verifies whether the transaction request of the client a meets the transaction rule.
Preferably, in the step S2, the other clients are notified according to a signature reply rule, where the signature reply rule includes at least one preset auditor. The signature approval rule of the auditor is that the auditor can be preset in a certain range to approve so as to prevent the single user from being damaged due to malicious behaviors, for example, when a company or an organization operates, a certain range can be set as staff of the company or the organization, when a personal user operates, a certain range can be set as friends of the personal user, one auditor can be added, the auditor can be a financial post for the company or the organization, and the auditor can be a guardian of the auditor or a contact person preset by the auditor when the personal user operates, and the like.
Compared with the prior art, the invention has the beneficial effects that: the system comprises a hardware encryption machine, a multi-signature rule, a block chain transaction machine private key and a block chain transaction machine private key, wherein the hardware encryption machine is used for checking the integrity and the accuracy of a plurality of private key signatures, and the signing process of the private keys of the block chain transaction machine is performed in the safety environment of the hardware encryption machine, so that the hardware encryption machine is used for protecting the multi-signature rule, the block chain transaction machine private key which is the most sensitive and the core and the process of performing digital signature by using the block chain transaction machine private key are utilized, and the physical-level high safety can be provided under the condition that the private key and the digital signature function are kept on line, and the system is particularly suitable for a block chain high-frequency transaction scene.
Drawings
FIG. 1 is a flow chart of a transaction data request process according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made more apparent and fully by reference to the accompanying drawings, in which it is shown, by way of illustration, only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The system comprises a client, a blockchain transaction machine and a hardware encryption machine, wherein the client comprises a plurality of users and different users which are required to hold corresponding private keys, the users of the client can be divided into a plurality of types according to actual conditions, such as common users with the same authority and auditors with higher authority, wherein the common users can only initiate transactions and can not be subjected to wholesale, the auditors can initiate transactions and can also carry out wholesale, the blockchain transaction system is in bidirectional communication with the hardware encryption machine so as to transfer data information, the blockchain transaction machine is in communication with a public chain, the hardware encryption machine is used for collating signatures and transaction request information which are transferred to the blockchain transaction machine from the client, and the transaction system further comprises individual private keys corresponding to the client and transaction private keys corresponding to the blockchain transaction machine.
Further, the blockchain transaction machine exists in one or more forms of a hardware terminal, a computer program and a mobile phone APP, so that a client can be connected to the blockchain transaction machine in various forms to conduct data interaction.
Further, the blockchain transaction machine stores signature reply rules corresponding to the transaction private key.
Furthermore, the hardware encryption machine stores the transaction private key of the blockchain transaction machine, the private key of the blockchain transaction machine and the signature process are the most sensitive and core, and the hardware encryption machine stores the private key and the digital signature function which are kept online, so that the high security of the physical level and the interior ghost defense level can be provided, and the requirement of high-frequency transaction can be met.
Further, the hardware encryption machine stores predefined signature reply rules and transaction rules, and the signature reply rules and the transaction rules cannot be changed randomly in the hardware encryption machine. The transaction rules are used for checking whether the transaction request meets the security or not, so that malicious operation can be prevented to a certain extent; the signature endorsement rule is used for verifying whether the endorsement of the auditor is complete or not, and the endorsement value is fixedly calculated so as to match with the standard stamp mark to verify whether the endorsement of each auditor is accurate or not, namely whether the endorsement of each auditor is truly carried out by the appointed auditor.
In the embodiment 1, the user 1 needs to conduct a transaction to three 1-bit coins, establishes a transaction request by using an individual private key of the user, and transmits the transaction request to a blockchain transaction machine;
after receiving the transaction request, the blockchain transaction machine informs 3 auditor users according to signature approval rules to approve the transaction request;
3 auditors all acknowledge the transaction request, then the transaction request is approved by the individual private keys, and the blockchain transaction machine transmits the transaction request of the user 1 and the approval results of the 3 auditor users together to the hardware encryption machine;
the hardware encryption machine decrypts the data, verifies the validity of the signature of 3 endorsements, verifies whether 3 endorsement results are consistent with the signature endorsement rule, verifies whether the transaction request endorsed by 3 auditor users is consistent with the transaction request of the user 1, and verifies whether the transaction request accords with the transaction rule;
if all the verification passes, the hardware encryption machine signs by using the stored transaction private key of the blockchain transaction machine, and sends the signed transaction data to the blockchain transaction machine, and the blockchain transaction machine broadcasts the transaction to a public chain and returns the successful information of the client side transaction.
Example 2
The method comprises the steps that an internal staff of a company performs illegal transaction, 100 bitcoins are prepared for private transfer to a non-transaction client king, an individual private key of the non-transaction client king is used for signing by utilizing the convenience of the self job, after the transaction is received by a blockchain transaction machine, 2 accounting (auditor) and 1 financial general supervision (auditor) of the company are informed according to a signing and approving rule, the 2 accounting considers that the transaction is free of problems and signs and approves by using the private key, the financial general supervision considers that Wang Wuzheng is in business transaction of the company, but transaction amount is not so huge, so that signature approval by using the self individual private key is not carried out, the data are transmitted to a hardware encryption machine together, and the fact that the financial general supervision is not approved when the hardware encryption machine performs verification is found, so that the transaction is not established and is not allowed to pass.
Example 3
The user 1 needs to conduct transaction and transfers the transaction to three 1-bit coins, establishes a transaction request by utilizing an individual private key of the user, and transmits the transaction request to the blockchain transaction machine;
a certain staff in the company invades a blockchain transaction machine by utilizing hacking technology, the transaction amount in the transaction information of 2 accounting (auditor) and 1 financial administration (auditor) sent to the company is modified into 2-bit coins, then the 3 persons consider that the transaction is normal, signature and approval are carried out by using respective private keys, the data are transmitted to a hardware encryption machine together, and when the hardware encryption machine carries out the verification, the transaction amount of a transaction request of an initiating user 1 is found to be inconsistent with the approval amount of other users, so the signature is not carried out, and the transaction is not established.
Example 4
The hardware encryption machine is pre-provided with transaction rules, for example, transaction target addresses in all transaction requests are required to be in a white list of a company, staff in the company are required to conduct illegal transactions, 100 bitcoins are prepared for private transfer to a non-transaction client, the blockchain transaction machine receives the transactions and informs 3 auditors of the company to conduct auditing according to signature approval rules, the staff is approved by the 3 persons of the company, the 3 persons of the company approve the transactions, the data are transmitted to the hardware encryption machine together, and when the hardware encryption machine is used for calibrating, the fact that the principal is not in the white list of the company, signature is not conducted, and the transaction is not established.
Example 5
The blockchain transaction machine transmits the endorsement data to the hardware encryption machine according to the endorsement rules, 5 auditors (E, R, T, Y, U respectively) are notified to endorse the data according to the endorsement rules, but only the blockchain transaction machine does not receive the endorsement of the user Y for some reasons (such as network congestion and packet loss), or an illegal user intercepts the data of the user Y and performs endorsement with other private keys X, the blockchain transaction machine transmits the endorsement data to the hardware encryption machine, the hardware encryption machine finds that all the endorsement data are consistent with the transaction request, but finds that the encoding information B is inconsistent with the endorsement rules of the endorsement codes (namely, the transmitted current encoding information B finds that the endorsement of Y is absent, or the endorsement of the auditor E, R, T, Y, U becomes the endorsement E, R, T, X, U, so that the standard endorsement stamp is not matched), so that the transaction request is not passed, and the transaction is not established by using the transaction private key of the blockchain transaction machine.
The system adopts the hardware encryptor to store the transaction private key, signature wholesale rule, white list and other transaction rules of the block chain transaction machine which are the most sensitive and core, ensures the security of the signature environment, provides the defense of physical level, can avoid the security problem caused by the theft or hijacking of the supervision and use by adopting a multi-signature form, and can ensure the security under the condition of keeping the private key and the digital signature function on line.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (5)

