[go: up one dir, main page]

TWI695614B - Method for digital currency transaction with authorization of multiple private key - Google Patents

Method for digital currency transaction with authorization of multiple private key Download PDF

Info

Publication number
TWI695614B
TWI695614B TW108108536A TW108108536A TWI695614B TW I695614 B TWI695614 B TW I695614B TW 108108536 A TW108108536 A TW 108108536A TW 108108536 A TW108108536 A TW 108108536A TW I695614 B TWI695614 B TW I695614B
Authority
TW
Taiwan
Prior art keywords
terminal
public key
key
transaction
digital currency
Prior art date
Application number
TW108108536A
Other languages
Chinese (zh)
Other versions
TW202034653A (en
Inventor
莊佑邦
歐仕邁
Original Assignee
開曼群島商庫幣科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 開曼群島商庫幣科技有限公司 filed Critical 開曼群島商庫幣科技有限公司
Priority to TW108108536A priority Critical patent/TWI695614B/en
Application granted granted Critical
Publication of TWI695614B publication Critical patent/TWI695614B/en
Publication of TW202034653A publication Critical patent/TW202034653A/en

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention relates to a transaction method of digital currency, comprising the following steps: user information is provided to three terminals, and the terminals will generate a set of a public key and a private key respectively; subsequently, every terminal obtains a transaction public key by combining three public keys, and the transaction public key is set to require two or more electronic signatures corresponding to the private keys to transfer the digital currency; then verification information is provided and compared to match the user information, such that one of the terminals obtains two or more electronic signatures. ; finally, the digital currency is transferred according to the transaction public key together with two or more electronic signatures. By doing so, the electronic signatures corresponding to the private keys need to be obtained from at least two terminals to transfer the digital currency of the transaction public key. So, even a theft steals one of the private keys, the theft still can not transfer the digital currency by the stolen private key.

Description

多重密鑰授權的數位貨幣交易方法Multi-key authorized digital currency transaction method

本發明有關於一種能降低數位資產被竊取的數位貨幣交易方法,特別是一種要取得兩個以上的電子簽章才能轉移數位貨幣的數位貨幣交易方法。The present invention relates to a digital currency transaction method that can reduce the theft of digital assets, in particular to a digital currency transaction method that requires more than two electronic signatures to transfer digital currency.

隨著科技的進步,許多的交易及支付方式已漸由積體電路(Integrated Circuit, IC)卡所取代,IC卡內部設置的記憶體能儲存持卡者的資訊,進而被廣泛地運用於各場合中,像是提款卡、金融卡、信用卡、電話卡、儲值卡等皆為目前常見的IC卡,而一般所使用的IC卡依據存、讀取資料的方式大致可分為接觸式介面、非接觸式介面以及複合式介面三種。With the advancement of technology, many transaction and payment methods have been gradually replaced by integrated circuit (IC) cards. The internal memory of the IC card can store cardholder information, which is widely used in various occasions. Among them, such as withdrawal cards, financial cards, credit cards, telephone cards, stored value cards, etc. are currently common IC cards, and generally used IC cards can be roughly divided into contact interfaces, according to the method of storing and reading data. There are three types of non-contact interface and composite interface.

以具備信用卡與提款卡功能的金融卡為例,當要使用金融卡透過自動櫃員機進行交易或服務前,自動櫃員機需要持卡者輸入預先設定的密碼來用以取得使用該金融卡的權利,因此,即使金融卡遺失或被竊取,非原持卡者因為不知道預先設定的密碼而無法透過自動櫃員機盜取現金,但是,自動櫃員機僅是依據預先設定的密碼來判定是否要進行現金出款,而自動櫃員機無法判並該金融卡是否為正確的原持卡者,進而非原持卡者知道預先設定的密碼,則自動櫃員機依然會進行現金出款以讓非原持卡者盜取現金,並且,當持卡者使用金融卡進行消費時,持卡者會被要求在交易單據上簽屬持卡者的姓名,進而當金融卡遺失或被竊取,則容易被非原持卡偽簽或盜刷而造成財物損失。Taking a financial card with credit card and debit card functions as an example, before using a financial card to conduct transactions or services through an ATM, the ATM requires the cardholder to enter a preset password to obtain the right to use the financial card. Therefore, even if the financial card is lost or stolen, the non-original cardholder cannot steal cash through the ATM because he does not know the preset password. However, the ATM only determines whether to withdraw cash based on the preset password , And the ATM cannot determine whether the financial card is the correct original cardholder, and the non-original cardholder knows the preset password, the ATM will still make cash withdrawals to allow the non-original cardholder to steal cash And, when the cardholder uses the financial card for consumption, the cardholder will be required to sign the name of the cardholder on the transaction document, and then when the financial card is lost or stolen, it is easy to be counterfeited by the non-original cardholder Or stolen and caused property damage.

另外,隨著無線傳輸的技術日新月異,一部份IC採用無線射頻(RFID/Radio-frequency identification)的無線傳輸技術,而這種無線射頻技術最常被應用在金額較少的消費交易上,例如搭乘公車、捷運等大眾運輸工具,然而,這種小額消費為了追求速度以及便利性,在交易的同時不會被要求輸入密碼或是簽屬持卡者的姓名,因此,只要運用無線感應來進行消費的IC卡遺失或被竊取,拾取IC卡的非原持卡者就能直接進行消費交易,直到該IC卡被停用或者是內部儲存的金額被消費殆盡。In addition, with the rapid development of wireless transmission technology, some ICs use wireless radio frequency (RFID/Radio-frequency identification) wireless transmission technology, and this wireless radio frequency technology is most commonly used in consumer transactions with small amounts, such as Taking public transportation such as bus and MRT, however, in order to pursue speed and convenience, this small amount of consumption will not be required to enter a password or sign the name of the cardholder during the transaction, so as long as wireless sensing is used If the IC card used for consumption is lost or stolen, the non-original cardholder who picked up the IC card can directly proceed with the transaction until the IC card is deactivated or the internally stored amount is consumed.

再者,用於門禁系統的IC卡,為了速度與便利性,通常只要持有正確的IC卡就能順利地進出有門禁管制的地區,因此,當用於門禁系統的IC遺失或被竊取時,拾取IC卡的非原持卡者也就能直接透過所拾取的IC卡進出門禁管制地區。In addition, for the speed and convenience of IC cards used in the access control system, as long as the correct IC card is held, they can smoothly enter and exit the area with access control. Therefore, when the IC used in the access control system is lost or stolen Non-original cardholders who pick up IC cards can also directly enter and exit access control areas through the picked up IC cards.

由前述說明可知,目前常見的IC卡只要遺失被非原持卡者所拾取,非原持卡者就能透過所拾取的IC卡盜取數位資產,進而造成原持卡者財務上的損失。As can be seen from the foregoing description, as long as the current common IC card is lost and picked up by the non-original card holder, the non-original card holder can steal digital assets through the picked up IC card, thereby causing financial loss to the original card holder.

