Unlock instant, AI-driven research and patent intelligence for your innovation.

Proxy signature method, system and electronic equipment of a block chain

A proxy signature and blockchain technology, applied in the blockchain field, can solve problems such as frequent password input by users, achieve good security, improve user experience, and avoid disputes

Active Publication Date: 2022-03-11
杭州秘猿科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of this specification provides a block chain proxy signature method, system and electronic equipment, which are used to solve the problem that users need to frequently input passwords when signing for block chain applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy signature method, system and electronic equipment of a block chain
  • Proxy signature method, system and electronic equipment of a block chain
  • Proxy signature method, system and electronic equipment of a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] refer to figure 1 As shown, it is a schematic flowchart of a block chain proxy signature method provided by the embodiment of this application. The proxy signature method is used by the block chain application developer. As long as the user authorizes the application developer to use this method, the user will Capable of time-limited and password-free signatures, especially suitable for small-amount high-frequency trading scenarios. The proxy signing methods include:

[0030] Step 101: Receive the proxy signature information set by the user, and generate a new public-private key pair and proxy signature address based on the proxy signature information.

[0031] When using this method, the application will generate a brand new public-private key pair. The public-private key pair corresponds to a blockchain address, which is the proxy signature address (signature account), which is the address for the time-limited and confidentiality-free transaction with the user durin...

Embodiment 2

[0076] The embodiment of the present application also provides a block chain proxy signature system, refer to figure 2 As shown, the system includes:

[0077] Setting generation module 21: receive the proxy signature information set by the user, and generate a new public-private key pair and proxy signature address based on the proxy signature information; based on the user address, the proxy signature address, application address and the proxy signature information, generate The first transaction, requesting and obtaining the user's signature authorization for the first transaction to complete the setting of the proxy signature.

[0078] Signature call module 22: when the user requests to apply the proxy signature to execute the transaction, judge whether the information of this transaction matches the proxy signature information set by the user; if the judgment result is a match, then use the private key in the public and private keys, Sign and send the transaction to comp...

Embodiment 3

[0082] Refer below image 3 The electronic equipment of the embodiment of this specification is introduced in detail. Please refer to image 3 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a memory. Wherein, the memory may include a memory, such as a high-speed random-access memory (Random-Access Memory, RAM), and may also include a non-volatile memory (Non-Volatile Memory), such as at least one disk memory. Of course, the electronic device may also include hardware required by other services.

[0083] The processor, network interface, and memory may be interconnected via an internal bus, which may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, or an extended industry standard Structure (Extended Industry Standard Architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For convenience,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain proxy signature method, system and electronic equipment, including: receiving proxy signature information set by a user, and generating a new public-private key pair and proxy signature address; based on the user address, proxy signature address, and application address And the proxy signature information, generating the first transaction, requesting and obtaining the user’s signature authorization for the first transaction to complete the setting of the proxy signature; applying the proxy signature to execute the user’s transaction request. Therefore, in the process of signing blockchain applications, users can perform time-limited and password-free signatures, avoiding frequent input of passwords, thereby simplifying the cost of using the blockchain and improving the user experience.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a block chain proxy signature method, system and electronic equipment. Background technique [0002] In traditional online banking / third-party payment applications, due to the centralized storage of keys, developers can easily perform time-limited and limited-limit visa-free payments, thereby greatly improving user experience in small-amount, multi-frequency scenarios. Due to the unique technical characteristics of blockchain applications, users need to enter the password of the private key to sign the transaction every time they interact with the blockchain. Therefore, we need to constantly enter passwords when using blockchain applications, which greatly reduces the blockchain experience and cannot meet the requirements of commercial use. [0003] With the continuous development of blockchain applications and the enrichment of blockchain application scenarios, this proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829G06Q20/3825
Inventor 王晓亮陈迪波包俊王博
Owner 杭州秘猿科技有限公司