1. A blockchain multiple sign encrypted transaction system, characterized by: the system comprises a client, a blockchain transaction machine, a hardware encryption machine, wherein the blockchain transaction system is in bidirectional communication with the hardware encryption machine, the blockchain transaction machine is in communication with a public chain, the hardware encryption machine is used for checking a signature and transaction request information transmitted to the blockchain transaction machine by the client, the transaction system further comprises an individual private key corresponding to the client and a transaction private key corresponding to the blockchain transaction machine, the transaction private key of the blockchain transaction machine is stored in the hardware encryption machine, the client comprises a common user and an auditor, different clients all have different and unique individual private keys, the common user can only initiate transaction and can not perform approval, the auditor can initiate transaction and can perform approval, the blockchain transaction machine stores signature approval rules of the auditor, and the signature approval rules comprise approval by which auditor approval and standard stamp for verifying the accuracy of the signature of the auditor;
the operation process of the transaction system comprises the following steps:
s1, a client A signs a transaction request to be performed by using a private key of the client A, generates a data packet D1 and transmits the data packet D1 to a blockchain transaction machine;
s2, after the blockchain transaction machine receives the data packet D1, notifying a required auditor to carry out approval on the transaction request of the client A according to the signature approval rule;
m1, if auditors agree with the transaction request of the client A, signing the transaction request by using an individual private key of the auditors to generate a data packet D2;
m2, if the auditor does not agree with the transaction request of the client A, no signature action is taken;
s3, the blockchain transaction machine transmits the data packets obtained in the S1 and the S2 and the coding information B which is notified to the auditors to the hardware encryption machine;
s4, the hardware encryption machine decrypts the received data packet and then performs multiple data checks;
s4-1, if all the checks pass, the hardware encryption machine signs a transaction request of the client A by using a transaction private key corresponding to the blockchain transaction machine and transmits the transaction private key to the blockchain transaction machine, and the blockchain transaction machine uploads the transaction request of the client A to a public chain and returns information of successful transaction of the client A;
s4-2, if any check is not passed, the hardware encryption machine returns data for refusing the transaction request to the blockchain transaction machine, and the blockchain transaction machine returns information of transaction failure to the client A;
the multiple data verification includes: verifying the signature validity of all individual private keys, verifying whether the transaction requests after decryption of all data packets are consistent, and verifying whether the coded information B obtained in the step S3 accords with the signature approval rule.
2. A blockchain multiple sign encrypted transaction system according to claim 1, wherein: the blockchain transaction machine exists in one or more forms of a hardware terminal, a computer program and a mobile phone APP.
3. A blockchain multiple sign encrypted transaction system according to claim 1, wherein: and comparing the information of the auditor after decryption in the hardware encryptor.
4. A blockchain multiple sign encrypted transaction system according to claim 1, wherein: the hardware encryptor stores signature wholesale rules and transaction rules of auditors.
5. A blockchain multi-sign encrypted transaction system according to claim 4, wherein: the hardware encryptor in S4 also verifies whether the transaction request of the client a meets the transaction rule.
CN202310851337.2A 2019-09-20 2019-09-20 Multi-sign encryption transaction system of block chain Pending CN116976890A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310851337.2A CN116976890A (en) 2019-09-20 2019-09-20 Multi-sign encryption transaction system of block chain

