TWI695614B - Method for digital currency transaction with authorization of multiple private key - Google Patents
Method for digital currency transaction with authorization of multiple private key Download PDFInfo
- Publication number
- TWI695614B TWI695614B TW108108536A TW108108536A TWI695614B TW I695614 B TWI695614 B TW I695614B TW 108108536 A TW108108536 A TW 108108536A TW 108108536 A TW108108536 A TW 108108536A TW I695614 B TWI695614 B TW I695614B
- Authority
- TW
- Taiwan
- Prior art keywords
- terminal
- public key
- key
- transaction
- digital currency
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000013475 authorization Methods 0.000 title claims 3
- 238000012546 transfer Methods 0.000 claims abstract description 42
- 238000012795 verification Methods 0.000 claims abstract description 32
- 238000010586 diagram Methods 0.000 description 12
- 238000012545 processing Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008014 freezing Effects 0.000 description 2
- 238000007710 freezing Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
本發明有關於一種能降低數位資產被竊取的數位貨幣交易方法,特別是一種要取得兩個以上的電子簽章才能轉移數位貨幣的數位貨幣交易方法。The present invention relates to a digital currency transaction method that can reduce the theft of digital assets, in particular to a digital currency transaction method that requires more than two electronic signatures to transfer digital currency.
隨著科技的進步,許多的交易及支付方式已漸由積體電路(Integrated Circuit, IC)卡所取代,IC卡內部設置的記憶體能儲存持卡者的資訊,進而被廣泛地運用於各場合中,像是提款卡、金融卡、信用卡、電話卡、儲值卡等皆為目前常見的IC卡,而一般所使用的IC卡依據存、讀取資料的方式大致可分為接觸式介面、非接觸式介面以及複合式介面三種。With the advancement of technology, many transaction and payment methods have been gradually replaced by integrated circuit (IC) cards. The internal memory of the IC card can store cardholder information, which is widely used in various occasions. Among them, such as withdrawal cards, financial cards, credit cards, telephone cards, stored value cards, etc. are currently common IC cards, and generally used IC cards can be roughly divided into contact interfaces, according to the method of storing and reading data. There are three types of non-contact interface and composite interface.
以具備信用卡與提款卡功能的金融卡為例,當要使用金融卡透過自動櫃員機進行交易或服務前,自動櫃員機需要持卡者輸入預先設定的密碼來用以取得使用該金融卡的權利,因此,即使金融卡遺失或被竊取,非原持卡者因為不知道預先設定的密碼而無法透過自動櫃員機盜取現金,但是,自動櫃員機僅是依據預先設定的密碼來判定是否要進行現金出款,而自動櫃員機無法判並該金融卡是否為正確的原持卡者,進而非原持卡者知道預先設定的密碼,則自動櫃員機依然會進行現金出款以讓非原持卡者盜取現金,並且,當持卡者使用金融卡進行消費時,持卡者會被要求在交易單據上簽屬持卡者的姓名,進而當金融卡遺失或被竊取,則容易被非原持卡偽簽或盜刷而造成財物損失。Taking a financial card with credit card and debit card functions as an example, before using a financial card to conduct transactions or services through an ATM, the ATM requires the cardholder to enter a preset password to obtain the right to use the financial card. Therefore, even if the financial card is lost or stolen, the non-original cardholder cannot steal cash through the ATM because he does not know the preset password. However, the ATM only determines whether to withdraw cash based on the preset password , And the ATM cannot determine whether the financial card is the correct original cardholder, and the non-original cardholder knows the preset password, the ATM will still make cash withdrawals to allow the non-original cardholder to steal cash And, when the cardholder uses the financial card for consumption, the cardholder will be required to sign the name of the cardholder on the transaction document, and then when the financial card is lost or stolen, it is easy to be counterfeited by the non-original cardholder Or stolen and caused property damage.
另外,隨著無線傳輸的技術日新月異,一部份IC採用無線射頻(RFID/Radio-frequency identification)的無線傳輸技術,而這種無線射頻技術最常被應用在金額較少的消費交易上,例如搭乘公車、捷運等大眾運輸工具,然而,這種小額消費為了追求速度以及便利性,在交易的同時不會被要求輸入密碼或是簽屬持卡者的姓名,因此,只要運用無線感應來進行消費的IC卡遺失或被竊取,拾取IC卡的非原持卡者就能直接進行消費交易,直到該IC卡被停用或者是內部儲存的金額被消費殆盡。In addition, with the rapid development of wireless transmission technology, some ICs use wireless radio frequency (RFID/Radio-frequency identification) wireless transmission technology, and this wireless radio frequency technology is most commonly used in consumer transactions with small amounts, such as Taking public transportation such as bus and MRT, however, in order to pursue speed and convenience, this small amount of consumption will not be required to enter a password or sign the name of the cardholder during the transaction, so as long as wireless sensing is used If the IC card used for consumption is lost or stolen, the non-original cardholder who picked up the IC card can directly proceed with the transaction until the IC card is deactivated or the internally stored amount is consumed.