本發明的主要目的在於必須要取得兩個以上的電子簽章才能轉移數位貨幣,進而即使盜取者竊取到其中一個密鑰,盜取者依然無法經由竊取到的密鑰而轉移數位貨幣,致使能避免數位貨幣被盜取者竊取。The main purpose of the present invention is that it is necessary to obtain more than two electronic signatures to transfer digital currency, and then even if a stolen person steals one of the keys, the stolen person still cannot transfer the digital currency through the stolen key, resulting in It can prevent digital currency from being stolen.

為實現前述目的,本發明有關於一種多重密鑰授權的數位貨幣交易方法,包含以下步驟:一公密鑰建立步驟:提供一表示用戶身分的用戶資訊,而一第一終端、一第二終端以及一第三終端三者分別形成對應於上述用戶資料的一組公鑰的密鑰,使得上述第一終端具有一第一密鑰與一第一公鑰、而上述第二終端一第二密鑰與一第二公鑰,則上述第三終端具有一第三密鑰與一第三公鑰;一交易公鑰建立步驟:上述第一終端、第二終端與第三終端三者取得一透過上述第一公鑰、第二公鑰與第三公鑰結合產生的交易公鑰,上述交易公鑰能依據一對應於上述第一密鑰的第一電子簽章、一對應於上述第二密鑰的第二電子簽章與一對應於上述第三密鑰的第三電子簽章三者的其中兩者以上來授權轉移數位貨幣;一檢驗密鑰步驟:提供一具有用戶個資的核對資訊,並核對上述核對資訊符合於上述用戶資訊,當上述核對資訊相符於上述用戶資訊時,上述第一終端、第二終端與第三終端三者其中之一具有上述第一電子簽章、第二電子簽章與第三電子簽章三者之其中兩者以上;以及一貨幣轉移步驟:形成一交易資訊,而上述第一電子簽章、第二電子簽章與第三電子簽章三者之其中兩者以上能授權上述交易公鑰依循上述交易資訊轉移上述交易公鑰的數位貨幣。In order to achieve the aforementioned object, the present invention relates to a multi-key authorized digital currency transaction method, which includes the following steps: a public key establishment step: providing user information indicating the identity of the user, and a first terminal and a second terminal And a third terminal respectively form a key corresponding to a set of public keys of the user profile, so that the first terminal has a first key and a first public key, and the second terminal has a second secret Key and a second public key, the third terminal has a third key and a third public key; a transaction public key creation step: the first terminal, the second terminal, and the third terminal obtain a pass The transaction public key generated by the combination of the first public key, the second public key, and the third public key, the transaction public key can be based on a first electronic signature corresponding to the first key, and a corresponding second secret Two or more of the second electronic signature of the key and a third electronic signature corresponding to the above-mentioned third key to authorize the transfer of digital currency; a key verification step: provide verification information with user's personal data , And verify that the verification information is consistent with the user information. When the verification information matches the user information, one of the first terminal, the second terminal, and the third terminal has the first electronic signature, the second Two or more of the electronic signature and the third electronic signature; and a currency transfer step: forming a transaction information, and the first electronic signature, the second electronic signature and the third electronic signature of the above three Two or more of them can authorize the transaction public key to transfer the digital currency of the transaction public key according to the transaction information.

於一較佳實施例中,於上述公密鑰建立步驟中,將上述用戶資訊傳遞至上述第一終端、第二終端與第三終端,而上述第一終端、第二終端與第三終端三者於接收到上述用戶資訊之後,上述第一終端、第二終端與第三終端各自形成上述一組公鑰與密鑰。In a preferred embodiment, in the public key establishment step, the user information is transferred to the first terminal, the second terminal, and the third terminal, and the first terminal, the second terminal, and the third terminal are After receiving the user information, the first terminal, the second terminal, and the third terminal each form the set of public keys and keys.

然而,於上述交易公鑰建立步驟中,上述第一終端取得上述第二公鑰與第三公鑰,使得上述第一終端具有上述第一公鑰與第二公鑰與第三公鑰,而上述第一終端將上述第一公鑰、第二公鑰與第三公鑰結合產生上述交易公鑰,並將上述交易公鑰傳遞至上述第二終端與第三終端。However, in the step of establishing the transaction public key, the first terminal obtains the second public key and the third public key, so that the first terminal has the first public key, the second public key, and the third public key, and The first terminal combines the first public key, the second public key, and the third public key to generate the transaction public key, and transmits the transaction public key to the second terminal and the third terminal.

於另一較佳實施例中,於上述公密鑰建立步驟中,上述第一終端、第二終端以及第三終端三者分別具有至少一組沒有經過設定的初始公密鑰,而上述初始公密鑰依據上述用戶資訊而設定轉換為上述公鑰與密鑰。In another preferred embodiment, in the public key establishment step, the first terminal, the second terminal, and the third terminal each have at least one set of initial public keys that have not been set, and the initial public key The key is set to be converted into the public key and key according to the user information.

然而,於上述交易公鑰建立步驟中,上述第一終端、第二終端與第三終端各自取得上述第一公鑰、第二公鑰與第三公鑰,而上述第一終端、第二終端與第三終端分別將上述第一公鑰、第二公鑰與第三公鑰結合形成上述交易公鑰。However, in the step of establishing the transaction public key, the first terminal, the second terminal, and the third terminal each obtain the first public key, the second public key, and the third public key, while the first terminal, the second terminal Combine the first public key, the second public key, and the third public key with the third terminal to form the transaction public key.

於前述兩實施例中,上述多重密鑰授權的數位貨幣交易方法進一步包含:一公密鑰再建立步驟:上述第一終端、第二終端以及第三終端三者其中之一形成對應於上述用戶資訊的一第四密鑰與一第四公鑰;一替換步驟:將上述第一公鑰、第二公鑰以及第三公鑰三者其中之二與上述第四公鑰結合形成一用以託管上述交易公鑰的重製交易公鑰,並將上述交易公鑰的數位貨幣轉移到上述重製交易公鑰。In the foregoing two embodiments, the multi-key authorized digital currency transaction method further includes: a public key re-establishment step: one of the first terminal, the second terminal, and the third terminal is formed to correspond to the user A fourth key and a fourth public key of information; a replacement step: combining two of the first public key, the second public key and the third public key with the fourth public key to form a Manage the reworked transaction public key of the above transaction public key, and transfer the digital currency of the above transaction public key to the above reworked transaction public key.

