Digital currency encryption payment method and system
A digital currency and payment request technology, applied in the blockchain field, can solve problems such as the inability to transfer funds and establish a chain of trust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] A digital currency encrypted payment method, such as figure 1 The overall flow chart is shown, which specifically includes the following steps:
[0077] Step1: Build a blockchain network for digital currency encrypted payment:
[0078] Set the user client, including the first client and the second client, associate the first client to deploy a trusted node, associate the second client to deploy a verification node, and create an associated distributed ledger for the client in turn; Build an SGX trusted execution environment in the server to run trusted nodes and verification nodes;
[0079] Step2: The trusted node generates a public key and performs a ring signature on the transaction request transaction:
[0080] In response to the first client's transaction payment request, the trusted node creates a transaction request transaction, uses the second client's public key and any random number generated by the first client to calculate and generate a public key, and bas...
Embodiment 2
[0096] In response to the transaction payment request of the first client, the trusted node obtains the public key pair of the second client and generates a random number, uses Diffie-Hellman to calculate the shared key, and further uses the CryptoNote algorithm to generate a public key, and the shared key is published Key and transaction amount create a transaction request transaction;
[0097] Among them, the public key and the transaction amount are used as the transaction output. The sender is associated with the first client, and the receiver is associated with the second client. The two elliptic curve public key pairs derived from the key pair serve as the corresponding client's public key pair. The unique key pair is kept by itself, and the public key pair is included in the account address to which it belongs and broadcast and stored on the chain.
[0098] In this embodiment, it is assumed that the sender is Alice and the receiver is Bob, wherein Alice’s private key i...
Embodiment 3
[0131] A digital currency encryption payment system, including a response calculation module, a ring signature module, a decryption acquisition module and an analysis acquisition module;
[0132] Among them, the response calculation module is placed at the business end of the system and is used to respond to the transaction payment request of the first client. The trusted node generates a random number and a public key, and calculates the first client and the second client based on the random number derived Diffie-Hellman parameters. The shared key of the two clients, and create a transaction request transaction from the public key and the transaction amount, wherein the public key is combined with a random number to generate a public key;
[0133] After the calculation of the response calculation module, the generated shared key is input into the ring signature module. In the ring signature module, the trusted node performs ring signature on the transaction request transaction b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com