再者,用於門禁系統的IC卡,為了速度與便利性,通常只要持有正確的IC卡就能順利地進出有門禁管制的地區,因此,當用於門禁系統的IC遺失或被竊取時,拾取IC卡的非原持卡者也就能直接透過所拾取的IC卡進出門禁管制地區。In addition, for the speed and convenience of IC cards used in the access control system, as long as the correct IC card is held, they can smoothly enter and exit the area with access control. Therefore, when the IC used in the access control system is lost or stolen Non-original cardholders who pick up IC cards can also directly enter and exit access control areas through the picked up IC cards.
由前述說明可知,目前常見的IC卡只要遺失被非原持卡者所拾取,非原持卡者就能透過所拾取的IC卡盜取數位資產,進而造成原持卡者財務上的損失。As can be seen from the foregoing description, as long as the current common IC card is lost and picked up by the non-original card holder, the non-original card holder can steal digital assets through the picked up IC card, thereby causing financial loss to the original card holder.
本發明的主要目的在於必須要取得兩個以上的電子簽章才能轉移數位貨幣,進而即使盜取者竊取到其中一個密鑰,盜取者依然無法經由竊取到的密鑰而轉移數位貨幣,致使能避免數位貨幣被盜取者竊取。The main purpose of the present invention is that it is necessary to obtain more than two electronic signatures to transfer digital currency, and then even if a stolen person steals one of the keys, the stolen person still cannot transfer the digital currency through the stolen key, resulting in It can prevent digital currency from being stolen.
為實現前述目的,本發明有關於一種多重密鑰授權的數位貨幣交易方法,包含以下步驟:一公密鑰建立步驟:提供一表示用戶身分的用戶資訊,而一第一終端、一第二終端以及一第三終端三者分別形成對應於上述用戶資料的一組公鑰的密鑰,使得上述第一終端具有一第一密鑰與一第一公鑰、而上述第二終端一第二密鑰與一第二公鑰,則上述第三終端具有一第三密鑰與一第三公鑰;一交易公鑰建立步驟:上述第一終端、第二終端與第三終端三者取得一透過上述第一公鑰、第二公鑰與第三公鑰結合產生的交易公鑰,上述交易公鑰能依據一對應於上述第一密鑰的第一電子簽章、一對應於上述第二密鑰的第二電子簽章與一對應於上述第三密鑰的第三電子簽章三者的其中兩者以上來授權轉移數位貨幣;一檢驗密鑰步驟:提供一具有用戶個資的核對資訊,並核對上述核對資訊符合於上述用戶資訊,當上述核對資訊相符於上述用戶資訊時,上述第一終端、第二終端與第三終端三者其中之一具有上述第一電子簽章、第二電子簽章與第三電子簽章三者之其中兩者以上;以及一貨幣轉移步驟:形成一交易資訊,而上述第一電子簽章、第二電子簽章與第三電子簽章三者之其中兩者以上能授權上述交易公鑰依循上述交易資訊轉移上述交易公鑰的數位貨幣。In order to achieve the aforementioned object, the present invention relates to a multi-key authorized digital currency transaction method, which includes the following steps: a public key establishment step: providing user information indicating the identity of the user, and a first terminal and a second terminal And a third terminal respectively form a key corresponding to a set of public keys of the user profile, so that the first terminal has a first key and a first public key, and the second terminal has a second secret Key and a second public key, the third terminal has a third key and a third public key; a transaction public key creation step: the first terminal, the second terminal, and the third terminal obtain a pass The transaction public key generated by the combination of the first public key, the second public key, and the third public key, the transaction public key can be based on a first electronic signature corresponding to the first key, and a corresponding second secret Two or more of the second electronic signature of the key and a third electronic signature corresponding to the above-mentioned third key to authorize the transfer of digital currency; a key verification step: provide verification information with user's personal data , And verify that the verification information is consistent with the user information. When the verification information matches the user information, one of the first terminal, the second terminal, and the third terminal has the first electronic signature, the second Two or more of the electronic signature and the third electronic signature; and a currency transfer step: forming a transaction information, and the first electronic signature, the second electronic signature and the third electronic signature of the above three Two or more of them can authorize the transaction public key to transfer the digital currency of the transaction public key according to the transaction information.