由以上說明可知,本發明的特點在於第一終端、第二終端與第三終端三者各別有一個密鑰與一個公鑰,而全部的公鑰結合形成交易公鑰,則交易公鑰需要兩個以上的電子簽章才能轉移數位貨幣,藉此,當數位貨幣鑰要進行轉移時,必須先從至少兩個終端取得電子簽章才能轉移數位貨幣,進而即使盜取者竊取到其中一個密鑰,盜取者依然無法經由竊取到的密鑰而轉移數位貨幣,致使能避免數位貨幣被盜取者竊取。As can be seen from the above description, the present invention is characterized in that each of the first terminal, the second terminal, and the third terminal has a key and a public key, and all public keys are combined to form a transaction public key. Only two or more electronic signatures can transfer digital currency. Therefore, when the digital currency key is to be transferred, the electronic signature must be obtained from at least two terminals before the digital currency can be transferred, so that even if the thief steals one of the secrets The key, the stolen person still cannot transfer the digital currency through the stolen key, so that the digital currency can be prevented from being stolen by the stolen person.

茲為便於更進一步對本發明之構造、使用及其特徵有更深一層明確、詳實的認識與瞭解,爰舉出較佳實施例,配合圖式詳細說明如下:In order to facilitate a deeper and more clear and detailed understanding and understanding of the structure, use and characteristics of the present invention, the preferred embodiment is cited, and the detailed description in conjunction with the drawings is as follows:

請參閱圖1與圖2所示,於第一較佳實施例中,本發明數位貨幣交易方法1配合一數位貨幣交易系統2進行使用,如圖2所示,數位貨幣交易系統2具有一第一終端20、一第二終端21以及一第三終端22,第一終端20設為供用戶使用的手機、電腦或平板,而第二終端21設為能管理公鑰的託管單位,則第三終端22設為能管理公鑰的信託單位,然而,第一終端20設為手機、電腦或平板、第二終端21設為託管單位以及第三終端22設為信託單位僅方便說明之用,亦即第一終端20可設為託管單位、而第二終端21可設為信託單位,則第三終端22可設為手機、電腦或平板。Please refer to FIGS. 1 and 2. In the first preferred embodiment, the digital currency transaction method 1 of the present invention is used in conjunction with a digital currency transaction system 2. As shown in FIG. 2, the digital currency transaction system 2 has a first A terminal 20, a second terminal 21, and a third terminal 22, the first terminal 20 is set as a mobile phone, computer, or tablet for the user, and the second terminal 21 is set as a custodian unit that can manage the public key, the third The terminal 22 is set as a trust unit capable of managing the public key, however, the first terminal 20 is set as a mobile phone, a computer or a tablet, the second terminal 21 is set as a custodian unit, and the third terminal 22 is set as a trust unit for convenience of explanation only. That is, the first terminal 20 may be set as a custodian unit, and the second terminal 21 may be set as a trust unit, and the third terminal 22 may be set as a mobile phone, computer, or tablet.

於此實施例中,設為手機、電腦或平板的第一終端20能主動網路連接於一網際網路23,而網際網路23同時連線於第二終端21、第三終端22以及一交易區塊鏈24,使得全部的第一終端20都能經由網際網路23而連接於第二終端21、第三終端22以及交易區塊鏈24。In this embodiment, the first terminal 20 set as a mobile phone, computer, or tablet can actively connect to an Internet 23, and the Internet 23 is simultaneously connected to the second terminal 21, the third terminal 22, and a The transaction blockchain 24 enables all the first terminals 20 to be connected to the second terminal 21, the third terminal 22, and the transaction blockchain 24 via the Internet 23.

設為託管單位的第二終端21具有一用以儲存資訊內容的核對資料庫211,並能提供一儲存載具25,另外,設為信託單位的第三終端22具有一用以儲存資訊內容的比對資料庫221,則交易區塊鏈24存有複數個不同用戶的公鑰,其中,每一個公鑰具有數位貨幣與交易地址,於此實施例中,儲存載具25不能直接主動連接於網際網路23,但每一個儲存載具25能一對一選擇性連線或斷線於複數個第一終端20其中之一,而當儲存載具25連線於第一終端20時,儲存載具25能經由電子裝置而連線於網際網路23,其中,儲存載具25設有一能處理資訊的微處理器251、一能儲存資訊的記憶體252以及一儲存重要資訊的安全晶片253,而記憶體252、安全晶片253兩者皆電性連接於微處理器251,其中,安全晶片253具有一能處理資訊的處理單元253a,並於此實施例中,儲存載具25設為一積體電路(Integrated Circuit, IC)卡。The second terminal 21 set as the escrow unit has a verification database 211 for storing information content, and can provide a storage vehicle 25, and the third terminal 22 set as the trust unit has a Comparing the database 221, the transaction blockchain 24 stores a plurality of public keys of different users, where each public key has a digital currency and a transaction address. In this embodiment, the storage vehicle 25 cannot be directly connected to the Internet 23, but each storage carrier 25 can be selectively connected or disconnected to one of the plurality of first terminals 20 one by one, and when the storage carrier 25 is connected to the first terminal 20, the storage The carrier 25 can be connected to the Internet 23 via an electronic device, wherein the storage carrier 25 is provided with a microprocessor 251 capable of processing information, a memory 252 capable of storing information, and a security chip 253 storing important information The memory 252 and the security chip 253 are both electrically connected to the microprocessor 251, wherein the security chip 253 has a processing unit 253a capable of processing information, and in this embodiment, the storage carrier 25 is set to a Integrated Circuit (Integrated Circuit, IC) card.

請參閱圖1與圖3A所示,於具體應用時,首先進行一公密鑰建立步驟10,用戶對第一終端20輸入一表示用戶身分的用戶資訊,而第一終端20將上述用戶資訊傳遞至第二終端21,使得第二終端21依據上述用戶資訊建立一儲存於第二終端21的用戶資料庫212,並將上述用戶資訊儲存於核對資料庫211,進而第二終端21再依據用戶資料庫212建立一用以授權數位貨幣進行轉移的第二密鑰以及一對應於第二密鑰的第二公鑰。Please refer to FIG. 1 and FIG. 3A. In a specific application, a public key establishment step 10 is first performed. The user inputs user information indicating the user’s identity to the first terminal 20, and the first terminal 20 transmits the user information. To the second terminal 21, the second terminal 21 creates a user database 212 stored in the second terminal 21 according to the user information, and stores the user information in the verification database 211, and then the second terminal 21 relies on the user data The library 212 creates a second key for authorizing digital currency transfer and a second public key corresponding to the second key.

請參閱圖3B所示,第二終端21將上述第二密鑰儲存於用戶資料庫212,並將上述用戶資訊與第二公鑰傳遞至第三終端22,而第三終端22將上述用戶資訊儲存於比對資料庫221,並依據上述用戶資訊與第二公鑰建立一用以授權數位貨幣進行轉移的第三密鑰以及一對應於第三密鑰的第三公鑰,其中,第三終端22儲存第三密鑰,並用以管理第三密鑰。Referring to FIG. 3B, the second terminal 21 stores the second key in the user database 212, and transmits the user information and the second public key to the third terminal 22, and the third terminal 22 transmits the user information Stored in the comparison database 221, and based on the user information and the second public key to create a third key used to authorize digital currency transfer and a third public key corresponding to the third key, where the third The terminal 22 stores the third key, and is used to manage the third key.

