[go: up one dir, main page]

CN109872155A - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN109872155A
CN109872155A CN201910132899.5A CN201910132899A CN109872155A CN 109872155 A CN109872155 A CN 109872155A CN 201910132899 A CN201910132899 A CN 201910132899A CN 109872155 A CN109872155 A CN 109872155A
Authority
CN
China
Prior art keywords
private key
server
key component
transaction
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910132899.5A
Other languages
Chinese (zh)
Inventor
安瑞
谢翔
傅志敬
孙立林
谢红军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Matrix Technology (shenzhen) Co Ltd
Original Assignee
Matrix Technology (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matrix Technology (shenzhen) Co Ltd filed Critical Matrix Technology (shenzhen) Co Ltd
Priority to CN201910132899.5A priority Critical patent/CN109872155A/en
Publication of CN109872155A publication Critical patent/CN109872155A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present application provides a kind of data processing method and device, client preserves the first private key component, and server preserves the second private key component, and method includes: response transaction data processing request, authentication request is initiated, carries out bidirectional identification verifying with server;After being verified, call the first MPC node for defaulting in client using the first private key component as input, and the 2nd MPC node for defaulting in server carries out preset functional operation according to preset rules using the second private key component as input, trading signature is obtained, transaction data processing is carried out.Due to the program by first will transaction private key split, then by after fractionation the first private key component and the second private key component be retained separately;When in use, and the MPC node of calling two sides is utilized respectively above-mentioned private key component and participates in operation jointly to generate trading signature, to solve key using unsafe technical problem, and meets user for the control of transaction private key.

Description

Data processing method and device
Technical field
This application involves Internet technical field, in particular to a kind of data processing method and device.
Background technique
When carrying out transaction data processing, it is often necessary to generate corresponding trading signature as transaction certificate, further according to this Trading signature completes corresponding transaction data processing.For example, being called in the corresponding user account according to the trading signature of user Funds data carrys out payment transaction order etc..
Currently, the processing method of existing transaction data, user is needed to save by used client oneself mostly, Manage complete key (such as transaction private key);When carrying out transaction data processing, then obtains and use the complete key raw At trading signature, to complete the processing of corresponding transaction data.
The above method is when it is implemented, due to needing user to save alone, managing complete transaction private key, or general completely Complete transaction private key escrow is to third party, and the specifically used and complete key in transaction data treatment process.Base In this data processing method, if some part in data processing, key used by a user leaked or It steals, then the transaction data processing of the user will face higher security risk.For example, if third party passes through certain channel Or mode steals certain transaction private key used by a user in transaction data treatment process, it is possible to directly private using the transaction Key voluntarily generates the trading signature of the user, the funds data in account to call the user, causes the economic damage of the user It loses.Therefore, existing method uses unsafe technical problem when it is implemented, often there is key.
In view of the above-mentioned problems, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the present application provides a kind of data processing method and device, to solve the processed of existing transaction data Due to needing to use complete private key in journey, private key is caused to use unsafe technical problem.
The embodiment of the present application provides a kind of data processing method, and the data processing method is applied to client, described Client preserves the first private key component, which comprises
Response transaction data processing request initiates authentication request;
The authentication request is responded, carries out bidirectional identification verifying with server, wherein the server preserves the Two private key components, wherein the first private key component and the second private key component are according to client transaction generated Private key generates;
In the case where bidirectional identification is verified, call the first MPC node for defaulting in client private with described first Key component is as input data, and defaults in the 2nd MPC node of server using the second private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature;
According to the trading signature, transaction data processing is carried out.
In one embodiment, the authentication request is responded, carries out bidirectional identification verifying with server, comprising:
It responds the authentication request, generates the first public key and the first private key, wherein first public key and described the The matching of one private key;
First public key is sent to server, and receives the second public key, wherein the server is for responding the body Part checking request, generates the second public key and the second private key;
Receive encryption data and the first signed data, wherein the encryption data is the server according to described first The data that the first random number is encrypted in public key, first signed data are the server according to described the Two private keys carry out the data that signature is handled to the encryption data;
According to second public key, the encryption data, first signed data, the first operation is carried out, to determine clothes Business body part verifies whether to pass through, and in the case where determining that server authentication passes through, according to second public key to institute It states encryption data to be decrypted, obtains first random number;
Signature processing is carried out to first random number according to first private key, obtains the second signed data, and to institute It states server and sends second signed data;
Receive the identification information of the server feedback, wherein the server be used for according to first public key, First random number, second signed data carry out the second operation, to determine that client identity verifies whether to pass through, and In the case where determining that the client identity is verified, Xiang Suoshu client sends confirmation instruction information.
In one embodiment, in response transaction data processing request, before initiating authentication request, the method is also Include:
Response key generates request, generates transaction private key and transaction public key, wherein the transaction private key and the transaction are public Key matching;
According to the transaction private key, the first private key component, the second private key component are generated;
The first private key component is stored in client local, the second private key component is sent to server, In, the server is for saving the second private key component.
In one embodiment, the second private key component is sent to server, comprising:
Obtain transmission public key, wherein the transmission public key is server generation, and the server is preserved and the transmission The transmission private key of public key match;
The second private key component is encrypted according to the transmission public key, obtains encrypted second private key point Amount;
The encrypted second private key component is sent to the server.
In one embodiment, according to the transaction private key, after generating the first private key component, the second private key component, institute State method further include:
According to the transaction private key, the first spare private key component, the second spare private key component are generated;
Described first spare private key component is stored in client local, the described second spare private key component is sent to clothes Business device.
In one embodiment, the method also includes:
Response updates request;Call the first MPC node for defaulting in client using the first private key component as input Data, and default in the 2nd MPC node of server using the second private key component as input data, according to preset rules into Row third operation generates updated first private key component and updated second private key component;
It obtains and saves the updated first private key component, wherein the updated second private key component saves In the server.
In one embodiment, after obtaining and saving the updated first private key component, the method also includes:
Response key checking request calls the first MPC node for defaulting in client with updated first private key Component is as input data, and defaults in the 2nd MPC node of server using the updated second private key component as defeated Enter data, carries out the 4th operation according to preset rules, generate updated transaction public key;
According to the transaction public key and the updated transaction public key, determine the updated first private key component, Whether the updated second private key component meets the requirements.
In one embodiment, after obtaining and saving the updated first private key component, the method also includes:
Response key checking request generates the second random number, and second random number is sent to server;
Call the first MPC node for defaulting in client using the updated first private key component as input data, With default in the 2nd MPC node of server using the updated second private key component as input data, according to default rule Signature processing then is carried out to second random number, obtains third signed data;
According to the transaction public key and the third signed data, the updated first private key component, described is determined Whether updated second private key component meets the requirements.
In one embodiment, the method also includes:
In the case where the first private key component is lost, calls and default in the first MPC node of client with described the One spare private key component is input data, and defaults in the 2nd MPC node of server with the described second spare private key component and be Input data carries out the 5th operation according to preset rules, generates third private key component and the 4th private key component;
It obtains, and is stored in client local for the third private key component as the first private key component, wherein described the Four private key components are stored in the server as the second private key component.
In one embodiment, the server preserves the second private key component, which comprises
Response identity checking request carries out bidirectional identification verifying with client, wherein the client preserves the first private Key component;
In the case where bidirectional identification is verified, call the 2nd MPC node for defaulting in server private with described second Key component is as input data, and defaults in the first MPC node of client using the first private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature.
The embodiment of the present application also provides a kind of data processing method, the data processing method is applied to include server In the system of client, the client preserves the first private key component, and the server preserves the second private key component, In, the first private key component and the second private key component are generated according to client transaction private key generated, described Method includes:
The client end response response transaction data processing request initiates authentication request;
The client and the server respond the authentication request, carry out bidirectional identification verifying;
In the case where bidirectional identification is verified, call the first MPC node for defaulting in client private with described first Key component is as input data, and defaults in the 2nd MPC node of server using the second private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature;
According to the trading signature, transaction data processing is carried out.
The embodiment of the present application also provides a kind of data processing equipments, comprising:
Initiation module is used for response transaction data processing request, initiates authentication request, wherein the data processing fills The first private key component is preserved in setting;
Authentication module carries out bidirectional identification verifying with server, wherein described for responding the authentication request Server preserves the second private key component, wherein the first private key component and the second private key component are according to the client Transaction private key generated is held to generate;
Calling module, for calling the first MPC node for defaulting in client in the case where bidirectional identification is verified Using the first private key component as input data, and the 2nd MPC node of server is defaulted in the second private key component As input data, preset functional operation is carried out according to preset rules, obtains operation result as trading signature;
Processing module, for carrying out transaction data processing according to the trading signature.
The embodiment of the present application also provides a kind of computer readable storage mediums, are stored thereon with computer instruction, described Instruction, which is performed, realizes response transaction data processing request, initiates authentication request;The authentication request is responded, with Server carries out bidirectional identification verifying, wherein the server preserves the second private key component;It is verified in bidirectional identification In the case of, call the first MPC node for defaulting in client using the first private key component as input data, and default in clothes 2nd MPC node of business device carries out preset function fortune using the second private key component as input data, according to preset rules It calculates, obtains operation result as trading signature;According to the trading signature, transaction data processing is carried out, wherein described first is private Key component and the second private key component are generated according to client transaction private key generated.
The embodiment of the present application also provides a kind of data processing method, the data processing method is applied to client, institute The method of stating includes:
Response transaction data processing request initiates authentication request;
The authentication request is responded, carries out authentication with first server, second server, wherein described the One server is for saving the first private key component, and the second server is for saving the second private key component, wherein described first Private key component and the second private key component are generated according to client transaction private key generated;
In the case where authentication passes through, call the first MPC node for defaulting in first server private with described first Key component is as input data, and defaults in the 2nd MPC node of second server using the second private key component as input Data carry out preset functional operation according to preset rules, obtain operation result as trading signature;
According to the trading signature, transaction data processing is carried out.
In one embodiment, before response transaction data processing request, the method also includes:
Response key generates request, generates transaction private key and transaction public key, wherein the transaction private key and the transaction are public Key matching;
According to the transaction private key, the first private key component, the second private key component are generated;
The transaction public key is stored in client local, the first private key component is sent to first server, it will The second private key component is sent to second server.
In one embodiment, the first private key component is sent to first server, comprising:
Obtain the first transmission public key, wherein the first transmission public key is first server generation, the first server Preserve the first transmission private key with the first transmission public key match;
The first private key component is encrypted according to the first transmission public key, it is private to obtain encrypted first Key component;
The encrypted first private key component is sent to the first server.
In one embodiment, the authentication request is responded, identity is carried out with first server, second server and tests Card, comprising:
The authentication request is responded, generates the first random number, and first random number is respectively sent to first Server and second server;
Receive the first signed data, wherein first signed data is the first MPC node for defaulting in first server Using the first private key component as input data, and the 2nd MPC node of second server is defaulted in second private key Component carries out signature processing as input data, according to preset rules, obtained data;
According to first signed data and the transaction public key, determine whether authentication passes through.
In one embodiment, the authentication request is responded, identity is carried out with first server, second server and tests Card, comprising:
Respond the authentication request, Xiang Suoshu first server, and/or, it is public that the second server sends verifying Key acquisition request;
Receive verification public key, wherein the verification public key is to default in the first MPC node of first server with described the One private key component as input data, and default in the 2nd MPC node of second server using the second private key component as Input data carries out operation, obtained data according to preset rules;
According to the verification public key and the transaction public key, determine whether authentication passes through.