於一較佳實施例中,於上述公密鑰建立步驟中,將上述用戶資訊傳遞至上述第一終端、第二終端與第三終端,而上述第一終端、第二終端與第三終端三者於接收到上述用戶資訊之後,上述第一終端、第二終端與第三終端各自形成上述一組公鑰與密鑰。In a preferred embodiment, in the public key establishment step, the user information is transferred to the first terminal, the second terminal, and the third terminal, and the first terminal, the second terminal, and the third terminal are After receiving the user information, the first terminal, the second terminal, and the third terminal each form the set of public keys and keys.
然而,於上述交易公鑰建立步驟中,上述第一終端取得上述第二公鑰與第三公鑰,使得上述第一終端具有上述第一公鑰與第二公鑰與第三公鑰,而上述第一終端將上述第一公鑰、第二公鑰與第三公鑰結合產生上述交易公鑰,並將上述交易公鑰傳遞至上述第二終端與第三終端。However, in the step of establishing the transaction public key, the first terminal obtains the second public key and the third public key, so that the first terminal has the first public key, the second public key, and the third public key, and The first terminal combines the first public key, the second public key, and the third public key to generate the transaction public key, and transmits the transaction public key to the second terminal and the third terminal.
於另一較佳實施例中,於上述公密鑰建立步驟中,上述第一終端、第二終端以及第三終端三者分別具有至少一組沒有經過設定的初始公密鑰,而上述初始公密鑰依據上述用戶資訊而設定轉換為上述公鑰與密鑰。In another preferred embodiment, in the public key establishment step, the first terminal, the second terminal, and the third terminal each have at least one set of initial public keys that have not been set, and the initial public key The key is set to be converted into the public key and key according to the user information.
然而,於上述交易公鑰建立步驟中,上述第一終端、第二終端與第三終端各自取得上述第一公鑰、第二公鑰與第三公鑰,而上述第一終端、第二終端與第三終端分別將上述第一公鑰、第二公鑰與第三公鑰結合形成上述交易公鑰。However, in the step of establishing the transaction public key, the first terminal, the second terminal, and the third terminal each obtain the first public key, the second public key, and the third public key, while the first terminal, the second terminal Combine the first public key, the second public key, and the third public key with the third terminal to form the transaction public key.
於前述兩實施例中,上述多重密鑰授權的數位貨幣交易方法進一步包含:一公密鑰再建立步驟:上述第一終端、第二終端以及第三終端三者其中之一形成對應於上述用戶資訊的一第四密鑰與一第四公鑰;一替換步驟:將上述第一公鑰、第二公鑰以及第三公鑰三者其中之二與上述第四公鑰結合形成一用以託管上述交易公鑰的重製交易公鑰,並將上述交易公鑰的數位貨幣轉移到上述重製交易公鑰。In the foregoing two embodiments, the multi-key authorized digital currency transaction method further includes: a public key re-establishment step: one of the first terminal, the second terminal, and the third terminal is formed to correspond to the user A fourth key and a fourth public key of information; a replacement step: combining two of the first public key, the second public key and the third public key with the fourth public key to form a Manage the reworked transaction public key of the above transaction public key, and transfer the digital currency of the above transaction public key to the above reworked transaction public key.
由以上說明可知,本發明的特點在於第一終端、第二終端與第三終端三者各別有一個密鑰與一個公鑰,而全部的公鑰結合形成交易公鑰,則交易公鑰需要兩個以上的電子簽章才能轉移數位貨幣,藉此,當數位貨幣鑰要進行轉移時,必須先從至少兩個終端取得電子簽章才能轉移數位貨幣,進而即使盜取者竊取到其中一個密鑰,盜取者依然無法經由竊取到的密鑰而轉移數位貨幣,致使能避免數位貨幣被盜取者竊取。As can be seen from the above description, the present invention is characterized in that each of the first terminal, the second terminal, and the third terminal has a key and a public key, and all public keys are combined to form a transaction public key. Only two or more electronic signatures can transfer digital currency. Therefore, when the digital currency key is to be transferred, the electronic signature must be obtained from at least two terminals before the digital currency can be transferred, so that even if the thief steals one of the secrets The key, the stolen person still cannot transfer the digital currency through the stolen key, so that the digital currency can be prevented from being stolen by the stolen person.