請參閱圖3C所示,隨後,第三終端22將上述第二公鑰與第三公鑰傳遞至第二終端21,而第二終端21將上述第二公鑰與第三公鑰儲存於儲存載具25的記憶體252,並將具有上述第二公鑰與第三公鑰的儲存載具25提供給用戶,接下來,第一終端20於用戶取得儲存載具25之後依據上述用戶資訊而建立一用以授權數位貨幣進行轉移的第一密鑰以及一對應於第一密鑰的第一公鑰,其中,第一終端20將上述第一密鑰傳遞至儲存載具25,使儲存載具25的安全晶片253儲存上述第一密鑰,另外,第一終端20再將上述第一公鑰傳遞至儲存載具25、第二終端21與第三終端22,使得儲存載具25的記憶體252、第二終端21的用戶資料庫212以及第三終端22三者都儲存上述第一公鑰,藉此,即完成公密鑰建立步驟10。Please refer to FIG. 3C. Then, the third terminal 22 transmits the second public key and the third public key to the second terminal 21, and the second terminal 21 stores the second public key and the third public key in the storage. The memory 252 of the vehicle 25 provides the storage vehicle 25 with the second public key and the third public key to the user. Next, the first terminal 20 obtains the storage vehicle 25 based on the user information Create a first key for authorizing digital currency transfer and a first public key corresponding to the first key, wherein the first terminal 20 transfers the first key to the storage vehicle 25 so that the storage load The security chip 253 of the device 25 stores the first key. In addition, the first terminal 20 transmits the first public key to the storage vehicle 25, the second terminal 21, and the third terminal 22, so that the memory of the storage vehicle 25 The body 252, the user database 212 of the second terminal 21, and the third terminal 22 all store the first public key, thereby completing step 10 of establishing the public key.

請參閱圖1與圖4所示,接下來進行一交易公鑰建立步驟11,當儲存載具25的記憶體252存有上述第一公鑰、第二公鑰與第三公鑰時,儲存載具25的微處理器251將上述第一公鑰、第二公鑰與第三公鑰結合形成一具有數位貨幣的交易公鑰,並且,微處理器251將上述交易公鑰設定為需要至少兩個對應於密鑰的電子簽章才能轉移數位貨幣的交易模式,隨後,微處理器251將呈現交易模式的上述交易公鑰傳遞至第一終端20,而第一終端20再將上述交易公鑰傳遞至第二終端21、第三終端22與交易區塊鏈24,讓第一終端20、第二終端21、第三終端22與交易區塊鏈24四者都能存有交易公鑰。Please refer to FIGS. 1 and 4. Next, a transaction public key creation step 11 is performed. When the memory 252 of the storage vehicle 25 stores the first public key, the second public key, and the third public key, the storage The microprocessor 251 of the vehicle 25 combines the first public key, the second public key, and the third public key to form a transaction public key with digital currency, and the microprocessor 251 sets the transaction public key to require at least Only two electronic signatures corresponding to the key can transfer the digital currency transaction mode. Then, the microprocessor 251 passes the transaction public key described above in the transaction mode to the first terminal 20, and the first terminal 20 then transfers the transaction public key. The key is transferred to the second terminal 21, the third terminal 22, and the transaction blockchain 24, so that all of the first terminal 20, the second terminal 21, the third terminal 22, and the transaction blockchain 24 can store the transaction public key.

請參閱圖1與圖5所示,當用戶欲要轉移數位貨幣時,第一終端20接收一由用戶輸入形成具有用戶個資的核對資訊,而第一終端20將上述核對資訊傳遞至第二終端21,當第二終端21接收到上述核對資訊時,第二終端21會確認上述核對資訊是否相符儲存於核對資料庫211的用戶資訊,當第二終端21確認核對資訊的資訊內容符合於用戶資訊的資訊內容時,第二終端21會將上述第二密鑰進行轉換以形成一傳遞至第一終端20的第二電子簽章,當第一終端20接收到上述第二電子簽章,第一終端20會要求儲存載具25使用上述第一密鑰,讓儲存載具25的微處理器251從儲存載具25的記憶體252取得上述第一密鑰,並將上述第一密鑰進行轉換以形成一傳遞至第一終端20的第一電子簽章,使得第一終端20同時具有上述第一電子簽章與第二電子簽章,藉此,即完成一檢驗密鑰步驟12。Please refer to FIG. 1 and FIG. 5, when the user wants to transfer digital currency, the first terminal 20 receives a verification information input by the user to form the user’s personal data, and the first terminal 20 transmits the verification information to the second Terminal 21, when the second terminal 21 receives the verification information, the second terminal 21 will confirm whether the verification information matches the user information stored in the verification database 211, and when the second terminal 21 confirms that the information content of the verification information matches the user Information content, the second terminal 21 converts the second key to form a second electronic signature passed to the first terminal 20. When the first terminal 20 receives the second electronic signature, the second A terminal 20 will request the storage vehicle 25 to use the first key, let the microprocessor 251 of the storage vehicle 25 obtain the first key from the memory 252 of the storage vehicle 25, and perform the first key It is converted to form a first electronic signature passed to the first terminal 20, so that the first terminal 20 has the first electronic signature and the second electronic signature at the same time, thereby completing a verification key step 12.

請參閱圖1與圖6所示,最後進行一貨幣轉移步驟13,用戶經由第一終端20形成一包含交易地址與交易金額的交易資訊,而第一終端20將上述第一電子簽章、第二電子簽章與交易資訊形成一授權交易資訊,並將上述授權交易資訊傳遞至交易區塊鏈24,使得交易區塊鏈24會對上述第一、二電子簽章進行驗證以確認上述第一、二密鑰兩者的正確性,進而交易區塊鏈24就能依據上述授權交易資訊的資訊內容將上述交易公鑰的數位貨幣進行轉移。Please refer to FIGS. 1 and 6. Finally, a currency transfer step 13 is performed. The user forms transaction information including the transaction address and transaction amount through the first terminal 20, and the first terminal 20 signs the first electronic signature, the The two electronic signatures and transaction information form an authorized transaction information, and transfer the above authorized transaction information to the transaction blockchain 24, so that the transaction blockchain 24 will verify the first and second electronic signatures to confirm the first The correctness of the two keys, and the transaction blockchain 24 can transfer the digital currency of the transaction public key according to the information content of the above authorized transaction information.