In one embodiment, the method also includes:
Response updates request, call default in the first MPC node of first server using the first private key component as Input data, and the 2nd MPC node of second server is defaulted in using the second private key component as input data, according to pre- If rule carries out functional operation, updated first private key component and updated second private key component are generated;Wherein, it is described more The first private key component after new is stored in first server, and the updated second private key component is stored in second server.
In one embodiment, request is updated in response, calls the first MPC node for defaulting in first server with described First private key component is as input data, and defaults in the 2nd MPC node of second server and made with the second private key component For input data, functional operation is carried out according to preset rules, generates updated first private key component and updated second private After key component, the method also includes:
Response key checking request generates the second random number;And second random number is respectively sent to first service Device and second server;
Receive the second signed data, wherein second signed data is the first MPC node for defaulting in first server Using the updated first private key component as input data, and the 2nd MPC node of second server is defaulted in described Updated second private key component carries out signature processing to second random number as input data, according to preset rules, obtains The data arrived;
According to the transaction public key and second signed data, the updated first private key component, described is determined Whether updated second private key component meets the requirements.
In one embodiment, request is updated in response, calls the first MPC node for defaulting in first server with described First private key component is as input data, and defaults in the 2nd MPC node of second server and made with the second private key component For input data, functional operation is carried out according to preset rules, generates updated first private key component and updated second private After key component, the method also includes:
Response key checking request calls the first MPC node for defaulting in first server with described updated first Private key component is as input data, and defaults in the 2nd MPC node of second server with updated second private key point Amount is used as input data, carries out operation according to preset rules, generates updated transaction public key;
According to the transaction public key and the updated transaction public key, determine the updated first private key component, Whether the updated second private key component meets the requirements.
The embodiment of the present application also provides a kind of data processing method, the data processing method is applied to first service Device, the first server preserve the first private key component, which comprises
Response identity checking request carries out authentication with the first client, second server, wherein second visitor Preserve the second private key component in family end, wherein the first private key component and the second private key component are according to the client Transaction private key generated generates;
In the case where authentication passes through, call the first MPC node for defaulting in first server private with described first Key component is as input data, and defaults in the 2nd MPC node of second server using the second private key component as input Data carry out preset functional operation according to preset rules, obtain operation result as trading signature.
The embodiment of the present application also provides a kind of data processing method, the data processing method is applied to include the first clothes It is engaged in the system of device, second server and client, the first server preserves the first private key component, the second service Device preserves the second private key component, wherein the first private key component and the second private key component are according to the client institute The transaction private key of generation generates, which comprises
The client end response response transaction data processing request initiates authentication request;
The client, the first server, the second server respond the authentication request, carry out identity Verifying;
In the case where authentication passes through, the first MPC node of first server is defaulted in first private key point Amount is used as input data, and defaults in the 2nd MPC node of second server using the second private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature, and the trading signature is fed back To client;
The client carries out transaction data processing according to the trading signature.
The embodiment of the present application also provides a kind of data processing equipments, comprising:
Initiation module is used for response transaction data processing request, initiates authentication request;
Authentication module carries out identity with first server, second server and tests for responding the authentication request Card, wherein the first server is for saving the first private key component, and the second server is for saving the second private key point Amount, wherein the first private key component and the second private key component are generated according to client transaction private key generated;
Calling module, for calling the first MPC node for defaulting in first server in the case where authentication passes through Using the first private key component as input data, and the 2nd MPC node of second server is defaulted in second private key Component carries out preset functional operation as input data, according to preset rules, obtains operation result as trading signature;
Processing module, for carrying out transaction data processing according to the trading signature.
In the embodiment of the present application, since the program is by advance separately protecting the first private key component and the second private key component It is stored in client and server two sides;When user needs to carry out transaction data processing, client is defaulted in further through calling First MPC node and the first private key component for defaulting in the 2nd MPC node of server and being saved respectively with each end and second private Key component carries out preset functional operation, Lai Shengcheng trading signature according to preset rules, so that handing over as input jointly Be not in complete private key in the treatment process of easy data, thus solve in the treatment process of existing transaction data due to It needs to cause key using unsafe technical problem using to integrity key, reached the place for reducing the transaction data of user Security risk during reason, improves the safety of transaction data processing, while meeting user to complete transaction private key The technical effect of demand for control.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the process flow diagram of the data processing method provided according to the application embodiment;
Fig. 2 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Fig. 3 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Fig. 4 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Fig. 5 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Fig. 6 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Fig. 7 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Fig. 8 is the composite structural diagram of the data processing equipment provided according to the application embodiment;
Fig. 9 is the electronic equipment composed structure schematic diagram based on data processing method provided by the embodiments of the present application;
Figure 10 is the process flow diagram of another data processing method provided according to the application embodiment;
Figure 11 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Figure 12 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Figure 13 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Figure 14 is one embodiment schematic diagram of the data processing method provided according to the application embodiment;
Figure 15 is one embodiment schematic diagram of the data processing method provided according to the application embodiment.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without making creative work Range.
In view of existing transaction data processing method, specific data processing is being carried out, when generating corresponding trading signature, Often it will appear and using complete key, such as complete transaction private key, this safety that can be handled to the transaction data of user Property brings larger hidden danger.For example, can use if third party has stolen the transaction private key in transaction data treatment process The private key generates the trading signature of user, and then can call the funds data in the user account, to cause the warp of user Ji loss.In addition, existing transaction data processing method, it is also necessary to which user takes care of alone complete private key, is equivalent to and allows user It goes alone to undertake all security risks, it is also not friendly enough for a user.To sum up, existing method is when it is implemented, often deposit Unsafe technical problem is used in key.
For the basic reason for generating above-mentioned technical problem, complete private key can be split as two by the application consideration Point, it is taken care of respectively by Platform Server with user client, so as to share consumer's risk;Meanwhile it needing to carry out When transaction data processing generates trading signature, multi-party computations are based on, preset MPC in invoking server, client is passed through Private key component of the node respectively to take care of participates in operation according to preset rules as input jointly, to generate trading signature, so that Be not in complete private key in entire calculating process, and make the process for generating trading signature safer and more reliable.To solve Due to needing to use integrity key in the treatment process of existing transaction data of having determined, key is caused to use unsafe technology Problem has reached the security risk in the treatment process for reducing the transaction data of user, has improved the safety of transaction data processing Property, while meeting user to the technical effect of the demand for control of complete transaction private key.
Based on above-mentioned thinking thinking, the embodiment of the present application provides a kind of data processing method.Referring specifically to shown in Fig. 1 According to the application embodiment provide data processing method process flow diagram.Data processing provided by the embodiments of the present application Method can be applied to client-side, when it is implemented, may comprise steps of.
S11: response transaction data processing request initiates authentication request.
In the present embodiment, above-mentioned client (can be denoted as Client) specifically can be understood as a kind of applied to user one Side can be realized the headend equipment of the functions such as data transmission, data operation.Specifically, above-mentioned client for example can be desk-top Computer, laptop, smart phone, digital assistants, intelligent wearable device, shopping guide's terminal, there is network to visit at tablet computer Ask the television set etc. of function.Alternatively, the client may be the software application that can be run in above-mentioned electronic equipment.Example Such as, it can be certain APP etc. run on mobile phone.
In the present embodiment, above-mentioned client can specifically pass through wired or wireless mode and business platform (such as net Network transaction platform, safeguard protection platform etc.) provided by Coupled processors, to carry out data interaction between each other, and number According to operation.
In the present embodiment, above-mentioned service implement body can be understood as a kind of positioned at business platform side, provide for user The rear end equipment of cipher key management services (Key Management Service), can be denoted as KMS, or referred to as trusteeship service Device.The server can be an electronic equipment with data operation, store function and network interaction function;It can also be with To run in the electronic equipment, the software program of support is provided for data processing, storage and network interaction.In the present embodiment In, the quantity of not specific Limited service device.It is emphasized that above-mentioned server is specially a server.
In the present embodiment, for generating required trading signature in transaction data treatment process, originally by client Individually take care of complete transaction private key can have been split into advance two parts, it may be assumed that the first private key component (sk1 can be denoted as) and Second private key component (can be denoted as sk2).The i.e. described first private key component and the second private key component are according to the client Transaction private key generated generates.And existing transaction data processing method, often occur and using complete transaction private key Generate the trading signature of corresponding user.In this case, third party once steals to obtain the complete transaction private key, energy It is readily generated the trading signature of user, and then calls the funds data in the account of the user by the trading signature.
But in the present embodiment, since complete private key has first been split into two private key components, and with above-mentioned two private Key component substitutes complete private key and participates in specific data processing.It therefore, is not in complete in entire data handling procedure Transaction private key, only will appear the first private key component and the second private key component.In this case, if third party steals wherein One private key component is often the trading signature that can not directly generate user, so as to improve the transaction data processing of user Safety.Meanwhile although in order to which the safety of transaction data processing will not be used directly in normal transaction data treatment process To transaction private key, client is completely traded private key under can saving in private key component generating process, to be able to satisfy user To the demand for control of complete transaction private key.In this way under certain emergency cases, for example, the second private key point that server is taken care of When something goes wrong, the complete transaction private key that user can also temporarily be saved using client carries out transaction data processing to amount. Meanwhile and due to also preserving complete transaction private key while preserving the first private key component on the client, so that user For transaction data processing have higher control, thus be able to satisfy do not have in the case of different user it is diversified using need It asks.
It further, can be by the first private key component and the second private key component point after having obtained above-mentioned two private key component It opens, and is stored in client, server two sides respectively.Use can be shared by the relatively high Platform Server of safety in this way The risk of private key is taken care of alone at family, while can also be reduced since two private key component keepings are at one, and that is stolen simultaneously is several Rate, so as to further increase the safety that the transaction data of user is handled.
In the present embodiment, above-mentioned transaction data processing request specifically can be understood as user by client initiate into The request instruction of row transaction data processing.For example, user clicks the key of payment confirmation, Ke Yili by the payment software of mobile phone Solution is that user has initiated a kind of transaction data processing request.Certainly, above-mentioned cited transaction data processing request is one kind It schematically illustrates.When it is implemented, as the case may be and processing requirement, above-mentioned transaction data processing request can also include Other forms or content.In this regard, this specification is not construed as limiting.
In one embodiment, it is based on above-mentioned consideration, when it is implemented, can be refering to shown in Fig. 2 according to the application reality One embodiment schematic diagram for the data processing method that the mode of applying provides is initiated identity and is tested in response transaction data processing request Before card request, complete transaction private key originally first can be split into two parts in the following way, and be stored in visitor respectively Family end and server two sides.
S1: response key generates request, generates transaction private key and transaction public key, wherein the transaction private key and the friendship Easy public key match;
S2: according to the transaction private key, the first private key component, the second private key component are generated;
S3: being stored in client local for the first private key component, the second private key component be sent to server, Wherein, the server is for saving the second private key component.
In the present embodiment, when it is implemented, client, which can receive user, issues key generation request, and it is close to respond this Key generates request, generates the transaction private key (can be denoted as sk) being mutually matched and transaction public key (can be denoted as pk).Wherein, above-mentioned Transaction private key and transaction public key are complete keys.