茲為便於更進一步對本發明之構造、使用及其特徵有更深一層明確、詳實的認識與瞭解,爰舉出較佳實施例,配合圖式詳細說明如下:In order to facilitate a deeper and more clear and detailed understanding and understanding of the structure, use and characteristics of the present invention, the preferred embodiment is cited, and the detailed description in conjunction with the drawings is as follows:
請參閱圖1與圖2所示,於第一較佳實施例中,本發明數位貨幣交易方法1配合一數位貨幣交易系統2進行使用,如圖2所示,數位貨幣交易系統2具有一第一終端20、一第二終端21以及一第三終端22,第一終端20設為供用戶使用的手機、電腦或平板,而第二終端21設為能管理公鑰的託管單位,則第三終端22設為能管理公鑰的信託單位,然而,第一終端20設為手機、電腦或平板、第二終端21設為託管單位以及第三終端22設為信託單位僅方便說明之用,亦即第一終端20可設為託管單位、而第二終端21可設為信託單位,則第三終端22可設為手機、電腦或平板。Please refer to FIGS. 1 and 2. In the first preferred embodiment, the digital
於此實施例中,設為手機、電腦或平板的第一終端20能主動網路連接於一網際網路23,而網際網路23同時連線於第二終端21、第三終端22以及一交易區塊鏈24,使得全部的第一終端20都能經由網際網路23而連接於第二終端21、第三終端22以及交易區塊鏈24。In this embodiment, the
設為託管單位的第二終端21具有一用以儲存資訊內容的核對資料庫211,並能提供一儲存載具25,另外,設為信託單位的第三終端22具有一用以儲存資訊內容的比對資料庫221,則交易區塊鏈24存有複數個不同用戶的公鑰,其中,每一個公鑰具有數位貨幣與交易地址,於此實施例中,儲存載具25不能直接主動連接於網際網路23,但每一個儲存載具25能一對一選擇性連線或斷線於複數個第一終端20其中之一,而當儲存載具25連線於第一終端20時,儲存載具25能經由電子裝置而連線於網際網路23,其中,儲存載具25設有一能處理資訊的微處理器251、一能儲存資訊的記憶體252以及一儲存重要資訊的安全晶片253,而記憶體252、安全晶片253兩者皆電性連接於微處理器251,其中,安全晶片253具有一能處理資訊的處理單元253a,並於此實施例中,儲存載具25設為一積體電路(Integrated Circuit, IC)卡。The
請參閱圖1與圖3A所示,於具體應用時,首先進行一公密鑰建立步驟10,用戶對第一終端20輸入一表示用戶身分的用戶資訊,而第一終端20將上述用戶資訊傳遞至第二終端21,使得第二終端21依據上述用戶資訊建立一儲存於第二終端21的用戶資料庫212,並將上述用戶資訊儲存於核對資料庫211,進而第二終端21再依據用戶資料庫212建立一用以授權數位貨幣進行轉移的第二密鑰以及一對應於第二密鑰的第二公鑰。Please refer to FIG. 1 and FIG. 3A. In a specific application, a public
請參閱圖3B所示,第二終端21將上述第二密鑰儲存於用戶資料庫212,並將上述用戶資訊與第二公鑰傳遞至第三終端22,而第三終端22將上述用戶資訊儲存於比對資料庫221,並依據上述用戶資訊與第二公鑰建立一用以授權數位貨幣進行轉移的第三密鑰以及一對應於第三密鑰的第三公鑰,其中,第三終端22儲存第三密鑰,並用以管理第三密鑰。Referring to FIG. 3B, the
請參閱圖3C所示,隨後,第三終端22將上述第二公鑰與第三公鑰傳遞至第二終端21,而第二終端21將上述第二公鑰與第三公鑰儲存於儲存載具25的記憶體252,並將具有上述第二公鑰與第三公鑰的儲存載具25提供給用戶,接下來,第一終端20於用戶取得儲存載具25之後依據上述用戶資訊而建立一用以授權數位貨幣進行轉移的第一密鑰以及一對應於第一密鑰的第一公鑰,其中,第一終端20將上述第一密鑰傳遞至儲存載具25,使儲存載具25的安全晶片253儲存上述第一密鑰,另外,第一終端20再將上述第一公鑰傳遞至儲存載具25、第二終端21與第三終端22,使得儲存載具25的記憶體252、第二終端21的用戶資料庫212以及第三終端22三者都儲存上述第一公鑰,藉此,即完成公密鑰建立步驟10。Please refer to FIG. 3C. Then, the
請參閱圖1與圖4所示,接下來進行一交易公鑰建立步驟11,當儲存載具25的記憶體252存有上述第一公鑰、第二公鑰與第三公鑰時,儲存載具25的微處理器251將上述第一公鑰、第二公鑰與第三公鑰結合形成一具有數位貨幣的交易公鑰,並且,微處理器251將上述交易公鑰設定為需要至少兩個對應於密鑰的電子簽章才能轉移數位貨幣的交易模式,隨後,微處理器251將呈現交易模式的上述交易公鑰傳遞至第一終端20,而第一終端20再將上述交易公鑰傳遞至第二終端21、第三終端22與交易區塊鏈24,讓第一終端20、第二終端21、第三終端22與交易區塊鏈24四者都能存有交易公鑰。Please refer to FIGS. 1 and 4. Next, a transaction public