請參閱圖7與圖8,於第二較佳實施例中,本發明數位貨幣交易方法1同樣具有公密鑰建立步驟10、交易公鑰建立步驟11、檢驗密鑰步驟12以及貨幣轉移步驟13,而與第一較佳實施例差別在於公密鑰建立步驟10以及交易公鑰建立步驟11,至於檢驗密鑰步驟12以及貨幣轉移步驟13兩者的步驟流程皆相同於第一較佳實施例,進而不再重複描述。7 and 8, in the second preferred embodiment, the digital currency transaction method 1 of the present invention also has a public key establishment step 10, a transaction public key establishment step 11, a verification key step 12 and a currency transfer step 13 The difference from the first preferred embodiment lies in the public key establishment step 10 and the transaction public key establishment step 11. As for the verification key step 12 and the currency transfer step 13, the steps are the same as the first preferred embodiment. , And will not repeat the description.

如圖7所示,設為手機、電腦或平板的第一終端20本身內存有至少一組未經設定的第一初始公密鑰,而設為托管單位的第二終端21本身內存有至少一組未經設定的第二初始公密鑰,而設為信託單位的第三終端22本身內存有至少一組未經設定的第三初始公密鑰,其中,當第一、二、三終端20、21、22分別接收到上述用戶資訊時,第一終端20能將其中一個上述第一初始公密鑰依據上述用戶資訊進行設定,使得上述第一初始公密鑰轉換為上述第一公鑰與第一密鑰,而第二終端21也將其中一個上述第二初始公密鑰依據上述用戶資訊進行設定,使得上述第二初始公密鑰轉換為上述第二公鑰與第二密鑰,同樣地,第三終端22將其中一個上述第三初始公鑰依據上述用戶資訊進行設定,使得上述第三初始公密鑰轉換為上述第三公鑰與第三密鑰,藉此即完成公密鑰建立步驟10。As shown in FIG. 7, the first terminal 20 set as a mobile phone, a computer or a tablet has at least one uninitialized first initial public key in its own memory, and the second terminal 21 set as a hosting unit has at least one in its own memory The group has not set the second initial public key, and the third terminal 22 set as the trust unit itself has at least one group of unset third initial public keys, wherein, when the first, second, and third terminals 20 , 21, 22, when receiving the user information, the first terminal 20 can set one of the first initial public keys according to the user information, so that the first initial public key is converted into the first public key and The first key, and the second terminal 21 also sets one of the second initial public keys according to the user information, so that the second initial public key is converted into the second public key and the second key, the same The third terminal 22 sets one of the third initial public keys according to the user information, so that the third initial public key is converted into the third public key and the third key, thereby completing the public key Step 10 is established.

如圖8所示,當第一終端20形成上述第一公鑰時,第一終端20將上述第一公鑰傳遞至第二終端21與第三終端22,而當第二終端21形成上述第二公鑰時,第二終端21將上述第二公鑰傳遞至第一終端20與第三終端22,並且,第三終端22於形成上述第三公鑰之後,第三終端22將上述第三公鑰傳遞第一終端20與第二終端21,進而讓第一、二、三終端20、21、22分別都具有上述第一公鑰、第二公鑰與第三公鑰時,第一、二、三終端20、21、22會各自將上述第一公鑰、第二公鑰與第三公鑰相互結合以形成上述交易公鑰,而當第一、二、三終端20、21、22都具有上述交易公鑰時即完成交易公鑰建立步驟11。As shown in FIG. 8, when the first terminal 20 forms the first public key, the first terminal 20 passes the first public key to the second terminal 21 and the third terminal 22, and when the second terminal 21 forms the In the case of two public keys, the second terminal 21 passes the second public key to the first terminal 20 and the third terminal 22, and after the third terminal 22 forms the third public key, the third terminal 22 transfers the third The public key transfers the first terminal 20 and the second terminal 21, so that the first, second, and third terminals 20, 21, and 22 have the first public key, the second public key, and the third public key, respectively. The second and third terminals 20, 21, and 22 each combine the first public key, the second public key, and the third public key to form the transaction public key, and when the first, second, and third terminals 20, 21, 22 The step 11 of establishing the transaction public key is completed when all of the above transaction public keys are available.

請參閱圖9與圖10所示,於第三較佳實施例中,與第一較佳實施例差別在於檢驗密鑰步驟12以及貨幣轉移步驟13,如圖9所示,當發現不明來源的數位資產轉移到交易公鑰時,設為托管單位的第二終端21將儲存於核對資料庫211的上述用戶資訊傳遞至設為信託單位的第三終端22,第三終端22核對儲存於核對資料庫211的上述用戶資訊符合於比對資料庫221的上述用戶資訊之後,第三終端22將第三密鑰進行轉換以形成一傳遞至第二終端21的第三電子簽章,使得第二終端21同時具有上述第二密鑰與第三電子簽章,藉此,即完成檢驗密鑰步驟12。Please refer to FIGS. 9 and 10. In the third preferred embodiment, the difference from the first preferred embodiment is the key verification step 12 and the currency transfer step 13, as shown in FIG. 9, when an unknown source is found When the digital asset is transferred to the transaction public key, the second terminal 21 set as the custodian unit transfers the user information stored in the verification database 211 to the third terminal 22 set as the trust unit, and the third terminal 22 checks the stored data in the verification data After the user information in the library 211 matches the user information in the matching database 221, the third terminal 22 converts the third key to form a third electronic signature passed to the second terminal 21, so that the second terminal 21 has the second key and the third electronic signature at the same time, thereby completing step 12 of verifying the key.

請參閱圖10所示,於進行貨幣轉移步驟13時,設為托管單位的第二終端21形成一凍結數位貨幣進行流動的凍結資訊,並再將上述第二密鑰進行以形成一第二電子簽章,而第二終端21將上述第二電子簽章、第三電子簽章與凍結資訊形成限制交易資訊,並將上述限制交易資訊傳遞至交易區塊鏈24,使得交易區塊鏈24會對上述第二、三電子簽章進行轉換以得知上述第二、三密鑰兩者的資訊內容,進而交易區塊鏈24就能依據上述限制交易資訊而將不再提供上述交易公鑰,並再將上述交易公鑰的數位貨幣轉移至一凍結帳戶,讓上述交易公鑰的數位貨幣不會被竊取人士轉走以降低財物損失的風險。As shown in FIG. 10, when performing the currency transfer step 13, the second terminal 21 set as the escrow unit forms a freezing information for freezing digital currency to flow, and then performs the above second key to form a second electronic Signature, and the second terminal 21 forms the above-mentioned second electronic signature, third electronic signature and frozen information to form restricted transaction information, and transmits the restricted transaction information to the transaction blockchain 24, so that the transaction blockchain 24 will Convert the second and third electronic signatures to obtain the information content of the second and third keys, and then the transaction blockchain 24 can no longer provide the transaction public key according to the above-mentioned restricted transaction information. And then transfer the digital currency of the transaction public key to a frozen account, so that the digital currency of the transaction public key will not be diverted by the stolen person to reduce the risk of property loss.

請參閱圖11所示,於第四較佳實施例中,與第一較佳實施例差別在於數位貨幣交易方法1進一步具有一公密鑰再建立步驟14以及一替換步驟15,請參閱圖11與圖12所示,完成交易公鑰建立步驟11之後,除了能進行檢驗密鑰步驟12之後,還能進行公密鑰再建立步驟14,如圖所示,當用戶遺忘第一密鑰時,用戶對第一終端20輸入上述用戶資訊,使第一終端20依據上述用戶資訊建立一不同於上述第一密鑰的第四密鑰與一對應於上述第四密鑰的第四公鑰,而第一終端20會進一步將上述第四公鑰傳遞至儲存載具25,使得儲存載具25的記憶體252移除上述第一公鑰,並儲存上述第四公鑰,藉以完成公密鑰再建立步驟14。Please refer to FIG. 11. In the fourth preferred embodiment, the difference from the first preferred embodiment is that the digital currency transaction method 1 further has a public key re-establishment step 14 and a replacement step 15, please refer to FIG. 11. As shown in FIG. 12, after the step 11 of establishing the transaction public key, in addition to the step 12 of verifying the key, the step 14 of establishing the public key can also be performed. As shown in the figure, when the user forgets the first key, The user inputs the user information to the first terminal 20, so that the first terminal 20 creates a fourth key different from the first key and a fourth public key corresponding to the fourth key according to the user information, and The first terminal 20 will further pass the fourth public key to the storage vehicle 25, so that the memory 252 of the storage vehicle 25 removes the first public key, and stores the fourth public key to complete the public key. Establish step 14.

然而,第一終端20依據上述用戶資訊產生上述第四密鑰與第四公鑰僅方便說明之用,亦即若設為託管單位的第二終端21遺失上述第二密鑰或是設為信託單位的第三終端22遺失上述第三密鑰時,第二終端21與第三終端22亦能依據上述用戶資訊形成上述第四密鑰與第四公鑰,其中,當第二終端21形成上述第四公鑰時,第二終端21會進一步移除上述第二公鑰,反之,當第三終端22形成上述第四公鑰時,第三終端22會進一步移除上述第三公鑰。However, the first terminal 20 generates the fourth key and the fourth public key according to the user information for convenience of description, that is, if the second terminal 21 set as the escrow unit loses the second key or is set as a trust When the third terminal 22 of the unit loses the third key, the second terminal 21 and the third terminal 22 can also form the fourth key and the fourth public key based on the user information. When the second terminal 21 forms the above When the fourth public key is used, the second terminal 21 will further remove the second public key. Conversely, when the third terminal 22 forms the fourth public key, the third terminal 22 will further remove the third public key.

請參閱圖11與圖13所示,當完成公密鑰再建立步驟14時,儲存載具25的記憶體252具有上述第二公鑰、第三公鑰與第四公鑰,並且,儲存載具25的微處理器251將將上述第二公鑰、第三公鑰與第四公鑰結合形成一重製交易公鑰,並且,微處理器251將上述重製交易公鑰設定為需要至少兩個對應於密鑰的電子簽章才能轉移數位貨幣的交易模式,隨後,微處理器251將呈現交易模式的上述重製交易公鑰傳遞至第一終端20,而第一終端20再將上述重製交易公鑰傳遞至第二終端21、第三終端22與交易區塊鏈24,讓第一終端20、第二終端21、第三終端22與交易區塊鏈24四者都能存有重製交易公鑰。Please refer to FIG. 11 and FIG. 13, when the public key re-creation step 14 is completed, the memory 252 of the storage vehicle 25 has the above-mentioned second public key, third public key and fourth public key, and The microprocessor 251 with 25 will combine the second public key, the third public key and the fourth public key to form a reworked transaction public key, and the microprocessor 251 sets the reworked transaction public key to require at least two An electronic signature corresponding to the key can be used to transfer the digital currency transaction mode. Subsequently, the microprocessor 251 passes the above-mentioned reworked transaction public key presenting the transaction mode to the first terminal 20, and the first terminal 20 transmits The transaction public key is transferred to the second terminal 21, the third terminal 22, and the transaction blockchain 24, so that the first terminal 20, the second terminal 21, the third terminal 22, and the transaction blockchain 24 can store System transaction public key.

請參圖14所示,第一終端20接受由用戶輸入形成的上述核對資訊,而第一終端20將上述核對資訊傳遞至第二終端21與第三終端22,而當第二、三終端21、22接收到上述核對資訊時,第二終端21會確認上述核對資訊是否相符儲存於核對資料庫211的用戶資訊,而第三終端22會確認上述核對資訊是否相符儲存於比對資料庫221的用戶資訊,而當第二、三終端21、22都確認核對資訊的資訊內容符合於用戶資訊的資訊內容時,第二終端21會將上述第二密鑰進行轉換以形成上述第二電子簽章,並將上述第二電子簽章傳遞至第一終端20,而第三終端22會將上述第三密鑰進行轉換以形成上述第三電子簽章,並將上述第三電子簽章傳遞至第一終端20,第一終端20將上述第二、三電子簽章傳遞至交易區塊鏈24,而交易區塊鏈24會對上述第二、三電子簽章進行驗證以得知上述第二、三密鑰兩者的授權內容,進而交易區塊鏈24就能將上述交易公鑰的數位貨幣轉移到上述重製交易公鑰以完成替換步驟15。Referring to FIG. 14, the first terminal 20 accepts the verification information formed by user input, and the first terminal 20 transmits the verification information to the second terminal 21 and the third terminal 22, and when the second and third terminals 21 When receiving the verification information, the second terminal 21 confirms whether the verification information matches the user information stored in the verification database 211, and the third terminal 22 confirms whether the verification information matches the storage information in the comparison database 221. User information, and when the second and third terminals 21, 22 confirm that the information content of the verification information is consistent with the information content of the user information, the second terminal 21 will convert the second key to form the second electronic signature , And transfer the second electronic signature to the first terminal 20, and the third terminal 22 will convert the third key to form the third electronic signature, and transfer the third electronic signature to the first A terminal 20. The first terminal 20 transmits the second and third electronic signatures to the transaction blockchain 24, and the transaction blockchain 24 verifies the second and third electronic signatures to know the second and third electronic signatures. The authorized content of both the three keys, and then the transaction blockchain 24 can transfer the digital currency of the transaction public key to the reworked transaction public key to complete the replacement step 15.

上述所舉實施例,僅用為方便說明本發明並非加以限制,在不離本發明的創作範疇,熟悉此一行業技藝人士依本發明申請專利範圍及發明說明所作之各種簡易變形與修飾,均仍應含括於以下申請專利範圍中。The above-mentioned embodiments are only for the convenience of describing the present invention, not to limit it. Without departing from the creative scope of the present invention, those skilled in the art who are familiar with this industry and applying the patent scope of the present invention and various simple modifications and modifications made by the invention description are still It should be included in the following patent applications.

1:數位貨幣交易方法 10:公密鑰建立步驟 11:交易公鑰建立步驟 12:檢驗密鑰步驟 13:貨幣轉移步驟 14:公密鑰再建立步驟 15:替換步驟 2:數位貨幣交易系統 20:第一終端 21:第二終端 211:核對資料庫 212:用戶資料庫 22:第三終端 221:比對資料庫 23:網際網路 24:交易區塊鏈 25:儲存載具 251:微處理器 252:記憶體 253:安全晶片 253a:處理單元 1: Digital currency trading method 10: Public key establishment steps 11: Steps to create transaction public key 12: Steps to verify the key 13: Currency transfer steps 14: public key re-establishment steps 15: Replacement steps 2: digital currency trading system 20: First terminal 21: Second terminal 211: Check database 212: User database 22: Third terminal 221: Compare database 23: Internet 24: Trading blockchain 25: storage vehicle 251: Microprocessor 252: Memory 253: Security chip 253a: Processing unit

圖1為本發明數位貨幣交易方法於第一較佳實施例的流程示意圖; 圖2為數位貨幣交易系統的方塊圖; 圖3A至圖3C為圖1中公密鑰建立步驟的示意圖; 圖4為圖1中交易公鑰建立步驟的示意圖; 圖5為圖1中檢驗密鑰步驟的示意圖; 圖6為圖1中貨幣轉移步驟的示意圖; 圖7為於第二較佳實施例中公密鑰建立步驟的示意圖; 圖8為於第二較佳實施例中交易公鑰建立步驟的示意圖; 圖9為於第三較佳實施例中檢驗密鑰步驟的示意圖; 圖10為於第三較佳實施例中貨幣轉移步驟的示意圖; 圖11為本發明數位貨幣交易方法於第四較佳實施例的流程示意圖; 圖12為於第四較佳實施例中公密鑰再建立步驟的示意圖; 圖13為於第四較佳實施例中替換步驟的示意圖;以及 圖14為交易公鑰的數位貨幣轉移到重製交易公鑰的示意圖。 1 is a schematic flowchart of the digital currency transaction method of the present invention in the first preferred embodiment; Figure 2 is a block diagram of a digital currency trading system; 3A to 3C are schematic diagrams of steps for establishing a public key in FIG. 1; 4 is a schematic diagram of the steps of establishing the transaction public key in FIG. 1; 5 is a schematic diagram of the key verification step in FIG. 1; Figure 6 is a schematic diagram of the money transfer steps in Figure 1; 7 is a schematic diagram of a public key establishment step in the second preferred embodiment; 8 is a schematic diagram of the steps of establishing a transaction public key in the second preferred embodiment; 9 is a schematic diagram of the key verification step in the third preferred embodiment; 10 is a schematic diagram of the money transfer step in the third preferred embodiment; 11 is a schematic flowchart of the digital currency transaction method of the present invention in the fourth preferred embodiment; 12 is a schematic diagram of the public key re-establishment step in the fourth preferred embodiment; 13 is a schematic diagram of replacement steps in the fourth preferred embodiment; and FIG. 14 is a schematic diagram of the transfer of digital currency of the transaction public key to the reworked transaction public key.

1:數位貨幣交易方法 1: Digital currency trading method

10:公密鑰建立步驟 10: Public key establishment steps

11:交易公鑰建立步驟 11: Steps to create transaction public key

12:檢驗密鑰步驟 12: Steps to verify the key

13:貨幣轉移步驟 13: Currency transfer steps

Claims (6)