In the present embodiment, after client generates above-mentioned transaction private key, transaction private key first can be split into two Part.Specifically, it is above-mentioned according to the transaction private key, the first private key component, the second private key component are generated, may include: client End by secret sharing (i.e. key is shared, a method of distribution saves, Restore Secret key), with private key of trading As input, two corresponding key components are generated, it may be assumed that the first private key component and the second private key component.Certainly, it needs to illustrate Be, above-mentioned cited the first private key of generation component, the second private key component mode be that one kind schematically illustrates.Specific implementation When, as the case may be and confidentiality requirement, the private key that can also will be traded using other suitable modes split into two parts.It is right This, this specification is not construed as limiting.
It in the present embodiment, can be by the first private key after client generates the first private key component and the second private key component Component is stored in client local, is managed and is used with client.Meanwhile the second private key component is sent to server, It is managed by server and is used.So as to reduce the risk that user individually takes care of.
In one embodiment, in order to protect the second private key component not stolen by third party during being sent to server It takes, protects the data of user to pacify and go, it is above-mentioned that the second private key component is sent to server, when it is implemented, may include The following contents:
S1: obtain transmission public key, wherein the transmission public key be server generate, the server preserve with it is described Transmit the transmission private key of public key match;
S2: being encrypted the second private key component according to the transmission public key, and it is private to obtain encrypted second Key component;
S3: the encrypted second private key component is sent to the server.
In the present embodiment, client can first be sent to server before sending the second private key component to server Transmit public key acquisition request.Server can first respond above-mentioned transmission public key after receiving above-mentioned transmission public key acquisition request Acquisition request, generate be mutually matched it is public and private right, it may be assumed that transmission public key (pk_s can be denoted as) and transmit private key (can remember For sk_s).And transmission public key therein is sent to client, it is stored in corresponding transmission private key.Client can obtain in this way Take the matched transmission public key of the transmission private key saved with server.
In the present embodiment, client can be encrypted the second private key component first with above-mentioned transmission public key, Obtain encrypted second private key component (ciphertext t can be denoted as, be a kind of encryption data);Again by encrypted second private key point Amount is sent to server.What it is due to transmission is encrypted second private key component, in the case where no matched transmission private key, Even if third party has stolen encrypted second private key component in transmission process, can not also decrypt to obtain the second private key component, So as to protect the data safety in the second private key component processes of transmission.
In the present embodiment, server can use saved biography after receiving encrypted second private key component Above-mentioned encrypted second private key component is decrypted in defeated private key, obtains the second private key component, and private by above-mentioned second Key component is stored in server.Server, can also be to client feedback, to indicate to obtain after decryption obtains the second private key component The second private key component is taken.
In the present embodiment, after server generates transmission public key and transmission private key, public key will can not also directly be transmitted It the modes such as is sent to client, and by client by inquiry, such as tables look-up, obtain above-mentioned transmission public key.Such as client What obtains above-mentioned transmission public key, and this specification is not construed as limiting.
In one embodiment, it is public can also to save lower transaction while preservation management the first private key component for client Key.But under normal conditions, which will not be used directly to participate in the processing of particular transactions data, and can be used for participating in The processing such as verifying that subsequent private key updates.
In one embodiment, it is private can also to save lower transaction while preservation management the first private key component for client Key.But saving lower transaction private key will not be used directly to participate in relevant data processing.It is of course also possible to by above-mentioned transaction private key It destroys etc..
In one embodiment, when it is implemented, client, server can be using in the storage modes of act set forth below Any one save the first private key component for being responsible for keeping, the second private key component: by hardware store, by using helping Word storage is remembered, by using password encryption storage etc..Certainly, it should be noted that above-mentioned cited storage mode is In order to which this specification embodiment is better described.When it is implemented, as the case may be and security requirements, it can also be used He stores private key component by suitable storage mode.In this regard, this specification is not construed as limiting.
In the present embodiment, in order to further increase the Information Security in transaction data treatment process, client is being connect After the transaction data processing request for receiving user's sending, authentication request can be first initiated between clients and servers, To recall the private key component that both sides respectively take care of and carry out specifically after the identity of verifying client and server to be errorless Transaction data processing.So as to find identity client of problems or server in time, letting out for private key component is avoided Leakage.
S13: responding the authentication request, carries out bidirectional identification verifying with server, wherein the server saves There is the second private key component.
In the present embodiment, above-mentioned authentication request specifically can be understood as a kind of for client and server both sides The authentication request of progress, i.e., a kind of two-way authentication request.
In the present embodiment, the above-mentioned response authentication request carries out bidirectional identification verifying with server, specifically may be used Above-mentioned authentication request can be responded to be interpreted as client and server, carries out authentication respectively between each other, it may be assumed that can To be first whether legal by the identity of client validation server then whether legal by the identity of server authentication client.When So, be also possible to first it is whether legal by the identity of server authentication client, then by client validation server identity whether It is legal etc..To complete above-mentioned bidirectional identification verifying (or two-way authentication).
In one embodiment, whether legal by the identity of client validation server with elder generation, then by server authentication visitor For whether the identity at family end is legal, the above-mentioned response authentication request carries out bidirectional identification verifying with server, specifically When implementation, it can illustrate refering to one embodiment of the data processing method shown in Fig. 3 provided according to the application embodiment Figure, including the following contents:
S1: responding the authentication request, generates the first public key and the first private key, wherein first public key and institute State the matching of the first private key;
S2: first public key is sent to server, and receives the second public key, wherein the server is for responding institute Authentication request is stated, the second public key and the second private key are generated;
S3: encryption data and the first signed data are received, wherein the encryption data is the server according to described the The data that the first random number is encrypted in one public key, first signed data are the server according to Second private key carries out the data that signature is handled to the encryption data;
S4: to determine whether server authentication passes through, and according to first operation result, server is determined In the case that authentication passes through, the encryption data is decrypted according to second public key, obtains described first Random number;
S5: carrying out signature processing to first random number according to first private key, obtains the second signed data, and to The server sends second signed data;
S6: the identification information of the server feedback is received, wherein the server is used for public according to described first Key, first random number, second signed data carry out the second operation, to determine that client identity verifies whether to pass through, And in the case where determining that the client identity is verified, Xiang Suoshu client sends confirmation instruction information.
In the present embodiment, it when it is implemented, client can respond above-mentioned authentication request, generates and is mutually matched First public key (pk_c can be denoted as) and the first private key (sk_c);Meanwhile server is generated also responsive to above-mentioned authentication request The second public key (pk_s can be denoted as) and the second private key (sk_s can be denoted as) being mutually matched.
In the present embodiment, when it is implemented, the first public key can be sent to server by client, while service is received The second public key that device is sent.Opposite, the second public key can be sent to client by server, while receive client transmission First public key.
In the present embodiment, when it is implemented, server is after receiving the first public key, the first random number can first be generated (can be denoted as m) recycles the first public key that above-mentioned first random number is encrypted, and obtaining corresponding encryption data (can To be denoted as cxt).Further, server can use the second private key and carry out signature processing to above-mentioned encryption data, obtain corresponding First signed data (can be denoted as sig).Above-mentioned encryption data and the first signed data are sent to client again, so as to client End, which can receive, obtains above-mentioned encryption data and the first signed data.
In the present embodiment, specifically, for example, server can in the following way carry out at encryption the first random number Reason: Enc (pk_c, m) → cxt.Wherein, Enc specifically can be used to indicate that cryptographic calculation.Server can be right in the following way Encryption data carries out signature processing: Sign (sk_s, m) → sig.Wherein, Sign specifically can be used to indicate that signature operation.
In the present embodiment, client, can be first according to after receiving above-mentioned encryption data and the first signed data Two public keys, encryption data and the first signed data, whether the identity for carrying out authentication server is legal, i.e. determination is carrying out data friendship Whether mutual server is trusted Platform Server.If the identity of authentication server is legal, it is determined that server identity It is verified.If the identity of authentication server is illegal, it is determined that server authentication does not pass through.
In the present embodiment, when it is implemented, client can be according to the second public key, encryption data, described First signed data carries out the first operation, obtains the first operation result;Further according to the first operation result, server identity is determined It verifies whether to pass through.
In the present embodiment, specifically, for example, client can carry out the first operation: Verify in the following way (pk_s,cxt,sig)→y.Wherein, Verify can specifically indicate verifying operation, and y can specifically indicate the first operation result. If the numerical value of the first operation result is 1, it can determine that server authentication passes through.If the numerical value of the first operation result It is not 1, for example, 0, then can determines that server authentication does not pass through.
In the present embodiment, client is in the case where determining the unacceptable situation of server authentication, it can be determined that the service There are problems for the identity of device, and carrying out transaction data processing with the server, there are high risks, at this moment can stop subsequent number According to processing, and the prompt information suspicious to the user feedback server identity.The data with the server can also be suspended simultaneously Interaction, the information data for avoiding client from taking care of are compromised or steal.
In the present embodiment, client is in the case where determining that server authentication passes through, it can be determined that judges the clothes There is no problem for the identity of business device, at this moment can be first decrypted according to the second public key to above-mentioned encryption data, obtain first Random number.
In the present embodiment, specifically, for example, client can be decrypted in the following way: Dec (sk_c, cxt)→m.Wherein, Dec can specifically indicate decryption operation.
In the present embodiment, client is obtaining above-mentioned first random number, may further be using the first private key to first Random number carries out signature processing, obtains corresponding second signed data (can be denoted as sig_m);And by above-mentioned second signed data It is sent to server, so that server can be verified according to identity of second signed data to client.
In the present embodiment, specifically, for example, client can carry out signature processing: Sign (sk_ in the following way c,m)→sig_m.Wherein, Sign specifically can be used to indicate that signature operation.
In the present embodiment, server is after receiving above-mentioned second signed data, can according to the first public key, first with Machine number and the second signed data, it is whether legal come the identity of verifying client, that is, determine the client for carrying out data interaction It whether is that institute user holds the client device used.If the identity for verifying client is legal, it is determined that client identity is tested Card passes through.If the identity of client is illegal, it is determined that client identity verifying does not pass through.
In the present embodiment, when it is implemented, server can be according to first public key, the first random number, the second label Name data, carry out the second operation, obtain the second operation result;Further according to the second operation result, determine that client identity verifying is It is no to pass through.
In the present embodiment, specifically, for example, server can carry out the second operation: Verify in the following way (pk_c,m,sig_m)→Y.Wherein, Y can specifically indicate the second operation result.If the numerical value of the second operation result is 1, It can determine that client identity is verified.If the numerical value of the second operation result is not 1, for example, 0, then it can determine client End authentication does not pass through.
In the present embodiment, server is in the case where determining the unacceptable situation of client identity verifying, it can be determined that the client There are problems for the identity at end, and carrying out transaction data processing with the client, there are high risks, at this moment can stop subsequent number According to processing.Can also suspend data interaction with the client simultaneously, the information data for avoiding server from taking care of be compromised or It steals.