請參閱圖1與圖5所示,當用戶欲要轉移數位貨幣時,第一終端20接收一由用戶輸入形成具有用戶個資的核對資訊,而第一終端20將上述核對資訊傳遞至第二終端21,當第二終端21接收到上述核對資訊時,第二終端21會確認上述核對資訊是否相符儲存於核對資料庫211的用戶資訊,當第二終端21確認核對資訊的資訊內容符合於用戶資訊的資訊內容時,第二終端21會將上述第二密鑰進行轉換以形成一傳遞至第一終端20的第二電子簽章,當第一終端20接收到上述第二電子簽章,第一終端20會要求儲存載具25使用上述第一密鑰,讓儲存載具25的微處理器251從儲存載具25的記憶體252取得上述第一密鑰,並將上述第一密鑰進行轉換以形成一傳遞至第一終端20的第一電子簽章,使得第一終端20同時具有上述第一電子簽章與第二電子簽章,藉此,即完成一檢驗密鑰步驟12。Please refer to FIG. 1 and FIG. 5, when the user wants to transfer digital currency, the
請參閱圖1與圖6所示,最後進行一貨幣轉移步驟13,用戶經由第一終端20形成一包含交易地址與交易金額的交易資訊,而第一終端20將上述第一電子簽章、第二電子簽章與交易資訊形成一授權交易資訊,並將上述授權交易資訊傳遞至交易區塊鏈24,使得交易區塊鏈24會對上述第一、二電子簽章進行驗證以確認上述第一、二密鑰兩者的正確性,進而交易區塊鏈24就能依據上述授權交易資訊的資訊內容將上述交易公鑰的數位貨幣進行轉移。Please refer to FIGS. 1 and 6. Finally, a
請參閱圖7與圖8,於第二較佳實施例中,本發明數位貨幣交易方法1同樣具有公密鑰建立步驟10、交易公鑰建立步驟11、檢驗密鑰步驟12以及貨幣轉移步驟13,而與第一較佳實施例差別在於公密鑰建立步驟10以及交易公鑰建立步驟11,至於檢驗密鑰步驟12以及貨幣轉移步驟13兩者的步驟流程皆相同於第一較佳實施例,進而不再重複描述。7 and 8, in the second preferred embodiment, the digital
如圖7所示,設為手機、電腦或平板的第一終端20本身內存有至少一組未經設定的第一初始公密鑰,而設為托管單位的第二終端21本身內存有至少一組未經設定的第二初始公密鑰,而設為信託單位的第三終端22本身內存有至少一組未經設定的第三初始公密鑰,其中,當第一、二、三終端20、21、22分別接收到上述用戶資訊時,第一終端20能將其中一個上述第一初始公密鑰依據上述用戶資訊進行設定,使得上述第一初始公密鑰轉換為上述第一公鑰與第一密鑰,而第二終端21也將其中一個上述第二初始公密鑰依據上述用戶資訊進行設定,使得上述第二初始公密鑰轉換為上述第二公鑰與第二密鑰,同樣地,第三終端22將其中一個上述第三初始公鑰依據上述用戶資訊進行設定,使得上述第三初始公密鑰轉換為上述第三公鑰與第三密鑰,藉此即完成公密鑰建立步驟10。As shown in FIG. 7, the
如圖8所示,當第一終端20形成上述第一公鑰時,第一終端20將上述第一公鑰傳遞至第二終端21與第三終端22,而當第二終端21形成上述第二公鑰時,第二終端21將上述第二公鑰傳遞至第一終端20與第三終端22,並且,第三終端22於形成上述第三公鑰之後,第三終端22將上述第三公鑰傳遞第一終端20與第二終端21,進而讓第一、二、三終端20、21、22分別都具有上述第一公鑰、第二公鑰與第三公鑰時,第一、二、三終端20、21、22會各自將上述第一公鑰、第二公鑰與第三公鑰相互結合以形成上述交易公鑰,而當第一、二、三終端20、21、22都具有上述交易公鑰時即完成交易公鑰建立步驟11。As shown in FIG. 8, when the
請參閱圖9與圖10所示,於第三較佳實施例中,與第一較佳實施例差別在於檢驗密鑰步驟12以及貨幣轉移步驟13,如圖9所示,當發現不明來源的數位資產轉移到交易公鑰時,設為托管單位的第二終端21將儲存於核對資料庫211的上述用戶資訊傳遞至設為信託單位的第三終端22,第三終端22核對儲存於核對資料庫211的上述用戶資訊符合於比對資料庫221的上述用戶資訊之後,第三終端22將第三密鑰進行轉換以形成一傳遞至第二終端21的第三電子簽章,使得第二終端21同時具有上述第二密鑰與第三電子簽章,藉此,即完成檢驗密鑰步驟12。Please refer to FIGS. 9 and 10. In the third preferred embodiment, the difference from the first preferred embodiment is the
請參閱圖10所示,於進行貨幣轉移步驟13時,設為托管單位的第二終端21形成一凍結數位貨幣進行流動的凍結資訊,並再將上述第二密鑰進行以形成一第二電子簽章,而第二終端21將上述第二電子簽章、第三電子簽章與凍結資訊形成限制交易資訊,並將上述限制交易資訊傳遞至交易區塊鏈24,使得交易區塊鏈24會對上述第二、三電子簽章進行轉換以得知上述第二、三密鑰兩者的資訊內容,進而交易區塊鏈24就能依據上述限制交易資訊而將不再提供上述交易公鑰,並再將上述交易公鑰的數位貨幣轉移至一凍結帳戶,讓上述交易公鑰的數位貨幣不會被竊取人士轉走以降低財物損失的風險。As shown in FIG. 10, when performing the
請參閱圖11所示,於第四較佳實施例中,與第一較佳實施例差別在於數位貨幣交易方法1進一步具有一公密鑰再建立步驟14以及一替換步驟15,請參閱圖11與圖12所示,完成交易公鑰建立步驟11之後,除了能進行檢驗密鑰步驟12之後,還能進行公密鑰再建立步驟14,如圖所示,當用戶遺忘第一密鑰時,用戶對第一終端20輸入上述用戶資訊,使第一終端20依據上述用戶資訊建立一不同於上述第一密鑰的第四密鑰與一對應於上述第四密鑰的第四公鑰,而第一終端20會進一步將上述第四公鑰傳遞至儲存載具25,使得儲存載具25的記憶體252移除上述第一公鑰,並儲存上述第四公鑰,藉以完成公密鑰再建立步驟14。Please refer to FIG. 11. In the fourth preferred embodiment, the difference from the first preferred embodiment is that the digital
然而,第一終端20依據上述用戶資訊產生上述第四密鑰與第四公鑰僅方便說明之用,亦即若設為託管單位的第二終端21遺失上述第二密鑰或是設為信託單位的第三終端22遺失上述第三密鑰時,第二終端21與第三終端22亦能依據上述用戶資訊形成上述第四密鑰與第四公鑰,其中,當第二終端21形成上述第四公鑰時,第二終端21會進一步移除上述第二公鑰,反之,當第三終端22形成上述第四公鑰時,第三終端22會進一步移除上述第三公鑰。However, the
請參閱圖11與圖13所示,當完成公密鑰再建立步驟14時,儲存載具25的記憶體252具有上述第二公鑰、第三公鑰與第四公鑰,並且,儲存載具25的微處理器251將將上述第二公鑰、第三公鑰與第四公鑰結合形成一重製交易公鑰,並且,微處理器251將上述重製交易公鑰設定為需要至少兩個對應於密鑰的電子簽章才能轉移數位貨幣的交易模式,隨後,微處理器251將呈現交易模式的上述重製交易公鑰傳遞至第一終端20,而第一終端20再將上述重製交易公鑰傳遞至第二終端21、第三終端22與交易區塊鏈24,讓第一終端20、第二終端21、第三終端22與交易區塊鏈24四者都能存有重製交易公鑰。Please refer to FIG. 11 and FIG. 13, when the public
請參圖14所示,第一終端20接受由用戶輸入形成的上述核對資訊,而第一終端20將上述核對資訊傳遞至第二終端21與第三終端22,而當第二、三終端21、22接收到上述核對資訊時,第二終端21會確認上述核對資訊是否相符儲存於核對資料庫211的用戶資訊,而第三終端22會確認上述核對資訊是否相符儲存於比對資料庫221的用戶資訊,而當第二、三終端21、22都確認核對資訊的資訊內容符合於用戶資訊的資訊內容時,第二終端21會將上述第二密鑰進行轉換以形成上述第二電子簽章,並將上述第二電子簽章傳遞至第一終端20,而第三終端22會將上述第三密鑰進行轉換以形成上述第三電子簽章,並將上述第三電子簽章傳遞至第一終端20,第一終端20將上述第二、三電子簽章傳遞至交易區塊鏈24,而交易區塊鏈24會對上述第二、三電子簽章進行驗證以得知上述第二、三密鑰兩者的授權內容,進而交易區塊鏈24就能將上述交易公鑰的數位貨幣轉移到上述重製交易公鑰以完成替換步驟15。Referring to FIG. 14, the
上述所舉實施例,僅用為方便說明本發明並非加以限制,在不離本發明的創作範疇,熟悉此一行業技藝人士依本發明申請專利範圍及發明說明所作之各種簡易變形與修飾,均仍應含括於以下申請專利範圍中。The above-mentioned embodiments are only for the convenience of describing the present invention, not to limit it. Without departing from the creative scope of the present invention, those skilled in the art who are familiar with this industry and applying the patent scope of the present invention and various simple modifications and modifications made by the invention description are still It should be included in the following patent applications.
1:數位貨幣交易方法
10:公密鑰建立步驟
11:交易公鑰建立步驟
12:檢驗密鑰步驟
13:貨幣轉移步驟
14:公密鑰再建立步驟
15:替換步驟
2:數位貨幣交易系統
20:第一終端
21:第二終端
211:核對資料庫
212:用戶資料庫
22:第三終端
221:比對資料庫
23:網際網路
24:交易區塊鏈
25:儲存載具
251:微處理器
252:記憶體
253:安全晶片
253a:處理單元
1: Digital currency trading method
10: Public key establishment steps
11: Steps to create transaction public key
12: Steps to verify the key
13: Currency transfer steps
14: public key re-establishment steps
15: Replacement steps
2: digital currency trading system
20: First terminal
21: Second terminal
211: Check database
212: User database
22: Third terminal
221: Compare database
23: Internet
24: Trading blockchain
25: storage vehicle
251: Microprocessor
252: Memory
253:
圖1為本發明數位貨幣交易方法於第一較佳實施例的流程示意圖; 圖2為數位貨幣交易系統的方塊圖; 圖3A至圖3C為圖1中公密鑰建立步驟的示意圖; 圖4為圖1中交易公鑰建立步驟的示意圖; 圖5為圖1中檢驗密鑰步驟的示意圖; 圖6為圖1中貨幣轉移步驟的示意圖; 圖7為於第二較佳實施例中公密鑰建立步驟的示意圖; 圖8為於第二較佳實施例中交易公鑰建立步驟的示意圖; 圖9為於第三較佳實施例中檢驗密鑰步驟的示意圖; 圖10為於第三較佳實施例中貨幣轉移步驟的示意圖; 圖11為本發明數位貨幣交易方法於第四較佳實施例的流程示意圖; 圖12為於第四較佳實施例中公密鑰再建立步驟的示意圖; 圖13為於第四較佳實施例中替換步驟的示意圖;以及 圖14為交易公鑰的數位貨幣轉移到重製交易公鑰的示意圖。 1 is a schematic flowchart of the digital currency transaction method of the present invention in the first preferred embodiment; Figure 2 is a block diagram of a digital currency trading system; 3A to 3C are schematic diagrams of steps for establishing a public key in FIG. 1; 4 is a schematic diagram of the steps of establishing the transaction public key in FIG. 1; 5 is a schematic diagram of the key verification step in FIG. 1; Figure 6 is a schematic diagram of the money transfer steps in Figure 1; 7 is a schematic diagram of a public key establishment step in the second preferred embodiment; 8 is a schematic diagram of the steps of establishing a transaction public key in the second preferred embodiment; 9 is a schematic diagram of the key verification step in the third preferred embodiment; 10 is a schematic diagram of the money transfer step in the third preferred embodiment; 11 is a schematic flowchart of the digital currency transaction method of the present invention in the fourth preferred embodiment; 12 is a schematic diagram of the public key re-establishment step in the fourth preferred embodiment; 13 is a schematic diagram of replacement steps in the fourth preferred embodiment; and FIG. 14 is a schematic diagram of the transfer of digital currency of the transaction public key to the reworked transaction public key.
1:數位貨幣交易方法 1: Digital currency trading method
10:公密鑰建立步驟 10: Public key establishment steps
11:交易公鑰建立步驟 11: Steps to create transaction public key
12:檢驗密鑰步驟 12: Steps to verify the key
13:貨幣轉移步驟 13: Currency transfer steps
Claims (6)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW108108536A TWI695614B (en) | 2019-03-13 | 2019-03-13 | Method for digital currency transaction with authorization of multiple private key |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW108108536A TWI695614B (en) | 2019-03-13 | 2019-03-13 | Method for digital currency transaction with authorization of multiple private key |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI695614B true TWI695614B (en) | 2020-06-01 |
| TW202034653A TW202034653A (en) | 2020-09-16 |
Family
ID=72176111
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW108108536A TWI695614B (en) | 2019-03-13 | 2019-03-13 | Method for digital currency transaction with authorization of multiple private key |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI695614B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI813938B (en) * | 2021-01-27 | 2023-09-01 | 合作金庫商業銀行股份有限公司 | Blockchain-based trust and custody system for digital asset |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020029200A1 (en) * | 1999-09-10 | 2002-03-07 | Charles Dulin | System and method for providing certificate validation and other services |
| US20130173912A1 (en) * | 2011-12-28 | 2013-07-04 | Peking University Founder Group Co., Ltd. | Digital right management method, apparatus, and system |
| US20140164765A1 (en) * | 2011-05-13 | 2014-06-12 | Telefonica, S.A. | Procedure for a multiple digital signature |
-
2019
- 2019-03-13 TW TW108108536A patent/TWI695614B/en active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020029200A1 (en) * | 1999-09-10 | 2002-03-07 | Charles Dulin | System and method for providing certificate validation and other services |
| US20140164765A1 (en) * | 2011-05-13 | 2014-06-12 | Telefonica, S.A. | Procedure for a multiple digital signature |
| US20130173912A1 (en) * | 2011-12-28 | 2013-07-04 | Peking University Founder Group Co., Ltd. | Digital right management method, apparatus, and system |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI813938B (en) * | 2021-01-27 | 2023-09-01 | 合作金庫商業銀行股份有限公司 | Blockchain-based trust and custody system for digital asset |
Also Published As
| Publication number | Publication date |
|---|---|
| TW202034653A (en) | 2020-09-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10706136B2 (en) | Authentication-activated augmented reality display device | |
| RU2538330C2 (en) | Mobile payment device, method of preventing unauthorised access to payment application and data memory element | |
| CN101095162B (en) | System and method for secure transaction module | |
| US20190122212A1 (en) | Methods and systems for provisioning payment credentials | |
| US20170076291A1 (en) | Proxy device for representing multiple credentials | |
| US20050156026A1 (en) | EMV transactions in mobile terminals | |
| US11315122B2 (en) | Authentication method for e-wallet carrier | |
| KR20090023491A (en) | Consumer Authentication System and Method | |
| US11157895B2 (en) | Payment devices having multiple modes of conducting financial transactions | |
| US20200320527A1 (en) | Method for digital currency transaction with authorization of multiple private keys | |
| US20150007300A1 (en) | Method, apparatus, and system for using ic card as authentication medium | |
| US20200327511A1 (en) | Multiple authentication method for digital asset transaction | |
| TWI695614B (en) | Method for digital currency transaction with authorization of multiple private key | |
| US20250272372A1 (en) | Remote creation of virtual credential bound to physical location | |
| CN108475374B (en) | Payment devices with multiple modes for conducting financial transactions | |
| US10555173B2 (en) | Pairing authentication method for electronic transaction device | |
| TWI646481B (en) | Pairing authentication method for electronic transaction device | |
| CN111695896A (en) | Digital currency transaction method authorized by multiple keys | |
| JP6845888B2 (en) | Authentication method for electronic wallet media | |
| TWI730304B (en) | Multiple authentication method for digital asset transaction | |
| CN110119946B (en) | Pairing authentication method of electronic transaction device | |
| JP6559831B1 (en) | Pairing authentication method for electronic transaction equipment | |
| JP2020174324A (en) | Digital currency trading method with multiple private key authorization | |
| KR102046708B1 (en) | Pairing authentication method for electronic transaction device | |
| TWI258968B (en) | Authentication device |