Block chain private transaction method, device and system based on trusted hardware

A blockchain and hardware technology, applied in the blockchain field, can solve problems such as low performance and complex transaction process, and achieve the effect of simple principle, privacy and security, and good performance.

Inactive Publication Date: 2020-07-21
苏州长通互联科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, Monero's private transaction scheme needs to check all transaction information during the transaction process, and it needs to be realized by ring signature. The entire transaction process is complicated and the performance is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain private transaction method, device and system based on trusted hardware
  • Block chain private transaction method, device and system based on trusted hardware
  • Block chain private transaction method, device and system based on trusted hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] refer to Figure 2a As shown, it is a schematic diagram of the steps of the trusted hardware-based blockchain privacy transaction method provided by the embodiment of this specification. The method may include the following steps:

[0051] Step 210: The block chain receives the transaction information sent by the first account terminal, wherein the transaction information carries at least a transaction amount, and the transaction amount is encrypted based on a public key published by trusted hardware.

[0052] Step 220: The block chain sends the account information related to the transaction information stored in itself and the received transaction information to the trusted hardware.

[0053] Step 230: The trusted hardware decrypts the transaction amount based on the private key in the asymmetric key pair issued by the third-party terminal, and uploads the transaction result to the blockchain.

[0054] Optionally, the step 230 may be specifically performed as:

[005...

Embodiment 2

[0129] still refer to figure 1 As shown, the trusted hardware-based blockchain privacy transaction system provided by the embodiment of this specification, the privacy transaction system 100 may include: a blockchain 110, trusted hardware 120, a third-party terminal 130, and the first an account terminal 140 and a second account terminal 150;

[0130] Wherein, the block chain 110 receives the transaction information sent by the first account terminal 140, wherein the transaction information carries at least a transaction amount, and the transaction amount is encrypted based on the public key disclosed by the trusted hardware 120;

[0131] And, send the account information related to the transaction information stored by itself, and the received transaction information, to the trusted hardware 120;

[0132] The trusted hardware 120 decrypts the transaction amount based on the private key in the asymmetric key pair issued by the third-party terminal 130 , and uploads the transa...

Embodiment 3

[0149] Refer below Figure 8 The electronic equipment of the embodiment of this specification is introduced in detail. Please refer to Figure 8 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a memory. Wherein, the memory may include a memory, such as a high-speed random-access memory (Random-Access Memory, RAM), and may also include a non-volatile memory (Non-Volatile Memory), such as at least one disk memory. Of course, the electronic device may also include hardware required by other services.

[0150] The processor, network interface, and memory can be interconnected by an internal bus, which can be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, or an extended industry standard Structure (Extended Industry Standard Architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For convenience...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a block chain private transaction method, device and system based on trusted hardware. The method comprises the steps that a block chain receives transaction information whichis sent by a first account terminal and at least carries a transaction amount, sends self-stored account information related to the transaction information and the received transaction information to the trusted hardware, the trusted hardware decrypts the transaction amount based on the private key in the asymmetric key pair issued by the third-party terminal, and uploads the transaction resultto the block chain, wherein the asymmetric key is issued to the trusted hardware by the third-party terminal; a public key is disclosed by trusted hardware; therefore, the first account terminal initiating the transaction can encrypt the transaction amount based on the public key disclosed by the trusted hardware; thus, only the trusted hardware and the third-party terminal know the asymmetric key, so that the purpose of encrypting the information encrypted by the public key based on the private key is achieved, enough privacy can be achieved, and a third-party query function can also be achieved.

Description

technical field [0001] The embodiments of this specification relate to the technical field of blockchain, and in particular to a trusted hardware-based blockchain private transaction method, device and system. Background technique [0002] With the development of blockchain technology, the privacy of transactions has received widespread attention from all walks of life. In order to improve transaction security and privacy, digital currencies such as Monero and Zcash, which focus on private transactions, have been launched. In addition, in the private transaction scenarios using blockchain technology, such as OTC transactions in the securities market, in addition to requiring the privacy of both parties to the transaction, it also needs to meet the requirements that third parties can query. At present, Monero's private transaction scheme needs to check all transaction information during the transaction process, and it needs to be realized by ring signature. The entire transa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/38G06F21/62G06F21/60
CPCG06F21/602G06F21/6245G06Q20/3829G06Q40/04
Inventor 不公告发明人
Owner 苏州长通互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products