In the present embodiment, server is in the case where determining that client identity is verified, it can be determined that judges the visitor There is no problem for the identity at family end, at this moment can determine that bidirectional identification is verified, i.e., the identity of client and server is all to close Method, the processing of subsequent data can be carried out.Server can be generated after determining that client identity is verified, and to Client feedback confirmation instruction information can carry out subsequent data processing to be verified to client instruction bidirectional identification. In turn, in the case where server determines that client identity is verified, client can receive the identity of server feedback Confirmation message determines that bidirectional identification is verified.
It is verified by above-mentioned bidirectional identification, it can be found that and avoiding having stolen server by third party or client is protected The information data of pipe initiates the situation of transaction data processing, further improves the safety of the transaction data processing of user.
S15: it in the case where bidirectional identification is verified, calls and defaults in the first MPC node of client with described the One private key component is as input data, and defaults in the 2nd MPC node of server using the second private key component as input Data carry out preset functional operation according to preset rules, obtain operation result as trading signature.
In the present embodiment, above-mentioned first MPC node, the 2nd MPC node specifically can be understood as being respectively arranged in advance Operation node in client, server.It wherein, can be according to based on MPC between above-mentioned first MPC node, the 2nd MPC node The preset rules of the generations such as agreement carry out data interaction between each other, and participate in preset functional operation jointly.It requires supplementation with It is that above-mentioned first MPC node is specifically set to client-side, with client associate, the letter that client is taken care of can be transferred Cease data.Above-mentioned 2nd MPC node is specifically set to server-side, is associated with server, can transfer the keeping of server institute Information data.
In the present embodiment, above-mentioned preset rules can specifically be understood to a kind of according to MPC (Secure Multi- Party Computation, multi-party computations) generations such as agreement, for characterizing the first MPC node, the 2nd MPC node The rule set of data processing method.When it is implemented, the first MPC node and the 2nd MPC node can be according to above-mentioned preset rules Carry out specific data interaction and functional operation.Wherein, above-mentioned MPC agreement is interpreted as a kind of based on cryptography, by distinguishing in many ways One's own information data is inputted, the common safety for participating in operation calculates agreement.
In the present embodiment, above-mentioned trading signature (being referred to as public key digital signature or Electronic Signature etc.) specifically can be with One kind is not understood as based on public key cryptography, for proving the digital signature of user identity.Specifically, above-mentioned trading signature can To be one section corresponding with user identity, and it is not easy the character string forged.It, can basis when carrying out the processing of specific transaction data Above-mentioned trading signature, verifies the identity of user, and the funds data in user account is called to carry out specific transaction data processing.
In the present embodiment, above-mentioned function specifically can be understood as a kind of based on above-mentioned preset rules, hand over for generating The operation function easily signed.
In the present embodiment, when it is implemented, in the case where bidirectional identification is verified, client can call first MPC node is using the first private key component that client is taken care of as input data;Meanwhile it being saved together with the 2nd MPC of server calls Point is using the second private key component that server is taken care of as input data;It is input to according to preset rules for generating trading signature Operation function in, with common participation be directed to the operation function preset functional operation, obtain corresponding operation result;In turn Specific trading signature can be determined according to above-mentioned operation result.
By the above-mentioned means, client and server is made to carry out data interaction, and generate the operation of trading signature Always without there is complete transaction private key in journey, avoiding complete transaction private key may be compromised during processing or steal Take caused transaction risk.Meanwhile also smoothly, accurately generated transaction label for subsequent specific transaction data processing Name.
S17: according to the trading signature, transaction data processing is carried out.
It in the present embodiment, can be with response transaction data processing request, with above-mentioned transaction after obtaining above-mentioned trading signature Signature is used as identity documents, carries out specific transaction data processing.
For example, the funds data in the account of user can be called to pay a bill to prop up according to trading signature as identity documents It is single.Purchase order of the user etc. can also be generated according to trading signature.Certainly, it should be noted that cited by above-mentioned Transaction data processing mode is that one kind schematically illustrates.When it is implemented, according to specific application scenarios and use demand, also Other kinds of transaction data processing can be carried out according to above-mentioned trading signature.In this regard, this specification is not construed as limiting.
In the embodiment of the present application, it compared to existing method, due to being split by the private key that will trade in advance, and splits and obtains The first private key component and the second private key component be retained separately in client and server two sides;It needs to carry out number of deals in user When according to processing, further through call the first MPC node for defaulting in client and default in the 2nd MPC node of server respectively with Each end saved the first private key component and the second private key component carry out preset function according to preset rules as input jointly Operation, Lai Shengcheng trading signature, so that in the treatment process of transaction data be not in complete private key, to solve Due to needing to use integrity key in the treatment process of existing transaction data, the key is caused to ask using unsafe technology Topic has reached the security risk in the treatment process for reducing the transaction data of user, has improved the safety of transaction data processing, Meet user to the technical effect of the demand for control of complete transaction private key.
In one embodiment, it is contemplated that taken care of respectively in client due to the first private key component and the second private key component and Server two sides, if the private key component that wherein side is taken care of is lost, for example, client has lost first oneself taken care of Private key component, at this moment relying solely on the private key component taken care of the other side is that can not generate trading signature, completes corresponding transaction Data processing can bring inconvenience in this way to the transaction use of user.In order to enable taken care of in client or server loss In the case where private key component, the transaction data processing of user is not influenced, while the transaction data processing for guaranteeing user is safe, The usage experience of user is further increased, when it is implemented, the first private key component and second can generated in the manner described above After private key component, can regenerate the private key component being mutually matched in a pair (can be denoted as sk1_ as the first backup private key component B) and the second backup private key component (can be denoted as sk2_b) is stored in client and server two sides respectively.In this way in client Or in the case that the first private key component for taking care of of server or the second private key component are lost, two sides can be called in time spare The first backup private key component and the second backup private key component generate a pair of new private key component being mutually matched, recycle new Private key component participates in operation, obtains corresponding trading signature, to carry out the processing of transaction data required by user.
In the present embodiment, described after generating the first private key component, the second private key component according to the transaction private key Method is when it is implemented, can also include the following contents: according to the transaction private key, generating the first spare private key component, second Spare private key component;Described first spare private key component is stored in client local, the described second spare private key component is sent out It send to server.
In the present embodiment, if the second private that the first private key component or server that client is saved are saved Key component is lost, and at this moment has received the processing request of Client-initiated transaction data again, can be refering to shown in Fig. 4 according to this Apply for one embodiment schematic diagram for the data processing method that embodiment provides.Client transfers institute by the first MPC node First spare private key component of storage passes through the second spare private key component of the 2nd MPC node calling stored together with server, According to preset rules, the common MPC that participates in is calculated, i.e. the 5th operation (a kind of MPC calculating based on preset rules), to obtain a pair New private key component, can be denoted as: third private key component and the 4th private key component.It then, can be by third private key component and Four private key components are stored in client and server with the first private key component and the second private key component before replacing, simultaneously respectively It destroys and lost another matched private key component of private key component.In turn, client can be called and default in client First MPC node defaults in the 2nd MPC of server together with server calls using the third private key component as input data Node carries out preset functional operation using the 4th private key component as input data, according to preset rules, obtains operation knot Fruit is as trading signature.
It in one embodiment, in order to further improve the security, can also at regular intervals or response user Update instruction, the first private key component and the second private key component take care of to client and server are updated.
In the present embodiment, when it is implemented, the method specifically can also include the following contents: response updates request; It calls the first MPC node for defaulting in client using the first private key component as input data, and defaults in server 2nd MPC node is using the second private key component as input data, and according to preset rules progress third operation, (one kind is based on pre- If the MPC of rule is calculated), generate updated first private key component (sk1 ' can be denoted as) and updated second private key component (sk2 ' can be denoted as);It obtains and saves the updated first private key component, wherein updated second private key point Amount is stored in the server.
In the present embodiment, above-mentioned update requests specifically to can be client and server according to preset time interval certainly The update request of the dynamic private key component generated is also possible to respond the more new command update generated of user or business platform Request.For the specific generating mode of above-mentioned update request, this specification is not construed as limiting.
In one embodiment, request is updated in response, generates corresponding new private key component, i.e., updated first is private After key component and updated second private key component, in order to guarantee that updated private key component is correct, effective private key point Simultaneously response key checking request can be generated, to above-mentioned updated first private key component and updated second private key point in amount Amount is compared, verifies, with determination updated first private key component generated and updated second private key component whether It meets the requirements, i.e., whether can generate accurate user's signature.Determining updated first private key component generated and more In the case that the second private key component after new is met the requirements, recycle updated first private key component replacement original first private Key component, is stored in client;Original second private key component is replaced using updated second private key component, is stored in service Device, to complete the update to private key component.Determining updated first private key component generated and updated second In the case that private key component is unsatisfactory for requirement, it can recalculate and generate updated first private key component and updated second Private key component, then verified.
It in one embodiment, when it is implemented, can be in such a way that public key compares, to determine that updated first is private Whether key component and updated second private key component meet the requirements.Specifically, can be refering to shown in fig. 5 according to the application reality One embodiment schematic diagram for the data processing method that the mode of applying provides is obtaining and is saving updated first private key point After amount, the method can also include the following contents: client end response key authentication request, calling default in the first of client MPC node is using the updated first private key component as input data, and defaults in the 2nd MPC node of server with institute Updated second private key component is stated as input data, carrying out the 4th operation according to preset rules, (one kind is based on preset rules MPC calculate), generate updated transaction public key (pk ' can be denoted as);According to the transaction public key and the updated friendship Easy public key, determines whether the updated first private key component, the updated second private key component meet the requirements.Its In, above-mentioned transaction public key specifically can be to be matched with the transaction private key for generating the first private key component and the second private key component, And it is stored in the transaction public key of client.
In the present embodiment, above-mentioned according to the transaction public key and the updated transaction public key, determine the update Whether the first private key component, the updated second private key component afterwards meets the requirements, when it is implemented, may include: ratio Whether the difference value of the transaction public key and the updated transaction public key is less than preset discrepancy threshold, if the friendship The difference value of easy public key and the updated transaction public key is less than or equal to preset discrepancy threshold, then can determine the update The first private key component, the updated second private key component afterwards is met the requirements, and is updated successfully, that is, is verified.If institute The difference value for stating transaction public key and the updated transaction public key is greater than preset discrepancy threshold, then can determine the update The first private key component, the updated second private key component afterwards is unsatisfactory for requiring, and updates failure, that is, verifies and do not pass through.
It in one embodiment, when it is implemented, can also be by way of signature verification, to determine updated first Whether private key component and updated second private key component meet the requirements.Specifically, can be refering to shown in fig. 6 according to the application One embodiment schematic diagram for the data processing method that embodiment provides, is obtaining and is saving updated first private key After component, the method can also include the following contents: response key checking request, and generating the second random number (can be denoted as M '), and second random number is sent to server;It calls after defaulting in the first MPC node of client with the update The first private key component as input data, and default in the 2nd MPC node of server with updated second private key Component carries out signature processing to second random number as input data, according to preset rules, and obtaining third signed data (can To be denoted as sig ');According to the transaction public key and the third signed data, determine the updated first private key component, Whether the updated second private key component meets the requirements.
In the present embodiment, above-mentioned according to the transaction public key and the third signed data, it determines described updated Whether the first private key component, the updated second private key component meet the requirements, when it is implemented, may include: client Institute can be determined if be proved to be successful by carrying out verification processing to above-mentioned third signed data using the transaction public key saved State updated first private key component, the updated second private key component is met the requirements, thus judgement be updated successfully.If It verifies unsuccessful, then can determine that the updated first private key component, the updated second private key component are unsatisfactory for It is required that judge to update failure.
