A block chain transaction method based on multi-user CA digital certificate

A technology of digital certificates and transaction methods, applied in user identity/authority verification, digital transmission systems, data processing applications, etc., to achieve the effects of improving efficiency, shortening initiation time, and reducing burdens

Active Publication Date: 2022-04-15
中芯昊月(深圳)科技控股有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, for the same transaction, verifying multiple CAs will inevitably increase the complexity of the function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block chain transaction method based on multi-user CA digital certificate
  • A block chain transaction method based on multi-user CA digital certificate
  • A block chain transaction method based on multi-user CA digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solution of the present invention will be described in further non-limiting detail below in combination with preferred embodiments and accompanying drawings.

[0055] Such as figure 1 with figure 2 Shown, corresponding to a kind of blockchain transaction method based on multi-user CA digital certificate of the present invention, it comprises the following steps:

[0056] Step 1: Members of the user group participating in the transaction use their respective public keys and signatures to apply for a CA digital certificate to the CA server. After the review is passed, the CA server generates a multi-user CA digital certificate, including:

[0057] Step 1-A: Members of the user group participating in the transaction use the SM2 elliptic curve public key cryptography algorithm to generate public keys and private keys at their respective user nodes, and store them in their respective user nodes;

[0058] Step 1-B: Members of the user group entrust the author...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a blockchain transaction method based on multi-user CA digital certificates, which includes the following steps: Step 1: Members of the user group participating in the transaction apply for CA digital certificates from the CA server with their respective public keys and signatures, and after passing the review , the CA server generates a multi-user CA digital certificate; Step 2: User group members initiate a transaction request; Step 3: Verify whether the issuer of the multi-user CA digital certificate is qualified; Step 4: Confirm the transaction. A block chain transaction method based on a multi-user CA digital certificate of the present invention can effectively reduce the complexity in the multi-user transaction process and improve transmission efficiency and processing speed.

Description

technical field [0001] The invention relates to the technical field of block chain transactions, in particular to a block chain transaction method based on multi-user CA digital certificates. Background technique [0002] Blockchain is a distributed consensus network, which broadcasts transactions in network nodes through P2P, and makes transactions reach consensus in the blockchain network to maintain node ledger consistency, reliability and non-tamperable modification. [0003] For transactions in the blockchain, the authenticity verification of the source is a crucial link. In this process, the traditional method is to use an asymmetric key to create a signature for the transaction information using the private key of the transaction user node, and then send its own public key and signature information to the consensus node, and the consensus node verifies the information through the public key. integrity. This method can effectively guarantee the security and integrity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/30G06Q40/04
CPCH04L63/0823H04L63/0884H04L9/3268H04L9/3265H04L9/3247H04L9/3255H04L9/3066G06Q40/04
Inventor 邱望洁仇瑛姿
Owner 中芯昊月(深圳)科技控股有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products