Proxy signature method, system and electronic equipment of a block chain
A proxy signature and blockchain technology, applied in the blockchain field, can solve problems such as frequent password input by users, achieve good security, improve user experience, and avoid disputes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] refer to figure 1 As shown, it is a schematic flowchart of a block chain proxy signature method provided by the embodiment of this application. The proxy signature method is used by the block chain application developer. As long as the user authorizes the application developer to use this method, the user will Capable of time-limited and password-free signatures, especially suitable for small-amount high-frequency trading scenarios. The proxy signing methods include:
[0030] Step 101: Receive the proxy signature information set by the user, and generate a new public-private key pair and proxy signature address based on the proxy signature information.
[0031] When using this method, the application will generate a brand new public-private key pair. The public-private key pair corresponds to a blockchain address, which is the proxy signature address (signature account), which is the address for the time-limited and confidentiality-free transaction with the user durin...
Embodiment 2
[0076] The embodiment of the present application also provides a block chain proxy signature system, refer to figure 2 As shown, the system includes:
[0077] Setting generation module 21: receive the proxy signature information set by the user, and generate a new public-private key pair and proxy signature address based on the proxy signature information; based on the user address, the proxy signature address, application address and the proxy signature information, generate The first transaction, requesting and obtaining the user's signature authorization for the first transaction to complete the setting of the proxy signature.
[0078] Signature call module 22: when the user requests to apply the proxy signature to execute the transaction, judge whether the information of this transaction matches the proxy signature information set by the user; if the judgment result is a match, then use the private key in the public and private keys, Sign and send the transaction to comp...
Embodiment 3
[0082] Refer below image 3 The electronic equipment of the embodiment of this specification is introduced in detail. Please refer to image 3 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a memory. Wherein, the memory may include a memory, such as a high-speed random-access memory (Random-Access Memory, RAM), and may also include a non-volatile memory (Non-Volatile Memory), such as at least one disk memory. Of course, the electronic device may also include hardware required by other services.
[0083] The processor, network interface, and memory may be interconnected via an internal bus, which may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, or an extended industry standard Structure (Extended Industry Standard Architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For convenience,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