一種多重密鑰授權的數位貨幣交易方法,包含: 一公密鑰建立步驟:提供一表示用戶身分的用戶資訊,而一第一終端、一第二終端以及一第三終端三者分別形成對應於上述用戶資料的一組公鑰與密鑰,使得上述第一終端具有一第一密鑰與一第一公鑰、而上述第二終端一第二密鑰與一第二公鑰,則上述第三終端具有一第三密鑰與一第三公鑰; 一交易公鑰建立步驟:上述第一終端、第二終端與第三終端三者取得一透過上述第一公鑰、第二公鑰與第三公鑰結合產生的交易公鑰,上述交易公鑰能依據一對應於上述第一密鑰的第一電子簽章、一對應於上述第二密鑰的第二電子簽章與一對應於上述第三密鑰的第三電子簽章三者的其中兩者以上來授權轉移數位貨幣; 一檢驗密鑰步驟:提供一具有用戶個資的核對資訊,並核對上述核對資訊符合於上述用戶資訊,當上述核對資訊相符於上述用戶資訊時,上述第一終端、第二終端與第三終端三者其中之一取得上述第一電子簽章、第二電子簽章與第三電子簽章三者之其中兩者以上;以及 一貨幣轉移步驟:形成一交易資訊,並取得上述第一電子簽章、第二電子簽章與第三電子簽章三者之其中兩者以上,使上述交易公鑰能依循上述交易資訊轉移上述交易公鑰的數位貨幣。 A multi-key authorized digital currency transaction method, including: A public key establishment step: providing user information indicating the identity of the user, and a first terminal, a second terminal, and a third terminal respectively form a set of public keys and keys corresponding to the user data, so that The first terminal has a first key and a first public key, and the second terminal has a second key and a second public key, and the third terminal has a third key and a third public key key; A transaction public key creation step: the first terminal, the second terminal and the third terminal obtain a transaction public key generated by combining the first public key, the second public key and the third public key, and the transaction public key Can be based on a first electronic signature corresponding to the first key, a second electronic signature corresponding to the second key, and a third electronic signature corresponding to the third key More than two to authorize the transfer of digital currency; A key verification step: provide verification information with user's personal information, and verify that the verification information is consistent with the user information, and when the verification information matches the user information, the first terminal, the second terminal, and the third terminal One of the three obtains two or more of the above-mentioned first electronic signature, second electronic signature and third electronic signature; and A currency transfer step: forming a transaction information and obtaining two or more of the first electronic signature, the second electronic signature and the third electronic signature, so that the transaction public key can transfer the transaction information according to the transaction information The digital currency of the transaction public key. 如請求項第1項所述多重密鑰授權的數位貨幣交易方法,其中,上述多重密鑰授權的數位貨幣交易方法進一步包含: 一公密鑰再建立步驟:上述第一終端、第二終端以及第三終端三者其中之一形成對應於上述用戶資訊的一第四密鑰與一第四公鑰; 一替換步驟:將上述第一公鑰、第二公鑰以及第三公鑰三者其中之二與上述第四公鑰結合形成一重製交易公鑰,並取得對應於上述第一公鑰、第二公鑰以及第三公鑰三者其中之二的密鑰,使上述交易公鑰的數位貨幣能轉移到上述重製交易公鑰。 The digital currency transaction method for multiple key authorization as described in item 1 of the claim, wherein the digital currency transaction method for multiple key authorization further includes: A public key re-establishment step: one of the first terminal, the second terminal, and the third terminal forms a fourth key and a fourth public key corresponding to the user information; A replacement step: combine two of the first public key, the second public key, and the third public key with the fourth public key to form a reworked transaction public key, and obtain the corresponding first public key, third The key of two of the two public keys and the third public key enables the digital currency of the transaction public key to be transferred to the rework transaction public key. 如請求項第1項所述多重密鑰授權的數位貨幣交易方法,其中,於上述公密鑰建立步驟中,將上述用戶資訊傳遞至上述第一終端、第二終端與第三終端,而上述第一終端、第二終端與第三終端三者於接收到上述用戶資訊之後,上述第一終端、第二終端與第三終端各自形成上述一組公鑰與密鑰。The multi-key authorized digital currency transaction method as described in claim 1, wherein in the public key creation step, the user information is transferred to the first terminal, the second terminal and the third terminal, and the above After the first terminal, the second terminal, and the third terminal receive the user information, the first terminal, the second terminal, and the third terminal each form the set of public keys and keys. 如請求項第1項所述多重密鑰授權的數位貨幣交易方法,其中,於上述公密鑰建立步驟中,上述第一終端、第二終端以及第三終端三者分別具有至少一組沒有經過設定的初始公密鑰,而上述初始公密鑰依據上述用戶資訊而設定轉換為上述公鑰與密鑰。The multi-key authorized digital currency transaction method as described in claim 1, wherein, in the public key establishment step, the first terminal, the second terminal, and the third terminal each have at least one group that has not passed The initial public key is set, and the initial public key is set to be converted into the public key and key according to the user information. 如請求項第1項所述多重密鑰授權的數位貨幣交易方法,其中,於上述交易公鑰建立步驟中,上述第一終端取得上述第二公鑰與第三公鑰,使得上述第一終端具有上述第一公鑰與第二公鑰與第三公鑰,而上述第一終端將上述第一公鑰、第二公鑰與第三公鑰結合產生上述交易公鑰,並將上述交易公鑰傳遞至上述第二終端與第三終端。The multi-key authorized digital currency transaction method as described in claim 1, wherein in the transaction public key creation step, the first terminal obtains the second public key and the third public key, so that the first terminal Having the first public key, the second public key, and the third public key, and the first terminal combines the first public key, the second public key, and the third public key to generate the transaction public key, and the transaction public key The key is transferred to the above-mentioned second terminal and third terminal. 如請求項第1項所述多重密鑰授權的數位貨幣交易方法,其中,於上述交易公鑰建立步驟中,上述第一終端、第二終端與第三終端各自取得上述第一公鑰、第二公鑰與第三公鑰,而上述第一終端、第二終端與第三終端分別將上述第一公鑰、第二公鑰與第三公鑰結合形成上述交易公鑰。The multi-key authorized digital currency transaction method as described in claim 1, wherein in the step of establishing the transaction public key, the first terminal, the second terminal, and the third terminal each obtain the first public key, the third Two public keys and a third public key, and the first terminal, the second terminal, and the third terminal respectively combine the first public key, the second public key, and the third public key to form the transaction public key.
TW108108536A 2019-03-13 2019-03-13 Method for digital currency transaction with authorization of multiple private key TWI695614B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW108108536A TWI695614B (en) 2019-03-13 2019-03-13 Method for digital currency transaction with authorization of multiple private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW108108536A TWI695614B (en) 2019-03-13 2019-03-13 Method for digital currency transaction with authorization of multiple private key

Publications (2)

Publication Number Publication Date
TWI695614B true TWI695614B (en) 2020-06-01
TW202034653A TW202034653A (en) 2020-09-16

Family

ID=72176111

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108108536A TWI695614B (en) 2019-03-13 2019-03-13 Method for digital currency transaction with authorization of multiple private key

Country Status (1)

Country Link
TW (1) TWI695614B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI813938B (en) * 2021-01-27 2023-09-01 合作金庫商業銀行股份有限公司 Blockchain-based trust and custody system for digital asset

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020029200A1 (en) * 1999-09-10 2002-03-07 Charles Dulin System and method for providing certificate validation and other services
US20130173912A1 (en) * 2011-12-28 2013-07-04 Peking University Founder Group Co., Ltd. Digital right management method, apparatus, and system
US20140164765A1 (en) * 2011-05-13 2014-06-12 Telefonica, S.A. Procedure for a multiple digital signature

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020029200A1 (en) * 1999-09-10 2002-03-07 Charles Dulin System and method for providing certificate validation and other services
US20140164765A1 (en) * 2011-05-13 2014-06-12 Telefonica, S.A. Procedure for a multiple digital signature
US20130173912A1 (en) * 2011-12-28 2013-07-04 Peking University Founder Group Co., Ltd. Digital right management method, apparatus, and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI813938B (en) * 2021-01-27 2023-09-01 合作金庫商業銀行股份有限公司 Blockchain-based trust and custody system for digital asset

Also Published As

Publication number Publication date
TW202034653A (en) 2020-09-16

Similar Documents

Publication Publication Date Title
US10706136B2 (en) Authentication-activated augmented reality display device
RU2538330C2 (en) Mobile payment device, method of preventing unauthorised access to payment application and data memory element
CN101095162B (en) System and method for secure transaction module
US20190122212A1 (en) Methods and systems for provisioning payment credentials
US20170076291A1 (en) Proxy device for representing multiple credentials
US20050156026A1 (en) EMV transactions in mobile terminals
US11315122B2 (en) Authentication method for e-wallet carrier
KR20090023491A (en) Consumer Authentication System and Method
US11157895B2 (en) Payment devices having multiple modes of conducting financial transactions
US20200320527A1 (en) Method for digital currency transaction with authorization of multiple private keys
US20150007300A1 (en) Method, apparatus, and system for using ic card as authentication medium
US20200327511A1 (en) Multiple authentication method for digital asset transaction
TWI695614B (en) Method for digital currency transaction with authorization of multiple private key
US20250272372A1 (en) Remote creation of virtual credential bound to physical location
CN108475374B (en) Payment devices with multiple modes for conducting financial transactions
US10555173B2 (en) Pairing authentication method for electronic transaction device
TWI646481B (en) Pairing authentication method for electronic transaction device
CN111695896A (en) Digital currency transaction method authorized by multiple keys
JP6845888B2 (en) Authentication method for electronic wallet media
TWI730304B (en) Multiple authentication method for digital asset transaction
CN110119946B (en) Pairing authentication method of electronic transaction device
JP6559831B1 (en) Pairing authentication method for electronic transaction equipment
JP2020174324A (en) Digital currency trading method with multiple private key authorization
KR102046708B1 (en) Pairing authentication method for electronic transaction device
TWI258968B (en) Authentication device