In the present embodiment, you need to add is that, be applied to second server side data processing method with it is above-mentioned Data processing method applied to first server side is similar.When it is implemented, being referred to be applied to first server one The data processing method of side executes, and details are not described herein.
It can be seen from the above description that data processing method provided by the embodiments of the present application, by advance by first Private key component and the second private key component are retained separately in client and server two sides;It needs to carry out transaction data processing in user When, the first MPC node of client is defaulted in further through calling and defaults in the 2nd MPC node of server respectively with each end institute The the first private key component and the second private key component saved carries out preset functional operation according to preset rules as input jointly, To generate trading signature, so that be not in complete private key in the treatment process of transaction data, to solve existing Since needs use integrity key in the treatment process of some transaction data, key is caused to use unsafe technical problem, Reach the security risk in the treatment process for reducing the transaction data of user, improves the skill of the safety of transaction data processing Art effect, while meeting user to the demand for control of transaction private key;Also by the way that before generating trading signature, elder generation is according to visitor The first public key that family end and server generate respectively, the first private key, the second public key, the second private key are tested with carrying out bidirectional identification Card regenerates trading signature, further reduced the processing of the transaction data of user in the case where bidirectional identification is verified Security risk in the process has ensured the account safety of user;Also by the update request of response user, calling defaults in client The first MPC node at end and the first private key component for defaulting in the 2nd MPC node of server and being saved respectively with each end and the Two private key components carry out operation as input, generate updated first private key component, updated second private key component, to divide It is other that original first private key component, the second private key component are updated, it further reduced the processing of the transaction data of user Security risk in the process.
Present invention also provides another data processing method, this method specifically can be applied to server-side, wherein Above-mentioned server can preserve the second private key component, wherein the first private key component and the second private key component according to The client transaction private key generated generates.Refering to the data processing shown in Fig. 7 provided according to the application embodiment One embodiment schematic diagram of method.When it is implemented, may comprise steps of.
S71: response identity checking request carries out bidirectional identification verifying with client, wherein the client preserves the One private key component;
S73: it in the case where bidirectional identification is verified, calls and defaults in the 2nd MPC node of server with described the Two private key components are as input data, and default in the first MPC node of client using the first private key component as input Data carry out preset functional operation according to preset rules, obtain operation result as trading signature.
Present invention also provides another data processing method, this method specifically can be applied to include server and client In the system at end, wherein the client can specifically preserve the first private key component, and the service implement body can be preserved Second private key component, wherein the first private key component and the second private key component are according to client friendship generated Easy private key generates.This method is when it is implemented, may include the following contents:
The client end response response transaction data processing request initiates authentication request;
The client and the server respond the authentication request, carry out bidirectional identification verifying;
In the case where bidirectional identification is verified, call the first MPC node for defaulting in client private with described first Key component is as input data, and defaults in the 2nd MPC node of server using the second private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature;According to the trading signature, carry out Transaction data processing.
In the present embodiment, it should be noted that in above-mentioned treatment process, due to using the default rule based on MPC agreement Then realize that the generation to private key component, use, recovery etc. manage, so that user oneself is not needed keeping or handed over using complete Easy private key, need trading signature carry out transaction data processing when, can with server simultaneously use private key component as Input, to generate required trading signature.Not only guaranteed that user held private key in this way, but also has introduced more reliable Platform Server The risk for undertaking leakage transaction private key together with user, that is, reduce the risk of user's alone bear.It is equivalent to user visitor The account (such as stored value card of user) at family end and server coordinated management user, has both shared risk, has also ensured user To the control of the funds data in account.
It can be seen from the above description that data processing method provided by the embodiments of the present application, by advance by first Private key component and the second private key component are retained separately in client and server two sides;It needs to carry out transaction data processing in user When, the first MPC node of client is defaulted in further through calling and defaults in the 2nd MPC node of server respectively with each end institute The the first private key component and the second private key component saved carries out preset functional operation according to preset rules as input jointly, To generate trading signature, so that be not in complete private key in the treatment process of transaction data, to solve existing Since needs use integrity key in the treatment process of some transaction data, key is caused to use unsafe technical problem, Reach the security risk in the treatment process for reducing the transaction data of user, improves the skill of the safety of transaction data processing Art effect meets user to the demand for control of complete transaction private key.
Based on the same inventive concept, a kind of data processing equipment is additionally provided in the embodiment of the present invention, such as following implementation Described in example.Since the principle that data processing equipment solves the problems, such as is similar to data processing method, the reality of data processing equipment The implementation that may refer to data processing method is applied, overlaps will not be repeated.It is used below, term " unit " or " mould The combination of the software and/or hardware of predetermined function may be implemented in block ".Although device described in following embodiment is preferably with soft Part is realized, but the realization of the combination of hardware or software and hardware is also that may and be contemplated.Referring to Fig. 8, being this Apply for a kind of composite structural diagram for the data processing equipment that embodiment provides, which can specifically include: initiation module 801, Authentication module 802, calling module 803 and processing module 804, are below specifically described the structure.
Initiation module 801 specifically can be used for response transaction data processing request, initiate authentication request, wherein institute It states and preserves the first private key component in data processing equipment;
Authentication module 802 specifically can be used for responding the authentication request, carries out bidirectional identification with server and tests Card, wherein the server preserves the second private key component, wherein the first private key component and the second private key component It is generated according to client transaction private key generated;
Calling module 803 specifically can be used in the case where bidirectional identification is verified, and calling defaults in client First MPC node is using the first private key component as input data, and defaults in the 2nd MPC node of server with described Two private key components carry out preset functional operation as input data, according to preset rules, obtain operation result as transaction label Name;
Processing module 804 specifically can be used for carrying out transaction data processing according to the trading signature.
In one embodiment, in order to respond the authentication request, bidirectional identification verifying is carried out with server, The authentication module 802 can specifically include following structural unit:
First generation unit specifically can be used for responding the authentication request, generate the first public key and the first private key, Wherein, first public key and first private key matching;
First Transmit-Receive Unit specifically can be used for sending first public key to server, and receive the second public key, In, the server generates the second public key and the second private key for responding the authentication request;
Second Transmit-Receive Unit specifically can be used for receiving encryption data and the first signed data, wherein the encryption data For the data that the server is encrypted the first random number according to first public key, first number of signature The data that signature is handled are carried out to the encryption data according to second private key according to for the server;
The first arithmetic element of root specifically can be used for according to second public key, the encryption data, first number of signature According to the first operation of progress to determine whether server authentication passes through, and is determining the case where server authentication passes through Under, the encryption data is decrypted according to second public key, obtains first random number;
First signature processing unit, specifically can be used for signing to first random number according to first private key Processing obtains the second signed data, and sends second signed data to the server;
Third Transmit-Receive Unit specifically can be used for receiving the identification information of the server feedback, wherein the clothes Device be engaged in for the second operation being carried out, with determination according to first public key, first random number, second signed data Client identity verifies whether to pass through, and in the case where determining that the client identity is verified, Xiang Suoshu client hair Send confirmation instruction information.
In one embodiment, described device further includes generation module, for generating the first private key component and the second private key Component, wherein the generation module can specifically include following structural unit:
Second generation unit specifically can be used for response key and generate request, generate transaction private key and transaction public key, In, the transaction private key and the transaction public key match;
Third generation unit specifically can be used for generating the first private key component, the second private key point according to the transaction private key Amount;
4th Transmit-Receive Unit specifically can be used for for the first private key component being stored in client local, by described the Two private key components are sent to server, wherein the server is for saving the second private key component.
In one embodiment, in order to which the second private key component is safely sent to server, the described 4th Transmit-Receive Unit according to following procedure when it is implemented, can execute: obtain transmission public key, wherein the transmission public key is service Device generates, and the server preserves the transmission private key with the transmission public key match;According to the transmission public key to described Two private key components are encrypted, and obtain encrypted second private key component;The encrypted second private key component is sent out It send to the server.
In one embodiment, described device further includes spare private key component generation module, when it is implemented, can be used for According to the transaction private key, the first spare private key component, the second spare private key component are generated;By the described first spare private key component It is stored in client local, the described second spare private key component is sent to server.
In one embodiment, described device can also include update module, be protected for updating client and server The private key component of pipe.Wherein, the update module is when it is implemented, may include following structural unit:
Third arithmetic element specifically can be used for responding update request;Call default in the first MPC node of client with The first private key component is as input data, and defaults in the 2nd MPC node of server and made with the second private key component For input data, third operation is carried out according to preset rules, generates updated first private key component and updated second private Key component;
Acquiring unit specifically can be used for obtaining and saving the updated first private key component, wherein the update The second private key component afterwards is stored in the server.
In one embodiment, described device can also include authentication module, specifically can be used for response key verifying and ask It asks, calls the first MPC node for defaulting in client using the updated first private key component as input data, and is default In server the 2nd MPC node using the updated second private key component as input data, carried out according to preset rules 4th operation generates updated transaction public key;According to the transaction public key and the updated transaction public key, determine described in Whether updated first private key component, the updated second private key component meet the requirements.
In one embodiment, described device can also include another authentication module, specifically can be used for response key Checking request generates the second random number, and second random number is sent to server;Calling defaults in the first of client MPC node is using the updated first private key component as input data, and defaults in the 2nd MPC node of server with institute Updated second private key component is stated as input data, signature processing is carried out to second random number according to preset rules, Obtain third signed data;According to the transaction public key and the third signed data, updated first private key is determined Whether component, the updated second private key component meet the requirements.
In one embodiment, described device can also include specifically spare processing module, specifically can be used for described In the case that first private key component is lost, call the first MPC node for defaulting in client with the described first spare private key component For input data, and the 2nd MPC node of server is defaulted in using the described second spare private key component as input data, according to pre- If rule carries out the 5th operation, third private key component and the 4th private key component are generated;It obtains, and the third private key component is made Client local is stored in for the first private key component, wherein the 4th private key component is stored in institute as the second private key component State server.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
It should be noted that system, device, module or unit that above embodiment illustrates, it specifically can be by computer Chip or entity are realized, or are realized by the product with certain function.For convenience of description, in the present specification, it retouches It is divided into various units when stating apparatus above with function to describe respectively.It certainly, when implementing the application can be the function of each unit It realizes in the same or multiple software and or hardware.
In addition, in the present specification, such as adjective as first and second can be only used for an element or move Make to distinguish with another element or movement, without requiring or implying any actual this relationship or sequence.Permit in environment Perhaps in the case where, it should not be interpreted as limited to one in only element, component or step referring to element or component or step (s) It is a, and can be the one or more etc. in element, component or step.
It can be seen from the above description that data processing equipment provided by the embodiments of the present application, by advance by first Private key component and the second private key component are retained separately in client and server two sides;It needs to carry out transaction data processing in user When, call the first MPC node for defaulting in client and the 2nd MPC node for defaulting in server to distinguish further through calling module The the first private key component and the second private key component saved using each end carries out preset letter according to preset rules as input jointly Number operation, Lai Shengcheng trading signature, then specific transaction data processing is carried out according to above-mentioned trading signature by processing module, Make to be not in complete private key in the treatment process of transaction data in this way, to solve the place of existing transaction data Due to needing to use integrity key during reason, cause key using unsafe technical problem, having reached reduces user's Security risk in the treatment process of transaction data improves the technical effect of the safety of transaction data processing, meets simultaneously Demand for control of the user to complete transaction private key.