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910890570.5A CN110634072B (en) 2019-09-20 2019-09-20 Block chain transaction system based on multi-signature and hardware encryption
CN202310851337.2A CN116976890A (en) 2019-09-20 2019-09-20 Multi-sign encryption transaction system of block chain

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201910890570.5A Division CN110634072B (en) 2019-09-20 2019-09-20 Block chain transaction system based on multi-signature and hardware encryption

Publications (1)

Publication Number Publication Date
CN116976890A true CN116976890A (en) 2023-10-31

Family

ID=68971832

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910890570.5A Active CN110634072B (en) 2019-09-20 2019-09-20 Block chain transaction system based on multi-signature and hardware encryption
CN202310851337.2A Pending CN116976890A (en) 2019-09-20 2019-09-20 Multi-sign encryption transaction system of block chain

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201910890570.5A Active CN110634072B (en) 2019-09-20 2019-09-20 Block chain transaction system based on multi-signature and hardware encryption

Country Status (1)

Country Link
CN (2) CN110634072B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355591A (en) * 2020-02-27 2020-06-30 北京数资科技有限公司 Block chain account safety management method based on real-name authentication technology
CN113094659B (en) * 2021-03-17 2022-10-21 青岛海尔科技有限公司 Method, device, platform equipment and system for publishing application file
CN116757849B (en) * 2023-08-14 2023-10-20 中资科技(江苏)有限公司 Asset management system and method based on block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639427B (en) * 2017-10-09 2021-01-29 华为技术有限公司 Data sending method and equipment
CN108647964B (en) * 2018-05-02 2023-07-28 郑杰骞 Block chain data processing method and device and computer readable storage medium
CN108615154B (en) * 2018-05-01 2023-04-18 浙江浩安信息技术有限公司 Block chain digital signature system based on hardware encryption protection and using process
CN109165944B (en) * 2018-08-21 2021-01-26 京东数字科技控股有限公司 Multi-party signature authentication method, device, equipment and storage medium based on block chain
CN110210863A (en) * 2019-06-11 2019-09-06 深圳市网心科技有限公司 Block chain method for secure transactions, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110634072A (en) 2019-12-31
CN110634072B (en) 2023-06-16

Similar Documents

Publication Publication Date Title
US8833648B1 (en) Dynamic credit card security code via mobile device
US11095646B2 (en) Method and system for data security within independent computer systems and digital networks
CA2418050C (en) Linking public key of device to information during manufacture
WO2021008453A1 (en) Method and system for offline blockchain transaction based on identifier authentication
US20040030901A1 (en) Linking public key of device to information during manufacture
CN108737442A (en) A kind of cryptographic check processing method
JPH09507729A (en) Cryptographic system and method with key escrow function
CN105900375A (en) Efficient methods for protecting identity in authenticated transmissions
US10700858B2 (en) Method for realizing network electronic identity identification information protection based on key dispersion calculation
WO2007092577A2 (en) A point-of-sale terminal transactions using mutating identifiers
CN110634072B (en) Block chain transaction system based on multi-signature and hardware encryption
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets
EP3579595B1 (en) Improved system and method for internet access age-verification
CN101335754B (en) Method for information verification using remote server
CN107920052A (en) A kind of encryption method and intelligent apparatus
CN111355591A (en) Block chain account safety management method based on real-name authentication technology
CN116720839B (en) Financial information management method based on blockchain technology and supervision system thereof
US11729159B2 (en) System security infrastructure facilitating protecting against fraudulent use of individual identity credentials
CN113536372B (en) Data processing method and device and electronic equipment
US20230267426A1 (en) Payment system, coin register, participant unit, transaction register, monitoring register and method for payment with electronic coin data sets
US20240086905A1 (en) Mitigation of cryptographic asset attacks
Ivarsson Mobile payment with customer controlled connection: Can it be constructed to be safe enough?
US20180332028A1 (en) Method For Detecting Unauthorized Copies Of Digital Security Tokens
KR20200048691A (en) Blockchain analysising apparatus for intrusion detection in bitcoin exchange

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination