CN106790253A - Authentication method and device based on block chain - Google Patents

Authentication method and device based on block chain Download PDF

Info

Publication number
CN106790253A
CN106790253A CN201710056607.5A CN201710056607A CN106790253A CN 106790253 A CN106790253 A CN 106790253A CN 201710056607 A CN201710056607 A CN 201710056607A CN 106790253 A CN106790253 A CN 106790253A
Authority
CN
China
Prior art keywords
data
digital asset
public key
block chain
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710056607.5A
Other languages
Chinese (zh)
Inventor
张锋
张一锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongchao Credit Card Industry Development Co., Ltd. Hangzhou blockchain Technology Research Institute
Original Assignee
Zhongchao Credit Card Industry Development Co Ltd Beijing Smart Card Technology Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongchao Credit Card Industry Development Co Ltd Beijing Smart Card Technology Research Institute filed Critical Zhongchao Credit Card Industry Development Co Ltd Beijing Smart Card Technology Research Institute
Priority to CN201710056607.5A priority Critical patent/CN106790253A/en
Publication of CN106790253A publication Critical patent/CN106790253A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of authentication method based on block chain and device.The method includes:Producing private key and corresponding produce public key by block chain tra nsfer digital asset is used for according to generating random number;Coded treatment is carried out to producing public key, generation is transferred to address;Based on private key is produced, it is digitally signed to intending the transfer numerical value of the digital asset of transfer and being transferred to address;Based on shifting numerical value, being transferred to address, digital signature and producing public key, digital asset transfer data are obtained;By digital asset shift data broadcasting to block chain in, with cause:Certification end carries out one-level certification to digital asset transfer data, or after the one-level certification, the service end and certification end carry out multi-stage authentication to digital asset transfer data jointly.Thus, the present embodiment can improve the ability of assault, can meet the demand for security of data and transaction under block chain open environment.

Description

Authentication method and device based on block chain
Technical field
The present invention relates to communication technical field, more particularly to a kind of authentication method and device based on block chain.
Background technology
Traditional digital asset interaction (such as electronic money trading) is generally completed by the mechanism of centralization.Centralization Mechanism is mainly concerned with third party transaction payment platform, the account management system of bank, remote payment system, switching system for settling account Deng.Traditional digital asset interactive mode exists cumbersome, and data are opaque, the problems such as easily distorting.
With the development of the communication technology, block chain due to decentralization, disclosure, it is transparent, cannot distort the advantages of and gradually It is applied in the application scenarios of various data processings.Block chain is considered as distributed unified account book, is total to by all participants With book keeping operation content is determined, each participant preserves full dose data, and any individual participant cannot be distorted to data.Root According to different interaction scenarios, the digital asset transfer based on block chain may relate to the multiples such as individual, trade company, third party, bank Participant.
At present, the data (for example transfer accounts address and the private key for transferring accounts) of digital asset interaction are all stored in transaction file In, and transaction file is generally preserved by the way of software cryptography or cloud encryption.Software cryptography or high in the clouds encryption all exist with Lower data transfer process is dangerous, interactive environment is dangerous, easily occur private key lose, forget, Brute Force the problems such as.Once Go wrong, the digital asset that the account on the corresponding block chain of the private key is held, such as digital cash, digitlization physical assets Etc. assets, with regard to occur cannot proof of possession problem, in turn result in digital asset loss.
How digital asset is reliably and securely shifted based on block chain, as the problem that industry needs to solve.
The content of the invention
One or more problems, the embodiment of the invention provides a kind of authentication method based on block chain in view of the above And device.
A kind of first aspect, there is provided authentication method based on block chain.The method includes:
Producing private key and corresponding produce public key by block chain tra nsfer digital asset is used for according to generating random number;
Coded treatment is carried out to producing public key, generation is transferred to address;
Based on producing private key, to intending the transfer numerical value of the digital asset of transfer and being transferred to address and other necessary informations are entered Row digital signature;
Based on shifting numerical value, being transferred to address, digital signature and producing public key, digital asset transfer data are obtained;
By digital asset shift data broadcasting to block chain in, with cause:
Certification end carries out one-level certification to digital asset transfer data, or
After the one-level certification, the service end and certification end be common digital asset transfer data are carried out it is many Level certification.
A kind of second aspect, there is provided authentication method based on block chain.The method includes:
Receiving terminal broadcasts the digital asset transfer data in block chain;
Digital asset transfer data to being received carry out one-level certification, or
It is common with the terminal that multi-stage authentication is carried out to digital asset transfer data after the one-level certification; The digital asset transfer data include:Intend transfer digital asset transfer numerical value, be transferred to address, digital signature, for leading to That crosses block chain tra nsfer digital asset produces public key.
A kind of third aspect, there is provided authentication device based on block chain.The device includes:
Key generating unit, for according to generating random number be used for by block chain tra nsfer digital asset produce private key and It is corresponding to produce public key;
Scalar/vector, for carrying out coded treatment to producing public key, generation is transferred to address;
Digital signature unit, for based on private key is produced, to intending the transfer numerical value of the digital asset of transfer and being transferred to address It is digitally signed;
Data generating unit, for based on shifting numerical value, being transferred to address, digital signature and producing public key, obtaining numeral money Produce transfer data;
Data broadcasting unit, for by digital asset shift data broadcasting to block chain in, with cause:
Certification end carries out one-level certification to digital asset transfer data, or
After the one-level certification, the service end and certification end be common digital asset transfer data are carried out it is many Level certification.
A kind of fourth aspect, there is provided authentication device based on block chain.The device includes:
Data receipt unit, data are shifted for digital asset of the receiving terminal broadcast in block chain;
Data authentication unit, one-level certification is carried out for the digital asset transfer data to being received, or
It is common with the terminal that multi-stage authentication is carried out to digital asset transfer data after the one-level certification: The digital asset transfer data include:Intend transfer digital asset transfer numerical value, be transferred to address, digital signature, for leading to That crosses block chain tra nsfer digital asset produces public key.
In a first aspect, the present embodiment is when transfer digital asset is needed, by random number carried out series of processes generate it is close Key and address is transferred to, loses, forget or the problems such as Brute Force so as to solve existing key and be transferred to address, can improved The ability of assault.
Second aspect, the present embodiment improves the accuracy of certification by one-level or multi-stage authentication, can meet in area The demand for security of data and transaction under block chain open environment.
The third aspect, the present embodiment by block chain tra nsfer digital asset can quickly processing data, cause data disclose, It is transparent, cannot distort.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for the embodiment of the present invention Accompanying drawing is briefly described, it should be apparent that, drawings described below is only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 (a) is the Verification System configuration diagram based on block chain of one embodiment of the invention.
Fig. 1 (b) is the block chain node structural representation of one embodiment of the invention.
Fig. 2 is the authentication method schematic flow sheet based on block chain of one embodiment of the invention.
Fig. 3 is the schematic flow sheet that digital asset shifts data that obtains of one embodiment of the invention.
Fig. 4 is the authentication method schematic flow sheet based on block chain of another embodiment of the present invention.
Fig. 5 is the authentication method schematic flow sheet based on block chain of further embodiment of this invention.
Fig. 6 is the structural representation of the authentication device based on block chain of one embodiment of the invention.
Fig. 7 is the structural representation of the authentication device based on block chain of another embodiment of the present invention.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 (a) is the Verification System configuration diagram based on block chain of one embodiment of the invention.
As shown in Fig. 1 (a), the system architecture can include:Block chain 100, network 200, block chain node 110,120, 130th, 140,150 and 160.Block chain 100 is considered as distributed unified account book, by all participants (block chain node 110- 160) book keeping operation content is together decided on.Each participant preserves full dose data, and any individual participant cannot be carried out to data Distort.According to different interaction scenarios, block chain node can be terminal node, certificate server node, merchant node, the 3rd Fang Jiedian and bank node etc..Each node can be various electronic equipments.These electronic equipments include but is not limited to personal electricity Brain, smart mobile phone, panel computer, personal digital assistant, server etc..These electronic equipments can be provided with various communication clients End application, such as JICQ, mailbox client, social platform software, audio frequency and video software etc..Wherein, these electronics Equipment has memory and logical operation process device, control element etc..These electronic equipments can send request of data, Huo Zheke To receive request of data, data can also be analyzed, verified and stored etc. with treatment.
Network 200 is used to be provided between block chain node 110-160 the medium of communication link.Specifically, network can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
The quantity of the block chain 100, network 200 and block chain node 110-160 that are appreciated that in Fig. 1 (a) is schematic , can according to actual needs carry out flexible configuration.
Fig. 1 (b) is the block chain node structural representation of one embodiment of the invention.
If Fig. 1 (b) block chains node 110 can be terminal, such as smart mobile phone of Android system.The terminal can be wrapped Include:Digital cash client, clock clock, safety chip SE, Javacard api interface, Javacard running environment, Javacard virtual machines, bottom OS.It is appreciated that block chain node 120-160 can also be above-mentioned smart mobile phone, can be with It is the server for authentication data.Clock clock can provide current time parameter.Safety chip SE can be stored with journey Sequence, the operation of each step for performing certification.
In the present embodiment, terminal can be encrypted to digital asset to be transferred, to ensure that digital asset can pacify Entirely, reliably it is transferred to another block chain node from a block chain node, or from outside block chain produces end Gone to by block chain and be transferred to end outside block chain.Wherein, encryption technology can rely on ripe Javacard frameworks, by adding Close class of algorithms JAVACard API constitute AES structural framing.The framework can include various keys, various signature algorithms, Various AESs etc..Digital cash authentication Applet based on hardware SE can using these AES classes set up with Applet relevant security logic, improves level of security when Applet runs.These AES classes can also be used simultaneously For SE applications provide encryption and decryption service, to embody SE in the entire system as this feature of safety guarantee. Javacard technologies have the international standard of maturation, and obtain qualification by world detection certification.Javacard specifications (including JCVM, JCRE, JCAPI specification) and GlobalPlatform specifications in security domain management, logical channel and firewall system peace Full mechanism, can effectively resist forbidden code attack, it is ensured that the sensitive data in Applet is not exposed.
Embodiments below can carry out data authentication with system architecture shown in application drawing 1 (a), Fig. 1 (b).In order to retouch State succinct, each embodiment can mutual reference.
Fig. 2 is the authentication method schematic flow sheet based on block chain of one embodiment of the invention.
As shown in Fig. 2 the method is comprised the following steps:S210, is used to pass through block chain tra nsfer number according to generating random number Word assets produce private key and corresponding produce public key;S220, coded treatment is carried out to producing public key, and generation is transferred to address; S230, based on producing private key, the transfer numerical value of the digital asset to intending transfer, is transferred to address and other necessary datas and carries out numeral Signature;S240, based on shifting numerical value, being transferred to address, digital signature and producing public key, obtains digital asset transfer data;S250, By digital asset shift data broadcasting to block chain in, with cause:Certification end carries out one-level to digital asset transfer data Certification, or after the one-level certification, the service end and certification end are carried out to digital asset transfer data jointly Multi-stage authentication.
The present embodiment can apply to end side, and terminal can be specific to perform as the action executing main body of the present embodiment Each step operation.The safety chip SE of terminal can be stored with digital cash authentication Applet application programs, the program Can implement function such as:Initialization public key, generation are transferred to the functions such as address, signature, checking.
In step S210, safety chip SE can generate private key Sk using randomizer.By private key Sk by non- Symmetric encipherment algorithm treatment can obtain public key Pk.
The corresponding public key that produces of generation can include:Produce private key based on described, by elliptic curve encryption algorithm ECC, At least one of RSA cryptographic algorithms, Elgamal AESs, D-H AESs, the close SM2 algorithms of state rivest, shamir, adelman is given birth to Corresponding public key is produced into described.
In step S220, coded treatment can carry out coded treatment using above-mentioned AES.Being transferred to address can be with It is wallet address to be transferred to.
In step S230, digital signature can be that initial data is signed using private key Sk.Transaction (or turn Move) initial data can include:Transfer accounts and number and be transferred to wallet address.
In step S240, digital asset transfer data can include:Numerical value is shifted, address, digital signature is transferred to and is turned Go out public key.The present embodiment can will produce signature and produce public key and be added in initial data the transaction data for generating optimization.It is excellent The transaction data of change can include:Transfer accounts number, be transferred to wallet address, produce signature and produce public key.
In step s 250, digital asset can be shifted data is activation to for authentication data by terminal by block chain Certification end (authentication authorization and accounting server).
In a first aspect, the present embodiment is when transfer digital asset is needed, by random number carried out series of processes generate it is close Key and address is transferred to, loses, forget or the problems such as Brute Force so as to solve existing key and be transferred to address, can improved The ability of assault.
Second aspect, the present embodiment improves the accuracy of certification by one-level or multi-stage authentication, can meet in area The demand for security of data and transaction under block chain open environment.
The third aspect, the present embodiment by block chain tra nsfer digital asset can quickly processing data, cause data disclose, It is transparent, cannot distort.
As the first variant embodiment of embodiment illustrated in fig. 1, walked below increase on the basis of embodiment illustrated in fig. 2 Suddenly:S260, receives the encryption data from certification end, and encryption data is that certification end is carried out using public key is produced to random number seed What encryption was generated;S270, is decrypted using encryption data of the private key to being received is produced, and obtains random number seed.This reality Example is applied to can apply to transfer accounts the scene of number smaller (upper limit of for example transferring accounts is 999 yuan).Certification end is only needed in the present embodiment Server carry out one-level certification.
In the present embodiment, public key Pk is sent to certificate server, certificate server through digital cash APP by block chain Generation random number seed Seed simultaneously encrypts E (seed, PK), and return to digital cash APP, safe core by block chain using Pk Piece SE digital cash applet private key Sk decrypt E (seed, PK) and preserve random number seed seed.
As the second variant embodiment of embodiment illustrated in fig. 1, can increase on the basis of the first variant embodiment with Lower step:S280, receives current time parameter and an OTP (One-time Password, dynamic password) from certification end Value, an OTP values carry out Hash operation and obtain to random number seed and current time parameter.
As the 3rd variant embodiment of embodiment illustrated in fig. 1, can increase on the basis of the second variant embodiment with Lower step:S2100, the 2nd OTP values that Hash operation is obtained are carried out to random number seed and current time parameter;S2110, checking Whether the first OTP values and the 2nd OTP values are equal;S2120, when the result indicates equal, digital asset transfer data pass through Multi-stage authentication.The present embodiment can be 2 grades of certifications, and authentication authorization and accounting end carries out first time certification, and then client is recognized for the second time Card.The present embodiment can apply to, when number of transferring accounts larger (for example, more than 1000 yuan), introduce and provide premium status certification Means.In this case, block trade certification application, certification clothes are initiated to certificate server from recipient's digital cash APP Business device carries out Hash calculating to initial random number seed seed and current time time, generates OTP values, returns to digital cash APP.The OTP values and current time that digital cash APP will be received return to safety chip SE authentication Applet together, Applet is calculated OTP ' together using the initial random number seed seed and current time for oneself preserving, when obtaining OTP= During OTP ' consistent results, by checking, transaction data is digitally signed, and transaction initiator is returned to by block chain, from And complete transaction.
By holding generation OTP numerical value, the wholesale payment scheme being authenticated by client (SE) enhances visitor to the present embodiment The certification right at family end, OTP numerical value is generated than client, more scientific and reasonable by server authentication.
In certain embodiments, carry out coded treatment to producing public key, generation be transferred to address (that is, S220) can include with Lower step:S221, public key cryptographic Hash is obtained to producing public key by Hash operation;S222, is that public key cryptographic Hash sets stem version Notebook data;S223, is that public key cryptographic Hash sets afterbody verification data;S224, pair be provided with stem edition data and afterbody verification The public key cryptographic Hash of data carries out coded treatment, and generation is transferred to address.
In certain embodiments, it is that public key cryptographic Hash can include the step of setting afterbody verification data (that is, S223): S2231, the public key cryptographic Hash for pair being provided with stem edition data carries out the Hash operation of preset times;S2232, extracts computing Specified portions data in result, generate afterbody verification data.
In certain embodiments, preset times are 2 times, and multistage is 2 grades.
For example, first by randomizer generation " private key ", " private key " is processed into " public key " by ECC algorithm.It is logical Crossing known " private key " can calculate " public key ", and cannot reversely be released " private key " when known to " public key ".Public key is calculated by Hash Method is obtained " public key Hash ", but can not obtain " public key " by " public key Hash ", and the address version number of a byte is linked to " public key Hash " head, Hash operation twice is carried out to it, and 4 bytes before result as the check value of public key Hash are connected In its afterbody.This result is encoded using AES, has just been obtained " wallet address ".
Above-described embodiment can carry out block chain (numeral by the digital cash authentication Applet loaded in hardware SE Moneytary operations) on trading signature, improve the safety and reliability of transaction.
Fig. 3 is the schematic flow sheet that digital asset shifts data that obtains of one embodiment of the invention.
As shown in figure 3, obtain digital asset transfer data can include:S310, private is produced according to random number RA DOM generations Key Sk;S320, algorithm process is encrypted to producing private key Sk;Public key Pk is produced in S330, generation;S340, sets initial data: Transfer accounts and number and be transferred to address;S350, is digitally signed to producing private key Sk with initial data;Signature is produced in S360, generation; S370, will produce signature and produces public key Pk and be added in initial data the transaction data for generating optimization, the number of deals of optimization According to including:Transfer accounts number, be transferred to address, produce signature and produce public key Pk.
Fig. 4 is the authentication method schematic flow sheet based on block chain of another embodiment of the present invention.
As shown in figure 4, the method is comprised the following steps:S410, the digital asset that receiving terminal is broadcasted in block chain turns Move data;S420, it is common with terminal that multi-stage authentication is carried out to digital assets transfer data after one-level certification;Digital asset Transfer data include:Intend transfer digital asset transfer numerical value, be transferred to address, digital signature, for by block chain tra nsfer Digital asset produces public key.
In certain embodiments, carrying out one-level certification to the digital asset transfer data for being received includes:To what is received Digital asset transfer data carry out legitimate verification.For example, recipient's digital cash authentication Applet receives transaction data Transaction data is decrypted by turning algorithm afterwards and obtains original transaction data, (i.e. the upper limit is less than 1000 yuan when number of transferring accounts 999 yuan) when, data are tested, whether it is more than the inspection for carrying out such as zero including to digital signature, transaction data, such as Fruit verifies correctly, and digital cash is just successfully transferred to " being transferred to wallet " from " producing wallet ", completes transaction.It is raw in transaction file Into unique sequence numbers, by block chain the whole network synchronization.
The present embodiment can apply to certification side, and server can be as the action executing main body of the present embodiment, specifically Perform each step operation.The present embodiment is identical with embodiment illustrated in fig. 2 design, but (the angle of certification end from different angles With the angle of terminal) authentication method based on block chain described.
In certain embodiments, carrying out multi-stage authentication to digital assets transfer data jointly with terminal includes:Generation is random Several sons;Based on public key is produced, encryption data is encrypted and generated to random number seed;Encryption data is sent to terminal Side, so that terminal-pair encryption data is decrypted, and obtains random number seed.
Hash operation is carried out to random number seed and current time parameter and obtains an OTP values;First OTP values are sent to Terminal, for terminal:The 2nd OTP values that Hash operation is obtained, checking first are carried out to random number seed and current time parameter Whether OTP values and the 2nd OTP values are equal, when the result indicates equal, by multi-stage authentication.
Fig. 5 is the authentication method schematic flow sheet based on block chain of further embodiment of this invention.The present embodiment is from end End and server both sides carry out the angle of data interaction to describe the implementation of authentication method.
As shown in figure 5, the method is comprised the following steps:
S501, terminal is used to produce private key Sk by block chain tra nsfer digital asset according to generating random number;
S502, terminal carries out a series of calculation process using rivest, shamir, adelman to producing private key, and public key is produced in generation Pk, server is sent to by public key Pk;
S503, server generation random number seed Seed, based on public key Pk is produced, is encrypted and gives birth to random number seed Into encryption data E (Seed, Pk), encryption data is sent to terminal;
S504, terminal private key Sk is decrypted to encryption data, and obtains and preserve random number seed Seed.Terminal to Server sends the transaction data of optimization;
Whether S505, the server number that judges to transfer accounts reaches threshold value (such as threshold value is 1000 yuan);
S506, when threshold value is not reaching to, server carries out one-level certification to the transaction data for optimizing;
S507, when a threshold is reached, server carries out Hash operation and obtains OTP to random number seed Seed and current time Value, terminal is sent to by current time and OTP values;
S508, terminal-pair random number seed Seed and current time parameter carry out the OTP ' values that Hash operation is obtained;
Whether S509, terminal authentication OTP values and OTP ' values are equal;
S510, when the result indicates equal, by secondary authentication.
In the present embodiment, private key Sk can be generated using randomizer with the safety chip of terminal, private key is by ECC Algorithm process is into public key Pk.Public key Pk is sent to certificate server, certificate server generation through digital cash APP by block chain Random number seed Seed simultaneously encrypts E (seed, Pk), and return to digital cash APP, safety chip SE by block chain using Pk Digital cash applet private key Sk decrypt E (seed, Pk) and preserve random number seed seed.
When initiating transaction, transaction data is generated by producing wallet private key Sk '.The initial data of transaction includes " number of transferring accounts " " being transferred to wallet address ", then uses private key Sk ' to sign initial data.Private key is produced by after ECC algorithm treatment, being turned Go out public key Pk '.Produce signature and produce public key and be added in initial data the transaction data for generating optimization, sent out by block chain It is sent to recipient's node digital cash APP.
Recipient's digital cash authentication Applet is solved by turning algorithm after receiving transaction data to transaction data It is close to obtain original transaction data, when number of transferring accounts is less than 1000 yuan (i.e. the upper limit is 999 yuan), data are tested, wherein Including the inspection to digital signature, if verification is correct, digital cash is just successfully transferred to from " producing wallet " and " is transferred to money Bag ", completes transaction.Unique sequence numbers are generated in transaction file, by block chain the whole network synchronization.
When number of transferring accounts is more than 1000 yuan, the means that premium status certification is provided are introduced.In this case, by receiving Square digital cash APP initiates block trade certification application to certificate server, and certificate server is to initial random number seed seed Hash calculating is carried out with current time time, generation OTP values (i.e. an OTP values) returns to digital cash APP.Digital cash The OTP values and current time that APP will be received are returned to safety chip SE authentications Applet, Applet and are protected using oneself together The initial random number seed seed and current time for depositing are calculated OTP ' (i.e. the 2nd OTP values) together, when obtaining OTP=OTP ' During consistent results, by checking, transaction is completed.
It should be noted that in the case where not conflicting, those skilled in the art can according to actual needs will be above-mentioned The order of operating procedure is adjusted flexibly, or above-mentioned steps are carried out into the operation such as flexible combination.For simplicity, repeating no more Various implementations.In addition, the content of each embodiment can mutual reference.
Fig. 6 is the structural representation of the authentication device based on block chain of one embodiment of the invention.The present embodiment can be answered For end side.
As shown in fig. 6, the authentication device 600 based on block chain can include:The generation of Key generating unit 610, address is single Unit 620, digital signature unit 630, data generating unit 640 and data radio unit 650.Wherein, Key generating unit 610 can For being used for producing private key and corresponding produce public key by block chain tra nsfer digital asset according to generating random number;Address Generation unit 620 can be used for carrying out coded treatment to producing public key, and generation is transferred to address;Digital signature unit 630 can be used In based on private key is produced, it is digitally signed to intending the transfer numerical value of the digital asset of transfer and being transferred to address;Data genaration list Unit 640 can be used for based on transfer numerical value, be transferred to address, digital signature and produce public key, obtain digital asset transfer data;Number According to radio unit 650 can be used for by digital asset shift data broadcasting to block chain in, with cause:Certification end is to digital asset Transfer data carry out one-level certification, or after one-level certification, service end and certification end are common to digital assets transfer data Carry out multi-stage authentication.It is appreciated that digital signature unit 630 can also be digitally signed to other necessary datas.
It should be noted that the implementation of the functional unit or functional module shown in the present embodiment can be hard Part, software, firmware or combinations thereof.When realizing in hardware, it may, for example, be electronic circuit, special integrated electricity Road (ASIC), appropriate firmware, plug-in unit, function card etc..When being realized with software mode, element of the invention is used to hold The program or code segment of task needed for row.Program or code segment can be stored in machine readable media, or by carrying The data-signal carried in ripple send in transmission medium or communication links." machine readable media " can include storing Or any medium of transmission information.The example of machine readable media includes electronic circuit, semiconductor memory devices, ROM, sudden strain of a muscle Deposit, erasable ROM (EROM), floppy disk, CD-ROM, CD, hard disk, fiber medium, radio frequency (RF) link, etc..Code segment can It is downloaded with the computer network via internet, Intranet etc..
As the first variant embodiment of embodiment illustrated in fig. 6, can increase on the basis of Fig. 6 embodiments:Data connect Receive unit and data decryption unit.Wherein, data receipt unit can be used for receiving the encryption data from certification end, encrypt number Generated using producing public key random number seed is encrypted according to being certification end;Data decryption unit can be used for using turn Go out encryption data of the private key to being received to be decrypted, obtain random number seed.
As the second variant embodiment of embodiment illustrated in fig. 6, can increase on the basis of the first variant embodiment:Number According to receiving unit.Wherein, data receipt unit can be additionally operable to receive current time parameter and an OTP from certification end Value, an OTP values carry out Hash operation and obtain to random number seed and current time parameter.
As the 3rd variant embodiment of embodiment illustrated in fig. 6, can increase on the basis of the 3rd variant embodiment:Breathe out Uncommon arithmetic element and data verification units.Wherein, Hash operation unit can be used for random number seed and current time parameter Carry out the 2nd OTP values that Hash operation is obtained;Data verification units can be used for checking the first OTP values and the 2nd OTP values whether Equal, when the result indicates equal, digital asset transfer data pass through multi-stage authentication.
In certain embodiments, scalar/vector can include:Hash operation module, stem setup module, afterbody set Put module and data coding module.Wherein, Hash operation module can be used for obtaining public key by Hash operation to producing public key Cryptographic Hash;Stem setup module can be used for setting stem edition data for public key cryptographic Hash;Afterbody setup module can be used for For public key cryptographic Hash sets afterbody verification data;Data coding module can be used for pair being provided with stem edition data and afterbody school Testing the public key cryptographic Hash of data carries out coded treatment, and generation is transferred to address.
In certain embodiments, afterbody setup module can include:Hash operation element and data extract element.Wherein, Hash operation element can be used for the Hash operation that pair public key cryptographic Hash for being provided with stem edition data carries out preset times;Number According to the specified portions data that element can be used for extracting in the result of computing are extracted, afterbody verification data is generated.
In certain embodiments, preset times are 2 times, and multistage is 2 grades.It is appreciated that preset times can also be 3 times, 4 Secondary, multistage can also be 3 grades, 4 grades, because quantity more macrooperation is more complicated, when preset times are 2 times, and multistage is 2 grades, Under conditions of meeting arithmetic speed, certification best results.
In certain embodiments, Key generating unit is additionally operable to:Private key is produced based on described, is calculated by elliptic curve cryptography At least one of method ECC, RSA cryptographic algorithms, Elgamal AESs, D-H AESs, the close SM2 algorithms of state asymmetric encryption Algorithm generation is described corresponding to produce public key.
In each embodiment shown in Fig. 6, the authentication device 600 based on block chain can be mobile terminal.
Fig. 7 is the structural representation of the authentication device based on block chain of another embodiment of the present invention.The present embodiment can be with It is applied to certification side.
As shown in fig. 7, the authentication device 700 based on block chain can include:Data receipt unit 710 and data authentication list Unit 720.Wherein, data receipt unit 710 can be used for digital asset transfer data of the receiving terminal broadcast in block chain;Number Can be used for carrying out one-level certification to the digital asset transfer data for being received according to authentication unit 720, or one-level certification it Afterwards, it is common with terminal that multi-stage authentication is carried out to digital assets transfer data:Digital asset transfer data include:Intend the numeral of transfer The transfer numerical value of assets, be transferred to address, digital signature, for producing public key by block chain tra nsfer digital asset.
In certain embodiments, data authentication unit can include:One-level authentication module.One-level authentication module can be used In:Digital asset transfer data to being received carry out legitimate verification.
Multi-stage authentication module can include:Seed production element, data encryption element, data transmitting component, Hash operation Element and numerical value transmitting element.Wherein:Seed production element can be used for generating random number seed;Data encryption element can be used In based on public key is produced, encryption data is encrypted and generated to random number seed;Data transmitting component can be used for encrypting Data is activation so that terminal-pair encryption data is decrypted, and obtains random number seed to end side;Hash operation element can be with An OTP values are obtained for carrying out Hash operation to random number seed and current time parameter;Numerical value transmitting element can be used for First OTP values are sent to terminal, for terminal:Hash operation is obtained is carried out to random number seed and current time parameter Whether two OTP values, the first OTP values of checking and the 2nd OTP values are equal, when the result indicates equal, by multi-stage authentication.
In each embodiment shown in Fig. 7, the authentication device 600 based on block chain can be certificate server.
It should be noted that the device of the various embodiments described above can be used as the method for each embodiment of the various embodiments described above In executive agent, it is possible to achieve the corresponding flow in each method, for sake of simplicity, content is repeated no more in this respect.
Through the above description of the embodiments, those skilled in the art can be understood that each implementation method can Realized by the mode of software plus required general hardware platform, naturally it is also possible to by hardware.Based on such understanding, on Stating the part that technical scheme substantially contributes to prior art in other words can be embodied in the form of software product, should Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Order is used to so that a computer equipment (can be personal computer, server, or network equipment etc.) performs each implementation Method described in some parts of example or embodiment.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used Modified with to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (22)

1. a kind of authentication method based on block chain, is applied to end side, it is characterised in that the method includes:
Producing private key and corresponding produce public key by block chain tra nsfer digital asset is used for according to generating random number;
Coded treatment is carried out to the public key that produces, generation is transferred to address;
Private key is produced based on described, the transfer numerical value and the address that is transferred to intending the digital asset of transfer are digitally signed;
Based on the transfer numerical value, it is described be transferred to address, the digital signature and it is described produce public key, obtain digital asset transfer Data;
By the digital asset shift data broadcasting to the block chain in, with cause:
Certification end carries out one-level certification to digital asset transfer data, or
After the one-level certification, the service end and certification end carry out multistage and recognize to digital asset transfer data jointly Card.
2. method according to claim 1, it is characterised in that also include:
Receive the encryption data from the certification end, the encryption data be the certification end produced described in public key to The several sons of machine are encrypted what is generated;
It is decrypted using the encryption data for producing private key to being received, obtains the random number seed.
3. method according to claim 2, it is characterised in that also include:
Current time parameter and the first dynamic password OTP values from the certification end are received, an OTP values are to described Random number seed and the current time parameter carry out what Hash operation was obtained.
4. method according to claim 3, it is characterised in that also include:
The 2nd OTP values that Hash operation is obtained are carried out to the random number seed and the current time parameter;
Verify whether an OTP values and the 2nd OTP values are equal;
When the result indicates equal, the digital asset transfer data pass through the multi-stage authentication.
5. the method according to any one in claim 1-4, it is characterised in that the generation is transferred to address to be included:
Public key cryptographic Hash is obtained by Hash operation to the public key that produces;
For the public key cryptographic Hash sets stem edition data;
For the public key cryptographic Hash sets afterbody verification data;
The public key cryptographic Hash for pair being provided with the stem edition data and the afterbody verification data carries out coded treatment, generates institute State and be transferred to address.
6. method according to claim 5, it is characterised in that be that the public key cryptographic Hash sets afterbody verification data bag Include:
The public key cryptographic Hash for pair being provided with the stem edition data carries out the Hash operation of preset times;
The specified portions data in the result of computing are extracted, the afterbody verification data is generated.
7. method according to claim 6, it is characterised in that the preset times are 2 times, it is described it is multistage be 2 grades.
8. the method according to any one of claim 1-4, it is characterised in that generation is described corresponding to produce public key bag Include:
Private key is produced based on described, by elliptic curve encryption algorithm ECC, RSA cryptographic algorithms, Elgamal AESs, D-H The generation of at least one of AES, the close SM2 algorithms of state rivest, shamir, adelman is described corresponding to produce public key.
9. a kind of authentication method based on block chain, is applied to certification side, it is characterised in that the method includes:
Receiving terminal broadcasts the digital asset transfer data in block chain;
Digital asset transfer data to being received carry out one-level certification, or
It is common with the terminal that multi-stage authentication is carried out to digital asset transfer data after the one-level certification;It is described Digital asset transfer data include:Intend transfer digital asset transfer numerical value, be transferred to address, digital signature, for by area Block chain tra nsfer digital asset produces public key.
10. method according to claim 9, it is characterised in that the digital asset transfer data to being received carry out one-level Certification includes:Digital asset transfer data to being received carry out legitimate verification.
11. methods according to claim 10, it is characterised in that common with the terminal that number is shifted to the digital asset Include according to multi-stage authentication is carried out:
Generation random number seed;
Public key is produced based on described, encryption data is encrypted and generated to the random number seed;
The encryption data is sent to the end side, so that encryption data described in the terminal-pair is decrypted, and is obtained The random number seed;
Hash operation is carried out to the random number seed and current time parameter and obtains an OTP values;
The first OTP values are sent to the terminal, for the terminal:
Carry out the 2nd OTP values that Hash operation is obtained to the random number seed and the current time parameter, verify described the Whether one OTP values and the 2nd OTP values are equal, when the result indicates equal, by the multi-stage authentication.
A kind of 12. authentication devices based on block chain, are applied to end side, it is characterised in that the device includes:
Key generating unit, for being used to produce private key and correspondence by block chain tra nsfer digital asset according to generating random number Produce public key;
Scalar/vector, for carrying out coded treatment to the public key that produces, generation is transferred to address;
Digital signature unit, for producing private key based on described, to intending the transfer numerical value of the digital asset of transfer and described being transferred to Address is digitally signed;
Data generating unit, for based on the transfer numerical value, described be transferred to address, the digital signature and described produce public affairs Key, obtains digital asset transfer data;
Data broadcasting unit, for by the digital asset shift data broadcasting to the block chain in, with cause:
Certification end carries out one-level certification to digital asset transfer data, or
After the one-level certification, the service end and certification end carry out multistage and recognize to digital asset transfer data jointly Card.
13. devices according to claim 12, it is characterised in that also include:
Data receipt unit, for receiving the encryption data from the certification end, the encryption data is the certification end profit What is generated is encrypted to random number seed with the public key that produces;
Data decryption unit, is decrypted for producing encryption data of the private key to being received described in, obtains described random Several sons.
14. devices according to claim 13, it is characterised in that wherein:
The data receipt unit, is additionally operable to receive current time parameter from the certification end and an OTP values, and described the One OTP values carry out Hash operation and obtain to the random number seed and the current time parameter.
15. devices according to claim 14, it is characterised in that also include:
Hash operation unit, for carrying out Hash operation is obtained second to the random number seed and the current time parameter OTP values;
Data verification units, it is whether equal for verifying an OTP values and the 2nd OTP values, when the result is indicated When equal, the digital asset transfer data pass through the multi-stage authentication.
16. device according to any one in claim 12-15, it is characterised in that the scalar/vector includes:
Hash operation module, for obtaining public key cryptographic Hash by Hash operation to the public key that produces;
Stem setup module, for setting stem edition data for the public key cryptographic Hash;
Afterbody setup module, for setting afterbody verification data for the public key cryptographic Hash;
Data coding module, the public key cryptographic Hash for pair being provided with the stem edition data and the afterbody verification data is entered Row coded treatment, generation described in be transferred to address.
17. devices according to claim 16, it is characterised in that the afterbody setup module includes:
Hash operation element, for pair be provided with the stem edition data public key cryptographic Hash carry out preset times Hash fortune Calculate;
Data extract element, for the specified portions data in the result for extracting computing, generate the afterbody verification data.
18. devices according to claim 6, it is characterised in that the preset times are 2 times, it is described multistage for 2 grades.
19. device according to any one of claim 12-15, it is characterised in that the Key generating unit is additionally operable to: Private key is produced based on described, is encrypted by elliptic curve encryption algorithm ECC, RSA cryptographic algorithms, Elgamal AESs, D-H The generation of at least one of algorithm, the close SM2 algorithms of state rivest, shamir, adelman is described corresponding to produce public key.
A kind of 20. authentication devices based on block chain, are applied to certification side, it is characterised in that the device includes:
Data receipt unit, data are shifted for digital asset of the receiving terminal broadcast in block chain;
Data authentication unit, one-level certification is carried out for the digital asset transfer data to being received, or
It is common with the terminal that multi-stage authentication is carried out to digital asset transfer data after the one-level certification:It is described Digital asset transfer data include:Intend transfer digital asset transfer numerical value, be transferred to address, digital signature, for by area Block chain tra nsfer digital asset produces public key.
21. devices according to claim 20, it is characterised in that the data authentication unit includes:One-level authentication module, The one-level authentication module is used for:Digital asset transfer data to being received carry out legitimate verification.
22. devices according to claim 21, it is characterised in that the data authentication unit includes:Multi-stage authentication module, The multi-stage authentication module includes:
Seed produces element, for generating random number seed;
Data encryption element, for producing public key based on described, is encrypted and generates encryption data to the random number seed;
Data transmitting component, for the encryption data to be sent into the end side, for encrypting number described in the terminal-pair According to being decrypted, and obtain the random number seed;
Hash operation element, an OTP values are obtained for carrying out Hash operation to the random number seed and current time parameter;
Numerical value transmitting element, for an OTP values to be sent into the terminal, for the terminal:To the random number Seed and the current time parameter carry out the 2nd OTP values that Hash operation is obtained, and verify an OTP values and described second Whether OTP values are equal, when the result indicates equal, by the multi-stage authentication.
CN201710056607.5A 2017-01-25 2017-01-25 Authentication method and device based on block chain Pending CN106790253A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710056607.5A CN106790253A (en) 2017-01-25 2017-01-25 Authentication method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710056607.5A CN106790253A (en) 2017-01-25 2017-01-25 Authentication method and device based on block chain

Publications (1)

Publication Number Publication Date
CN106790253A true CN106790253A (en) 2017-05-31

Family

ID=58943022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710056607.5A Pending CN106790253A (en) 2017-01-25 2017-01-25 Authentication method and device based on block chain

Country Status (1)

Country Link
CN (1) CN106790253A (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222312A (en) * 2017-06-20 2017-09-29 无锡井通网络科技有限公司 Assets digitizing solution based on block chain technology
CN107257341A (en) * 2017-06-21 2017-10-17 济南浪潮高新科技投资发展有限公司 A kind of student status based on block chain reviews authentication method
CN107423124A (en) * 2017-07-27 2017-12-01 中链科技有限公司 A kind of method for being used to carry out transaction data parallel processing
CN107491946A (en) * 2017-07-10 2017-12-19 北京云知科技有限公司 It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment
CN107493273A (en) * 2017-08-02 2017-12-19 深圳市易成自动驾驶技术有限公司 Identity identifying method, system and computer-readable recording medium
CN107563112A (en) * 2017-07-26 2018-01-09 上海若灵软件技术有限公司 A kind of medical information sharing system
CN107888382A (en) * 2017-11-24 2018-04-06 中钞***产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity checking based on block chain
CN107909476A (en) * 2017-11-23 2018-04-13 深圳捷汇科技有限公司 Digital asset reception, sending method, electronic equipment and transaction system
CN108305074A (en) * 2018-01-30 2018-07-20 深圳壹账通智能科技有限公司 Transaction processing method, device, computer equipment and storage medium
CN108428136A (en) * 2018-02-28 2018-08-21 武汉康慧然信息技术咨询有限公司 Electric vehicle information authentication method
CN108615195A (en) * 2018-04-28 2018-10-02 腾讯科技(深圳)有限公司 Transmission method and device, storage medium, the electronic device of resource transfers information
CN108805538A (en) * 2018-06-14 2018-11-13 清华大学 A kind of digital cash method of commerce and device
CN108854077A (en) * 2018-07-17 2018-11-23 广州瞪羚信息科技有限公司 Across game item circulation method based on block chain technology
CN109067709A (en) * 2018-07-06 2018-12-21 北京知道创宇信息技术有限公司 A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium
CN109104287A (en) * 2018-07-27 2018-12-28 众安信息技术服务有限公司 The method and apparatus communicated in block chain
CN109102270A (en) * 2018-07-24 2018-12-28 深圳前海益链网络科技有限公司 Transaction verification method, computer equipment and the storage medium of block chain number Token
CN109117651A (en) * 2018-07-27 2019-01-01 国网重庆市电力公司电力科学研究院 A kind of continuous data safety protecting method
CN109347632A (en) * 2018-10-23 2019-02-15 北京金山安全软件有限公司 Block chain ID generation and use method, device, electronic equipment and storage medium
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
EP3457622A1 (en) * 2017-09-15 2019-03-20 Panasonic Intellectual Property Corporation of America Electronic voting system and control method
EP3457623A1 (en) * 2017-09-15 2019-03-20 Panasonic Intellectual Property Corporation of America Electronic voting system and control method
CN109509288A (en) * 2017-09-15 2019-03-22 松下电器(美国)知识产权公司 Electronic voting system and control method
CN109547461A (en) * 2018-12-13 2019-03-29 如般量子科技有限公司 Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN109598147A (en) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 Data processing method and device based on block chain, electronic equipment
CN109615422A (en) * 2018-11-29 2019-04-12 哈希未来(北京)科技有限公司 Competing pumping method, system and storage medium based on block chain
CN109670827A (en) * 2018-11-29 2019-04-23 如般量子科技有限公司 Anti- quantum calculation block chain method of commerce based on pool of symmetric keys
CN109670826A (en) * 2018-11-29 2019-04-23 如般量子科技有限公司 Anti- quantum calculation block chain method of commerce based on unsymmetrical key pond
CN109687970A (en) * 2018-12-07 2019-04-26 南京理工大学 A kind of mobile block chain Quan Jiedian and its implementation
CN109687965A (en) * 2019-02-18 2019-04-26 哈尔滨工业大学(深圳) The real name identification method of subscriber identity information in a kind of protection network
CN109728906A (en) * 2019-01-11 2019-05-07 如般量子科技有限公司 Anti- quantum calculation asymmet-ric encryption method and system based on unsymmetrical key pond
CN109978535A (en) * 2017-12-28 2019-07-05 李耀庭 A kind of private key processing method of stored value card
CN110163604A (en) * 2019-04-29 2019-08-23 华中科技大学 A kind of block chain assets transfer method based on multi-party verification
CN110336779A (en) * 2019-05-07 2019-10-15 弦子科技(北京)有限公司 A kind of construction method, device and the electronic equipment of block chain
CN110602083A (en) * 2019-09-10 2019-12-20 上海黔易数据科技有限公司 Secure transmission and storage method of digital identity authentication data
CN110912702A (en) * 2019-10-25 2020-03-24 趣派(海南)信息科技有限公司 Block chain asset management method based on hidden social relationship
CN110955407A (en) * 2019-11-21 2020-04-03 杭州趣链科技有限公司 Random number taking method based on block chain
CN110971413A (en) * 2019-06-20 2020-04-07 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and storage medium
CN111091380A (en) * 2019-10-25 2020-05-01 趣派(海南)信息科技有限公司 Block chain asset management method based on friend covert verification
CN111316595A (en) * 2017-11-09 2020-06-19 区块链控股有限公司 System for protecting a verification key from alteration and verifying the validity of a proof of correctness
CN111314066A (en) * 2020-01-23 2020-06-19 腾讯科技(深圳)有限公司 Block chain-based data transfer method, terminal and computer-readable storage medium
WO2020140931A1 (en) * 2019-01-03 2020-07-09 菜鸟智能物流控股有限公司 Blockchain access control method and apparatus, and electronic device
CN111466098A (en) * 2017-12-07 2020-07-28 区块链控股有限公司 Block chain implemented security system and method for blind result selection
CN112241514A (en) * 2019-07-19 2021-01-19 傲为信息技术(江苏)有限公司 Digital asset authentication processing platform and method
WO2021042685A1 (en) * 2019-09-05 2021-03-11 国网区块链科技(北京)有限公司 Transaction method, device, and system employing blockchain
JP2021511561A (en) * 2018-02-14 2021-05-06 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Asset management methods and equipment as well as electronic devices
CN113034139A (en) * 2021-03-15 2021-06-25 中国人民大学 Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN113076527A (en) * 2021-04-19 2021-07-06 支付宝(杭州)信息技术有限公司 Block chain-based digital asset processing method and device
CN113190859A (en) * 2021-04-29 2021-07-30 湖北央中巨石信息技术有限公司 Data hierarchical encryption method based on block chain
CN113475037A (en) * 2018-12-10 2021-10-01 阿尔戈兰德公司 Implementing fair electronic switching using virtual blockchain protocol
CN113765657A (en) * 2017-08-28 2021-12-07 创新先进技术有限公司 Key data processing method and device and server
US11562375B2 (en) 2018-09-30 2023-01-24 Advanced New Technologies Co., Ltd. Blockchain-based data verification method, apparatus, and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology

Cited By (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222312A (en) * 2017-06-20 2017-09-29 无锡井通网络科技有限公司 Assets digitizing solution based on block chain technology
CN107222312B (en) * 2017-06-20 2020-11-24 无锡井通网络科技有限公司 Asset digitalization method based on block chain technology
CN107257341B (en) * 2017-06-21 2019-08-16 浪潮集团有限公司 A kind of student status retrospect authentication method based on block chain
CN107257341A (en) * 2017-06-21 2017-10-17 济南浪潮高新科技投资发展有限公司 A kind of student status based on block chain reviews authentication method
CN107491946A (en) * 2017-07-10 2017-12-19 北京云知科技有限公司 It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment
CN107563112A (en) * 2017-07-26 2018-01-09 上海若灵软件技术有限公司 A kind of medical information sharing system
CN107423124A (en) * 2017-07-27 2017-12-01 中链科技有限公司 A kind of method for being used to carry out transaction data parallel processing
CN107493273A (en) * 2017-08-02 2017-12-19 深圳市易成自动驾驶技术有限公司 Identity identifying method, system and computer-readable recording medium
CN113765657A (en) * 2017-08-28 2021-12-07 创新先进技术有限公司 Key data processing method and device and server
CN113765657B (en) * 2017-08-28 2023-10-24 创新先进技术有限公司 Key data processing method, device and server
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
US11915527B2 (en) 2017-09-15 2024-02-27 Panasonic Intellectual Property Corporation Of America Electronic voting system and control method
CN109509288A (en) * 2017-09-15 2019-03-22 松下电器(美国)知识产权公司 Electronic voting system and control method
EP3457623A1 (en) * 2017-09-15 2019-03-20 Panasonic Intellectual Property Corporation of America Electronic voting system and control method
EP3457622A1 (en) * 2017-09-15 2019-03-20 Panasonic Intellectual Property Corporation of America Electronic voting system and control method
CN111316595A (en) * 2017-11-09 2020-06-19 区块链控股有限公司 System for protecting a verification key from alteration and verifying the validity of a proof of correctness
CN107909476A (en) * 2017-11-23 2018-04-13 深圳捷汇科技有限公司 Digital asset reception, sending method, electronic equipment and transaction system
CN107888382A (en) * 2017-11-24 2018-04-06 中钞***产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity checking based on block chain
CN107888382B (en) * 2017-11-24 2019-11-19 中钞***产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity verifying based on block chain
CN111466098A (en) * 2017-12-07 2020-07-28 区块链控股有限公司 Block chain implemented security system and method for blind result selection
CN111466098B (en) * 2017-12-07 2024-04-02 区块链控股有限公司 System and method for block chain implementation security for blind result selection
CN109978535A (en) * 2017-12-28 2019-07-05 李耀庭 A kind of private key processing method of stored value card
CN108305074B (en) * 2018-01-30 2020-06-02 深圳壹账通智能科技有限公司 Transaction processing method and device, computer equipment and storage medium
CN108305074A (en) * 2018-01-30 2018-07-20 深圳壹账通智能科技有限公司 Transaction processing method, device, computer equipment and storage medium
JP2021511561A (en) * 2018-02-14 2021-05-06 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Asset management methods and equipment as well as electronic devices
US11270306B2 (en) 2018-02-14 2022-03-08 Advanced New Technologies Co., Ltd. Asset management method and apparatus, and electronic device
JP7111814B2 (en) 2018-02-14 2022-08-02 アドバンスド ニュー テクノロジーズ カンパニー リミテッド ASSET MANAGEMENT METHOD AND APPARATUS AND ELECTRONIC DEVICE
CN108428136A (en) * 2018-02-28 2018-08-21 武汉康慧然信息技术咨询有限公司 Electric vehicle information authentication method
CN108615195A (en) * 2018-04-28 2018-10-02 腾讯科技(深圳)有限公司 Transmission method and device, storage medium, the electronic device of resource transfers information
CN108615195B (en) * 2018-04-28 2021-12-07 腾讯科技(深圳)有限公司 Resource transfer information transmission method and device, storage medium and electronic device
CN110458709B (en) * 2018-04-28 2022-12-30 腾讯科技(深圳)有限公司 Resource transfer information transmission method and device, storage medium and electronic device
CN110458709A (en) * 2018-04-28 2019-11-15 腾讯科技(深圳)有限公司 Transmission method and device, storage medium, the electronic device of resource transfers information
CN108805538A (en) * 2018-06-14 2018-11-13 清华大学 A kind of digital cash method of commerce and device
CN109067709B (en) * 2018-07-06 2021-08-06 北京知道创宇信息技术股份有限公司 Vulnerability management method and device, electronic equipment and storage medium
CN109067709A (en) * 2018-07-06 2018-12-21 北京知道创宇信息技术有限公司 A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium
CN108854077A (en) * 2018-07-17 2018-11-23 广州瞪羚信息科技有限公司 Across game item circulation method based on block chain technology
CN108854077B (en) * 2018-07-17 2021-05-18 广州瞪羚信息科技有限公司 Cross-game item circulation method based on block chain technology
CN109102270A (en) * 2018-07-24 2018-12-28 深圳前海益链网络科技有限公司 Transaction verification method, computer equipment and the storage medium of block chain number Token
CN109104287A (en) * 2018-07-27 2018-12-28 众安信息技术服务有限公司 The method and apparatus communicated in block chain
CN109117651A (en) * 2018-07-27 2019-01-01 国网重庆市电力公司电力科学研究院 A kind of continuous data safety protecting method
CN109598147A (en) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 Data processing method and device based on block chain, electronic equipment
US11562375B2 (en) 2018-09-30 2023-01-24 Advanced New Technologies Co., Ltd. Blockchain-based data verification method, apparatus, and electronic device
CN109347632B (en) * 2018-10-23 2022-02-25 北京金山安全软件有限公司 Block chain ID generation and use method, device, electronic equipment and storage medium
CN109347632A (en) * 2018-10-23 2019-02-15 北京金山安全软件有限公司 Block chain ID generation and use method, device, electronic equipment and storage medium
CN109670826A (en) * 2018-11-29 2019-04-23 如般量子科技有限公司 Anti- quantum calculation block chain method of commerce based on unsymmetrical key pond
CN109615422A (en) * 2018-11-29 2019-04-12 哈希未来(北京)科技有限公司 Competing pumping method, system and storage medium based on block chain
CN109670826B (en) * 2018-11-29 2020-11-17 如般量子科技有限公司 Anti-quantum computation block chain transaction method based on asymmetric key pool
CN109670827B (en) * 2018-11-29 2020-11-17 如般量子科技有限公司 Anti-quantum computation blockchain transaction method based on symmetric key pool
CN109670827A (en) * 2018-11-29 2019-04-23 如般量子科技有限公司 Anti- quantum calculation block chain method of commerce based on pool of symmetric keys
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN109687970A (en) * 2018-12-07 2019-04-26 南京理工大学 A kind of mobile block chain Quan Jiedian and its implementation
CN113475037A (en) * 2018-12-10 2021-10-01 阿尔戈兰德公司 Implementing fair electronic switching using virtual blockchain protocol
CN109547461A (en) * 2018-12-13 2019-03-29 如般量子科技有限公司 Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys
WO2020140931A1 (en) * 2019-01-03 2020-07-09 菜鸟智能物流控股有限公司 Blockchain access control method and apparatus, and electronic device
CN109728906B (en) * 2019-01-11 2021-07-27 如般量子科技有限公司 Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool
CN109728906A (en) * 2019-01-11 2019-05-07 如般量子科技有限公司 Anti- quantum calculation asymmet-ric encryption method and system based on unsymmetrical key pond
CN109687965B (en) * 2019-02-18 2021-09-21 哈尔滨工业大学(深圳) Real-name authentication method for protecting user identity information in network
CN109687965A (en) * 2019-02-18 2019-04-26 哈尔滨工业大学(深圳) The real name identification method of subscriber identity information in a kind of protection network
CN110163604A (en) * 2019-04-29 2019-08-23 华中科技大学 A kind of block chain assets transfer method based on multi-party verification
CN110163604B (en) * 2019-04-29 2021-02-09 华中科技大学 Block chain asset transfer method based on multi-party verification
CN110336779A (en) * 2019-05-07 2019-10-15 弦子科技(北京)有限公司 A kind of construction method, device and the electronic equipment of block chain
CN110336779B (en) * 2019-05-07 2022-08-05 弦子科技(北京)有限公司 Block chain construction method and device and electronic equipment
CN110971413A (en) * 2019-06-20 2020-04-07 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and storage medium
CN110971413B (en) * 2019-06-20 2021-07-06 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and storage medium
CN112241514A (en) * 2019-07-19 2021-01-19 傲为信息技术(江苏)有限公司 Digital asset authentication processing platform and method
WO2021042685A1 (en) * 2019-09-05 2021-03-11 国网区块链科技(北京)有限公司 Transaction method, device, and system employing blockchain
CN110602083B (en) * 2019-09-10 2022-04-29 上海黔易数据科技有限公司 Secure transmission and storage method of digital identity authentication data
CN110602083A (en) * 2019-09-10 2019-12-20 上海黔易数据科技有限公司 Secure transmission and storage method of digital identity authentication data
CN110912702A (en) * 2019-10-25 2020-03-24 趣派(海南)信息科技有限公司 Block chain asset management method based on hidden social relationship
CN110912702B (en) * 2019-10-25 2022-05-10 趣派(海南)信息科技有限公司 Block chain asset management method based on hidden social relationship
CN111091380A (en) * 2019-10-25 2020-05-01 趣派(海南)信息科技有限公司 Block chain asset management method based on friend covert verification
CN111091380B (en) * 2019-10-25 2023-05-09 趣派(海南)信息科技有限公司 Block chain asset management method based on friend hidden verification
CN110955407A (en) * 2019-11-21 2020-04-03 杭州趣链科技有限公司 Random number taking method based on block chain
CN110955407B (en) * 2019-11-21 2022-04-01 杭州趣链科技有限公司 Random number taking method based on block chain
CN111314066B (en) * 2020-01-23 2022-02-11 腾讯科技(深圳)有限公司 Block chain-based data transfer method, terminal and computer-readable storage medium
CN111314066A (en) * 2020-01-23 2020-06-19 腾讯科技(深圳)有限公司 Block chain-based data transfer method, terminal and computer-readable storage medium
CN113034139A (en) * 2021-03-15 2021-06-25 中国人民大学 Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN113034139B (en) * 2021-03-15 2023-12-26 中国人民大学 Block chain multi-coin wallet based on living organism biological characteristic authentication and implementation method thereof
CN113076527B (en) * 2021-04-19 2023-04-07 支付宝(杭州)信息技术有限公司 Block chain-based digital asset processing method and device
CN113076527A (en) * 2021-04-19 2021-07-06 支付宝(杭州)信息技术有限公司 Block chain-based digital asset processing method and device
CN113190859A (en) * 2021-04-29 2021-07-30 湖北央中巨石信息技术有限公司 Data hierarchical encryption method based on block chain