The embodiment of the present application also provides a kind of electronic equipment, can specifically be implemented refering to shown in Fig. 9 based on the application The electronic equipment composed structure schematic diagram that example provides, the electronic equipment can specifically include input equipment 91, processor 92, deposit Reservoir 93.Wherein, the input equipment 91 specifically can be used for receiving transaction data processing request.The processor 92 specifically may be used To be used for response transaction data processing request, authentication request is initiated;The authentication request is responded, is carried out with server Bidirectional identification verifying, wherein the server preserves the second private key component;In the case where bidirectional identification is verified, adjust It uses the first MPC node for defaulting in client using the first private key component as input data, and defaults in the of server Two MPC nodes carry out preset functional operation using the second private key component as input data, according to preset rules, are transported Result is calculated as trading signature, wherein the first private key component and the second private key component are given birth to according to the client At transaction private key generate;According to the trading signature, transaction data processing is carried out.The memory 93 specifically can be used for depositing The corresponding instruction repertorie that storage processor 92 is based on.
In the present embodiment, the input equipment, which specifically can be, carries out information exchange between user and computer system One of main device.The input equipment may include keyboard, mouse, camera, scanner, light pen, writing input board, voice Input unit etc.;Input equipment is used to initial data be input in computer with the programs for handling these numbers.The input is set Standby can also obtain receives the data that other modules, unit, equipment transmit.The processor can be by any side appropriate Formula is realized.For example, processor can take such as microprocessor or processor and storage that can be executed by (micro-) processor Computer-readable medium, logic gate, the switch, specific integrated circuit of computer readable program code (such as software or firmware) (Application Specific Integrated Circuit, ASIC), programmable logic controller (PLC) and insertion microcontroller Form etc..The storage implement body can be in modern information technologies for protecting stored memory device.The storage Device may include many levels, in digital display circuit, as long as can save binary data can be memory;In integrated electricity The circuit with store function of Lu Zhong, a not no physical form are also memory, such as RAM, FIFO;In systems, have There is the storage equipment of physical form to be also memory, such as memory bar, TF card.
In the present embodiment, the function and effect of electronic equipment specific implementation, can compare with other embodiment It explains, details are not described herein.
The embodiment of the present application also provides a kind of computer storage medium based on data processing method, the computer is deposited Storage media is stored with computer program instructions, is performed realization: response transaction data processing in the computer program instructions Authentication request is initiated in request;The authentication request is responded, carries out bidirectional identification verifying with server, wherein described Server preserves the second private key component;In the case where bidirectional identification is verified, the first MPC for defaulting in client is called Node is using the first private key component as input data, and defaults in the 2nd MPC node of server with second private key Component carries out preset functional operation as input data, according to preset rules, obtains operation result as trading signature, In, the first private key component and the second private key component are generated according to client transaction private key generated;According to The trading signature carries out transaction data processing.
In the present embodiment, above-mentioned storage medium includes but is not limited to random access memory (RandomAccess Memory, RAM), read-only memory (Read-Only Memory, ROM), caching (Cache), hard disk (Hard Disk Drive, HDD) or storage card (Memory Card).The memory can be used for storing computer program instructions.Network is logical Letter unit can be according to standard setting as defined in communication protocol, for carrying out the interface of network connection communication.
In the present embodiment, the function and effect of the program instruction specific implementation of computer storage medium storage, can To compare explanation with other embodiment, details are not described herein.
Private key component security risk that may be present is saved in order to be further reduced client, the embodiment of the present application also provides Another data processing method, specifically can another data to be provided shown in 0 according to the application embodiment refering to fig. 1 The process flow diagram of processing method.It can specifically include the following contents.
S101: response transaction data processing request initiates authentication request;
S103: responding the authentication request, carries out authentication with first server, second server, wherein institute State first server for save the first private key component, the second server for preservation the second private key component, wherein it is described First private key component and the second private key component are generated according to client transaction private key generated;
S105: it in the case where authentication passes through, calls and defaults in the first MPC node of first server with described the One private key component as input data, and default in the 2nd MPC node of second server using the second private key component as Input data carries out preset functional operation according to preset rules, obtains operation result as trading signature;
S107: according to the trading signature, transaction data processing is carried out.
In the present embodiment, by introducing the opposite more structurally sound first server of client and second server in system The first private key component and the second private key component for generating trading signature are saved respectively, to reduce by client voluntarily The part private key component of preservation is easy the risk for being compromised or stealing, in the treatment process for further decreasing the transaction data of user Security risk, reach improve transaction data processing safety technical effect.
In one embodiment, when it is implemented, also needing first to generate the first private key component for generating trading signature The second private key component, and by above-mentioned first private key component and the second private key component be stored in respectively first server and second clothes Business device two sides.Specifically, the place of another data processing method provided shown in 1 according to the application embodiment refering to fig. 1 Flow chart is managed, before response transaction data processing request, the method can also include the following contents:
S1: response key generates request, generates transaction private key and transaction public key, wherein the transaction private key and the friendship Easy public key match;
S2: according to the transaction private key, the first private key component, the second private key component are generated;
S3: being stored in client local for the transaction public key, the first private key component be sent to first server, The second private key component is sent to second server.
In the present embodiment, it when it is implemented, client can acquire and according to the dependent instruction that user inputs, generates simultaneously It responds above-mentioned key and generates request, locally generating transaction private key (can be denoted as sk) and transaction public key in client (can be denoted as pk).For example, client can be locally generated above-mentioned transaction private key and public key of trading in the above manner: keyGen () → (sk,pk).In turn, client the first private key component can be generated in such a way that key is shared according to above-mentioned transaction private key (can To be denoted as sk1) and the second private key component (sk2 can be denoted as).For example, client can generate the first private key in the following way Component and the second private key component: secrect sharing (sk) → (sk1, sk2).Transaction public key can be stored in by client Client is local, and by the first private key component and the second private key component be respectively sent to first server (KMS1 can be denoted as) and Second server (can be denoted as KMS2), save the first private key component by first server, and it is private to save second by second server Key component.Client oneself can not need to save any private key component in this way, be stolen or let out without undertaking private key component The risk of dew, and private key component is separately taken care of by the higher first server of reliability, second server, so as to will be private The risk that key component is stolen or reveals.
In one embodiment, above-mentioned first private key component and the second private key component are sent to first service in client When device and second server, to avoid private key component from being stolen or reveal during transmission, can first to private key component into After the corresponding encryption of row, then sent.Specifically, in conjunction with shown in Figure 11, it is above-mentioned to send the first private key component May include the following contents to first server:
S1: the first transmission public key (pk_s1 can be denoted as) is obtained, wherein the first transmission public key is first server It generates, the first server preserves the first transmission private key (can be denoted as sk_s1) with the first transmission public key match;
S2: the first private key component is encrypted according to the first transmission public key, obtains encrypted the One private key component (can be denoted as t1);
S3: the encrypted first private key component is sent to the first server.
In the present embodiment, client can in the following way carry out the first private key component using the first transmission public key Encryption: Enc (pk_s1, sk1) → t1.
In the present embodiment, by the above-mentioned means, the available encrypted first private key component of first server.First Server can use the first saved transmission private key to above-mentioned encryption after obtaining above-mentioned encrypted first private key component The first private key component afterwards is decrypted, and obtains and saves the first private key component in first server.For example, first server can To be decrypted to obtain the first private key component: Dec (sk_s1, t1) → sk1 in the following way.
In one embodiment, it is referred to the above-mentioned mode that the first private key component is sent to first server, The second private key component is sent to second server in the following manner:
S1: the second transmission public key (pk_s2 can be denoted as) is obtained, wherein the second transmission public key is second server It generates, the second server preserves the second transmission private key (can be denoted as sk_s2) with the second transmission public key match;
S2: the second private key component is encrypted according to the second transmission public key, obtains encrypted the Two private key components (can be denoted as t2);
S3: the encrypted second private key component is sent to the second server.
In the present embodiment, client can in the following way carry out the second private key component using the second transmission public key Encryption: Enc (pk_s2, sk2) → t2.
In the present embodiment, by the above-mentioned means, the available encrypted second private key component of second server.Second Server can use the second saved transmission private key to above-mentioned encryption after obtaining above-mentioned encrypted second private key component The second private key component afterwards is decrypted, and obtains and saves the second private key component in second server.For example, second server can To be decrypted to obtain the first private key component: Dec (sk_s2, t2) → sk2 in the following way.
In one embodiment, in order to further increase the safety that transaction data is handled, when it is implemented, pre- calling Set on first server the first MPC node and default in the 2nd MPC node of second server respectively with respectively save the It, can also be first to the first service for data processing of participating in business before one private key component and the second private key component generate trading signature Device, second server and client carry out authentication, and in the case where authentication passes through, regeneration is at transaction data The trading signature of reason.
In one embodiment, can with refering to fig. 1 shown in 2 according to the application embodiment provide another data at The process flow diagram of reason method, the above-mentioned response authentication request carry out identity with first server, second server and test Card, when it is implemented, may include the following contents:
S1: responding the authentication request, generates the first random number, and first random number is respectively sent to the One server and second server;
S2: the first signed data is received, wherein first signed data is the first MPC for defaulting in first server Node is using the first private key component as input data, and defaults in the 2nd MPC node of second server with described second Private key component carries out signature processing as input data, according to preset rules, obtained data;
S3: according to first signed data and the transaction public key, determine whether authentication passes through.
Specifically, the processing of another data processing method provided shown in 2 according to the application embodiment refering to fig. 1 Flow chart can complete authentication by way of signature verification.Client (can be denoted as client) can first generate one A random number (being denoted as m1, i.e. the first random number);First random number, which is respectively sent to first server, again (can be denoted as ) and second server (KMS2 can be denoted as) KMS1.First server and second server are receiving above-mentioned first random number Afterwards, the first private key component and the second private key component that can be respectively saved respectively by the first MPC node and the 2nd MPC node As input, carry out signature to the first random number jointly according to preset rules and handle to obtain the first signed data (to be denoted as sig1').Client is sent to by first server or second server the first obtained signed data that will sign jointly.Client End can use saved transaction public key and verify to the first signed data after receiving the first signed data, according to Verification result determines whether the identity of first server, second server and client is verified.The case where being verified Under, just meeting triggering following step carries out corresponding transaction data processing to generate corresponding trading signature.
It is another number that can also be provided shown in 3 according to the application embodiment refering to fig. 1 at one in embodiment According to the process flow diagram of processing method, the above-mentioned response authentication request carries out body with first server, second server Part verifying, when it is implemented, may include the following contents:
S1: responding the authentication request, Xiang Suoshu first server, and/or, the second server sends verifying Public key acquisition request;
S2: verification public key is received, wherein the verification public key is to default in the first MPC node of first server with institute The first private key component is stated as input data, and defaults in the 2nd MPC node of second server with the second private key component As input data, operation, obtained data are carried out according to preset rules;
S3: according to the verification public key and the transaction public key, determine whether authentication passes through.
Specifically, refering to fig. 1 shown in 3 authentication can also be completed in such a way that public key compares.Client can be to Any one server in first server and second server, or sent to two servers be directed to authentication simultaneously Verification public key acquisition request.Any one server receives above-mentioned verification public key and obtains in first server and second server After taking request, above-mentioned verification public key acquisition request can be responded, with another server communication, and then correspondence can be passed through respectively MPC node participate in common operation according to preset rules using the private key component that respectively saves as input, generating verification public key (can To be denoted as pk1 '), then above-mentioned verification public key is sent to client.After client receives above-mentioned verification public key again, it can incite somebody to action The verification public key is compared with the transaction public key oneself saved.If the two is identical or difference value is relatively small, It is proved to be successful, and then can determine that first server, second server and client identity are verified, can carry out subsequent The generation of trading signature.
In one embodiment, in order to meet the needs of user updates private key component, the method is when it is implemented, may be used also To include the following contents:
Response updates request, call default in the first MPC node of first server using the first private key component as Input data, and the 2nd MPC node of second server is defaulted in using the second private key component as input data, according to pre- If rule carries out functional operation, updated first private key component (sk1 ' can be denoted as) and updated second private key point are generated It measures (sk2 ' can be denoted as);Wherein, the updated first private key component is stored in first server, and described updated Two private key components are stored in second server.
In one embodiment, pass through the first MPC node and the 2nd MPC section respectively in first server and second server It, can be first to update generated after point generates corresponding updated first private key component and updated second private key component The first private key component and updated second private key component afterwards is to above-mentioned updated first private key component and updated Two private key components are compared, verify, with determination updated first private key component generated and updated second private key Whether component meets the requirements, i.e., whether can generate accurate user's signature.Determining updated first private key generated In the case that component and updated second private key component are met the requirements, recycle updated first private key component replacement original The first private key component, be stored in first server;Original second private key point is replaced using updated second private key component Amount, is stored in second server, to complete the update to private key component.
In one embodiment, can with refering to fig. 1 shown in 4 according to the application embodiment provide another data at The process flow diagram of reason method verifies updated first private key component generated and update by way of signature verification Whether the second private key component afterwards meets the requirements.Specifically, updating request in response, calling defaults in the first of first server MPC node is using the first private key component as input data, and defaults in the 2nd MPC node of second server with described Two private key components carry out functional operation as input data, according to preset rules, generate updated first private key component and more After the second private key component after new, the method can also include the following contents:
S1: response key checking request generates the second random number (can be denoted as m2 ');And second random number is divided First server and second server are not sent to it;
S2: it receives the second signed data (sig2 ' can be denoted as), wherein second signed data is to default in first First MPC node of server is using the updated first private key component as input data, and defaults in second server The 2nd MPC node using the updated second private key component as input data, according to preset rules to described second with Machine number carries out signature processing, obtained data;
S3: according to the transaction public key and second signed data, the updated first private key component, institute are determined State whether updated second private key component meets the requirements.
In the present embodiment, client can use saved transaction public key and carry out to the second acquired signed data Verification processing determines whether the updated first private key component, updated second private key component are full according to verification result Foot requires.In the case where determining that the updated first private key component, updated second private key component are met the requirements, then First private key component and the second private key component are saved by first server and second server respectively.
In one embodiment, can with refering to fig. 1 shown in 5 according to the application embodiment provide another data at The process flow diagram of reason method determines updated first private key component generated and update in such a way that public key compares Whether the second private key component afterwards meets the requirements.Specifically, updating request in response, calling defaults in the first of first server MPC node is using the first private key component as input data, and defaults in the 2nd MPC node of second server with described Two private key components carry out functional operation as input data, according to preset rules, generate updated first private key component and more After the second private key component after new, the method can also include the following contents:
S1: response key checking request is called and defaults in the first MPC node of first server with described updated the One private key component is as input data, and defaults in the 2nd MPC node of second server with updated second private key Component carries out operation as input data, according to preset rules, generates updated transaction public key (can be denoted as pk2 ');
S2: according to the transaction public key and the updated transaction public key, updated first private key point is determined Whether amount, the updated second private key component meet the requirements.
In the present embodiment, client can use what oneself was saved after obtaining above-mentioned updated transaction public key Transaction public key is compared with updated transaction public key, if updated transaction public key and the transaction public key phase saved Together or difference value is relatively small, then can determine that updated first private key component, updated second private key component meet It is required that.
Therefore since the first private key component and the second private key component by being retained separately in reliable by the program in advance The higher first server of property and second server two sides;It is pre- further through calling when user needs to carry out transaction data processing It is saved respectively with each end set on the first MPC node of first server with the 2nd MPC node for defaulting in second server First private key component and the second private key component carry out preset functional operation, Lai Shengcheng according to preset rules as input jointly Trading signature, so that be not in complete private key in the treatment process of transaction data, client does not need voluntarily yet Private key component is saved, to solve in the treatment process of existing transaction data due to needing to use integrity key, is caused Key uses unsafe technical problem, has reached the safety wind in the treatment process for further decreasing the transaction data of user Danger improves the technical effect of the safety of transaction data processing.
The embodiment of the present application also provides a kind of data processing method, the data processing method specifically can be applied to One server, wherein the first server preserves the first private key component, the method when it is implemented, may include with Lower content:
S1: response identity checking request carries out authentication with the first client, second server, wherein described second Client preserves the second private key component, wherein the first private key component and the second private key component are according to the client Transaction private key generated is held to generate;
S2: in the case where authentication passes through, call the first MPC node for defaulting in first server with described first Private key component is as input data, and defaults in the 2nd MPC node of second server using the second private key component as defeated Enter data, carries out preset functional operation according to preset rules, obtain operation result as trading signature.
In the present embodiment, it should be noted that it is referred to the above-mentioned data processing method applied to first server, The second private key component is saved using second server, and generates trading signature jointly with first server, to complete corresponding number According to processing.In this regard, this specification repeats no more.
The embodiment of the present application also provides a kind of data processing method, the data processing method specifically can be applied to wrap In the system for including first server, second server and client, wherein the first server preserves the first private key point Amount, the second server preserve the second private key component, and the method is when it is implemented, may include the following contents:
S1: the client end response response transaction data processing request initiates authentication request;
S2: the client, the first server, the second server respond the authentication request, carry out Authentication;
S3: in the case where authentication passes through, the first MPC node of first server is defaulted in first private key Component is as input data, and defaults in the 2nd MPC node of second server using the second private key component as input number According to carrying out preset functional operation according to preset rules, obtain operation result as trading signature, and the trading signature is anti- It feeds client;
S4: the client carries out transaction data processing according to the trading signature.
Correspondingly, can specifically include following construction module the embodiment of the present application also provides a kind of data processing equipment:
Initiation module specifically can be used for response transaction data processing request, initiate authentication request;
Authentication module specifically can be used for responding the authentication request, carry out with first server, second server Authentication, wherein for the first server for saving the first private key component, the second server is private for saving second Key component, wherein the first private key component and the second private key component are according to client transaction private key generated It generates;
Calling module specifically can be used in the case where authentication passes through, and calls and defaults in the of first server One MPC node is using the first private key component as input data, and defaults in the 2nd MPC node of second server with described Second private key component carries out preset functional operation as input data, according to preset rules, obtains operation result as transaction Signature;
Processing module specifically can be used for carrying out transaction data processing according to the trading signature.
Although mentioning different specific embodiments in teachings herein, the application is not limited to be industry Situation described in standard or embodiment etc., certain professional standards or the implementation base described using customized mode or embodiment On plinth embodiment modified slightly also may be implemented above-described embodiment it is identical, it is equivalent or it is close or deformation after it is anticipated that Implementation result.It, still can be with using these modifications or the embodiment of deformed data acquisition, processing, output, judgment mode etc. Belong within the scope of the optional embodiment of the application.
Although this application provides the method operating procedure as described in embodiment or flow chart, based on conventional or noninvasive The means for the property made may include more or less operating procedure.The step of enumerating in embodiment sequence is only numerous steps One of execution sequence mode, does not represent and unique executes sequence.It, can when device or client production in practice executes To execute or parallel execute (such as at parallel processor or multithreading according to embodiment or method shown in the drawings sequence The environment of reason, even distributed data processing environment).The terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that process, method, product or equipment including a series of elements are not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, product or equipment Intrinsic element.In the absence of more restrictions, be not precluded include the process, method of the element, product or There is also other identical or equivalent elements in person's equipment.
Device that above-described embodiment illustrates or module etc. can specifically realize by computer chip or entity, or by having There is the product of certain function to realize.For convenience of description, it is divided into various modules when description apparatus above with function to retouch respectively It states.Certainly, the function of each module can be realized in the same or multiple software and or hardware when implementing the application, The module for realizing same function can be realized by the combination of multiple submodule etc..Installation practice described above is only Schematically, for example, the division of the module, only a kind of logical function partition, can there is other draw in actual implementation The mode of dividing, such as multiple module or components can be combined or can be integrated into another system, or some features can be ignored, Or it does not execute.
It is also known in the art that other than realizing controller in a manner of pure computer readable program code, it is complete Entirely can by by method and step carry out programming in logic come so that controller with logic gate, switch, specific integrated circuit, programmable Logic controller realizes identical function with the form for being embedded in microcontroller etc..Therefore this controller is considered one kind Hardware component, and the structure that the device for realizing various functions that its inside includes can also be considered as in hardware component.Or Person even, can will be considered as realizing the device of various functions either the software module of implementation method can be hardware again Structure in component.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure, class etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, By executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module can To be located in the local and remote computer storage media including storage equipment.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, mobile terminal, server or the network equipment etc.) executes each embodiment of the application or implementation Method described in certain parts of example.
Each embodiment in this specification is described in a progressive manner, the same or similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.The application can be used for crowd In mostly general or special purpose computing system environments or configuration.Such as: personal computer, server computer, handheld device or Portable device, laptop device, multicomputer system, microprocessor-based system, set top box, programmable electronics set Standby, network PC, minicomputer, mainframe computer, distributed computing environment including any of the above system or equipment etc..
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application there are many deformation and Variation is without departing from spirit herein, it is desirable to which appended embodiment includes these deformations and changes without departing from the application.

Claims (24)

1. a kind of data processing method, the data processing method is applied to client, which is characterized in that the client saves There is the first private key component, which comprises
Response transaction data processing request initiates authentication request;
The authentication request is responded, carries out bidirectional identification verifying with server, wherein the server preserves the second private Key component, wherein the first private key component and the second private key component are according to client transaction private key generated It generates;
In the case where bidirectional identification is verified, call the first MPC node for defaulting in client with first private key point Amount is used as input data, and defaults in the 2nd MPC node of server using the second private key component as input data, according to Preset rules carry out preset functional operation, obtain operation result as trading signature;
According to the trading signature, transaction data processing is carried out.