Similar Documents

Publication Publication Date Title
CN106790253A (en) Authentication method and device based on block chain
AU2022224799B2 (en) Methods for secure cryptogram generation
CN106664206B (en) Efficient method for authenticated communication
CN109818741B (en) Decryption calculation method and device based on elliptic curve
CN111107066A (en) Sensitive data transmission method and system, electronic equipment and storage medium
CN107358441A (en) Method, system and the mobile device and safety certificate equipment of payment verification
CN111723387A (en) Block chain-based data decryption method and device
CN111191280A (en) Block chain transaction method based on encrypted data, electronic equipment and storage medium
CN107483199A (en) Information Authentication method and device
CN107743132A (en) The identification of Internet of Things trusted identity and control method based on id password
CN103888942B (en) Data processing method based on negotiation secret keys
CN108199847A (en) Security processing method, computer equipment and storage medium
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
EP2950229B1 (en) Method for facilitating transactions, computer program product and mobile device
CN109766716A (en) A kind of anonymous bidirectional authentication method based on trust computing
CN108365952A (en) A kind of method of registration, system and intelligent key safety equipment
CN113269570A (en) Extraction result verification method and related device
CN107278357B (en) Cryptographic system and method
CN103813321A (en) Agreement key based data processing method and mobile phone
CN110766400B (en) Transaction record processing method based on block chain, accounting node and medium
CN103888259B (en) A kind of subscriber identification card
CN113592484A (en) Account cubing method, system and device
CN112837064A (en) Signature method, signature verification method and device of alliance chain
CN107959670B (en) Dynamic password generation method and device, terminal equipment and storage medium
CN116188009A (en) National cipher soft encryption mode key acquisition method, system, terminal and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhang Yifeng

Inventor after: Xu Zhong

Inventor after: Yao Qian

Inventor before: Zhang Yifeng

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20171123

Address after: Hangzhou City, Zhejiang province 310013 Xihu District Lingyin ad tower Room 903

Applicant after: Zhongchao Credit Card Industry Development Co., Ltd. Hangzhou blockchain Technology Research Institute

Address before: 100088 floor 7, seat C, De Sheng International Center, No. 79, De Sheng door Avenue, Xicheng District, Beijing

Applicant before: Zhongchao Credit Card Industry Development Co., Ltd. Beijing smart card technology research institute

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531