2. being carried out with server double the method according to claim 1, wherein responding the authentication request To authentication, comprising:
The authentication request is responded, the first public key and the first private key are generated, wherein first public key and first private Key matching;
First public key is sent to server, and receives the second public key, wherein the server is tested for responding the identity Card request, generates the second public key and the second private key;
Receive encryption data and the first signed data, wherein the encryption data is the server according to first public key To the data that the first random number is encrypted, first signed data is that the server is private according to described second Key carries out the data that signature is handled to the encryption data;
According to second public key, the encryption data, first signed data, the first operation is carried out, to determine server Whether authentication passes through, and in the case where determining that server authentication passes through, and is added according to second public key to described Ciphertext data is decrypted, and obtains first random number;
Signature processing is carried out to first random number according to first private key, obtains the second signed data, and to the clothes Business device sends second signed data;
Receive the identification information of the server feedback, wherein the server is used for according to first public key, described First random number, second signed data carry out the second operation, to determine that client identity verifies whether to pass through, and true In the case that the fixed client identity is verified, Xiang Suoshu client sends confirmation instruction information.
3. the method according to claim 1, wherein initiating authentication in response transaction data processing request Before request, the method also includes:
Response key generates request, generates transaction private key and transaction public key, wherein the transaction private key and the transaction public key Match;
According to the transaction private key, the first private key component, the second private key component are generated;
The first private key component is stored in client local, the second private key component is sent to server, wherein institute Server is stated for saving the second private key component.
4. according to the method described in claim 3, it is characterized in that, the second private key component is sent to server, comprising:
Obtain transmission public key, wherein the transmission public key is server generation, and the server is preserved and the transmission public key Matched transmission private key;
The second private key component is encrypted according to the transmission public key, obtains encrypted second private key component;
The encrypted second private key component is sent to the server.
5. according to the method described in claim 3, it is characterized in that, according to the transaction private key, generate the first private key component, After second private key component, the method also includes:
According to the transaction private key, the first spare private key component, the second spare private key component are generated;
Described first spare private key component is stored in client local, the described second spare private key component is sent to service Device.
6. according to the method described in claim 3, it is characterized in that, the method also includes:
Response updates request, calls the first MPC node for defaulting in client using the first private key component as input data, With default in the 2nd MPC node of server using the second private key component as input data, carry out the according to preset rules Three operations generate updated first private key component and updated second private key component;
It obtains and saves the updated first private key component, wherein the updated second private key component is stored in institute State server.
7. according to the method described in claim 6, it is characterized in that, obtaining and saving the updated first private key component Afterwards, the method also includes:
Response key checking request calls the first MPC node for defaulting in client with the updated first private key component As input data, and the 2nd MPC node of server is defaulted in using the updated second private key component as input number According to, according to preset rules carry out the 4th operation, generate updated transaction public key;
According to the transaction public key and the updated transaction public key, the updated first private key component, described is determined Whether updated second private key component meets the requirements.
8. according to the method described in claim 6, it is characterized in that, obtaining and saving the updated first private key component Afterwards, the method also includes:
Response key checking request generates the second random number, and second random number is sent to server;
Call the first MPC node for defaulting in client using the updated first private key component as input data, and pre- The 2nd MPC node set on server is using the updated second private key component as input data, according to preset rules pair Second random number carries out signature processing, obtains third signed data;
According to the transaction public key and the third signed data, the updated first private key component, the update are determined Whether the second private key component afterwards meets the requirements.
9. according to the method described in claim 5, it is characterized in that, the method also includes:
In the case where the first private key component is lost, call the first MPC node for defaulting in client standby with described first It is input data with private key component, and defaults in the 2nd MPC node of server with the described second spare private key component as input Data carry out the 5th operation according to preset rules, generate third private key component and the 4th private key component;
It obtains, and is stored in client local for the third private key component as the first private key component, wherein the described 4th is private Key component is stored in the server as the second private key component.
10. a kind of data processing method, the data processing method is applied to server, which is characterized in that the server is protected There is the second private key component, which comprises
Response identity checking request carries out bidirectional identification verifying with client, wherein the client preserves the first private key point Amount, wherein the first private key component and the second private key component are generated according to client transaction private key generated;
In the case where bidirectional identification is verified, call the 2nd MPC node for defaulting in server with second private key point Amount is used as input data, and defaults in the first MPC node of client using the first private key component as input data, according to Preset rules carry out preset functional operation, obtain operation result as trading signature.
11. a kind of data processing method, the data processing method is applied in the system including server and client side, special Sign is that the client preserves the first private key component, and the server preserves the second private key component, wherein described One private key component and the second private key component generated according to client transaction private key generated the described method includes:
The client end response response transaction data processing request initiates authentication request;
The client and the server respond the authentication request, carry out bidirectional identification verifying;
In the case where bidirectional identification is verified, the first MPC node for defaulting in client is made with the first private key component For input data, and the 2nd MPC node of server is defaulted in using the second private key component as input data, according to default Rule carries out preset functional operation, obtains operation result as trading signature;
The client carries out transaction data processing according to the trading signature.
12. a kind of data processing equipment characterized by comprising
Initiation module is used for response transaction data processing request, authentication request is initiated, wherein in the data processing equipment Preserve the first private key component;
Authentication module carries out bidirectional identification verifying with server, wherein the service for responding the authentication request Device preserves the second private key component, wherein the first private key component and the second private key component are generated according to transaction private key;
Calling module, for calling the first MPC node for defaulting in client with institute in the case where bidirectional identification is verified The first private key component is stated as input data, and default in the 2nd MPC node of server using the second private key component as Input data carries out preset functional operation according to preset rules, obtains operation result as trading signature;
Processing module, for carrying out transaction data processing according to the trading signature.
13. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that described instruction is performed The step of Shi Shixian any one of claims 1 to 9 the method.
14. a kind of data processing method, the data processing method is applied to client, which is characterized in that the described method includes:
Response transaction data processing request initiates authentication request;
The authentication request is responded, carries out authentication with first server, second server, wherein first clothes Device be engaged in for saving the first private key component, the second server is for saving the second private key component, the first private key component It is generated with the second private key component according to client transaction private key generated;
In the case where authentication passes through, call the first MPC node for defaulting in first server with first private key point Amount is used as input data, and defaults in the 2nd MPC node of second server using the second private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature;
According to the trading signature, transaction data processing is carried out.
15. according to the method for claim 14, which is characterized in that before response transaction data processing request, the side Method further include:
Response key generates request, generates transaction private key and transaction public key, wherein the transaction private key and the transaction public key Match;
According to the transaction private key, the first private key component, the second private key component are generated;
The transaction public key is stored in client local, the first private key component is sent to first server, it will be described Second private key component is sent to second server.
16. according to the method for claim 15, which is characterized in that the first private key component is sent to first service Device, comprising:
Obtain the first transmission public key, wherein the first transmission public key is first server generation, and the first server saves There is the first transmission private key with the first transmission public key match;
The first private key component is encrypted according to the first transmission public key, obtains encrypted first private key point Amount;
The encrypted first private key component is sent to the first server.
17. according to the method for claim 15, which is characterized in that respond the authentication request, with first server, Second server carries out authentication, comprising:
The authentication request is responded, generates the first random number, and first random number is respectively sent to first service Device and second server;
Receive the first signed data, wherein first signed data is to default in the first MPC node of first server with institute The first private key component is stated as input data, and defaults in the 2nd MPC node of second server with the second private key component As input data, signature processing is carried out according to preset rules, obtained data;
According to first signed data and the transaction public key, determine whether authentication passes through.
18. according to the method for claim 15, which is characterized in that respond the authentication request, with first server, Second server carries out authentication, comprising:
Respond the authentication request, Xiang Suoshu first server, and/or, the second server sends verification public key and obtains Take request;
Receive verification public key, wherein the verification public key is to default in the first MPC node of first server with first private Key component is as input data, and defaults in the 2nd MPC node of second server using the second private key component as input Data carry out operation, obtained data according to preset rules;
According to the verification public key and the transaction public key, determine whether authentication passes through.
19. according to the method for claim 14, which is characterized in that the method also includes:
Response updates request, calls the first MPC node for defaulting in first server using the first private key component as input Data, and the 2nd MPC node of second server is defaulted in using the second private key component as input data, according to default rule Functional operation is then carried out, updated first private key component and updated second private key component are generated;Wherein, after the update The first private key component be stored in first server, the updated second private key component is stored in second server.
20. according to the method for claim 19, which is characterized in that update request in response, calling defaults in first service First MPC node of device is using the first private key component as input data, and defaults in the 2nd MPC node of second server Using the second private key component as input data, functional operation is carried out according to preset rules, generates updated first private key After component and updated second private key component, the method also includes:
Response key checking request generates the second random number;And by second random number be respectively sent to first server and Second server;
Receive the second signed data, wherein second signed data is to default in the first MPC node of first server with institute Updated first private key component is stated as input data, and defaults in the 2nd MPC node of second server with the update The second private key component afterwards carries out signature processing to second random number as input data, according to preset rules, obtains Data;
According to the transaction public key and second signed data, the updated first private key component, the update are determined Whether the second private key component afterwards meets the requirements.
21. according to the method for claim 19, which is characterized in that update request in response, calling defaults in first service First MPC node of device is using the first private key component as input data, and defaults in the 2nd MPC node of second server Using the second private key component as input data, functional operation is carried out according to preset rules, generates updated first private key After component and updated second private key component, the method also includes:
Response key checking request calls the first MPC node for defaulting in first server with updated first private key Component is as input data, and defaults in the 2nd MPC node of second server and made with the updated second private key component For input data, operation is carried out according to preset rules, generates updated transaction public key;
According to the transaction public key and the updated transaction public key, the updated first private key component, described is determined Whether updated second private key component meets the requirements.
22. a kind of data processing method, the data processing method is applied to first server, which is characterized in that described first Server preserves the first private key component, which comprises
Response identity checking request carries out authentication with the first client, second server, wherein the second server Preserve the second private key component, wherein the first private key component and the second private key component are given birth to according to the client At transaction private key generate;
In the case where authentication passes through, call the first MPC node for defaulting in first server with first private key point Amount is used as input data, and defaults in the 2nd MPC node of second server using the second private key component as input data, Preset functional operation is carried out according to preset rules, obtains operation result as trading signature.
23. a kind of data processing method, the data processing method is applied to include first server, second server and client In the system at end, which is characterized in that the first server preserves the first private key component, and the second server preserves Two private key components, wherein the first private key component and the second private key component are according to client transaction generated Private key generates, which comprises
The client end response response transaction data processing request initiates authentication request;
The client, the first server, the second server respond the authentication request, carry out identity and test Card;
In the case where authentication passes through, the first MPC node for defaulting in first server is made with the first private key component For input data, and default in the 2nd MPC node of second server using the second private key component as input data, according to Preset rules carry out preset functional operation, obtain operation result as trading signature, and the trading signature is fed back to visitor Family end;
The client carries out transaction data processing according to the trading signature.
24. a kind of data processing equipment characterized by comprising
Initiation module is used for response transaction data processing request, initiates authentication request;
Authentication module carries out authentication with first server, second server for responding the authentication request, In, the first server is used to save the second private key component for saving the first private key component, the second server, In, the first private key component and the second private key component are generated according to transaction private key;
Calling module, for calling the first MPC node for defaulting in first server with institute in the case where authentication passes through The first private key component is stated as input data, and defaults in the 2nd MPC node of second server with the second private key component As input data, preset functional operation is carried out according to preset rules, obtains operation result as trading signature;
Processing module, for carrying out transaction data processing according to the trading signature.
CN201910132899.5A 2019-02-22 2019-02-22 Data processing method and device Pending CN109872155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910132899.5A CN109872155A (en) 2019-02-22 2019-02-22 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910132899.5A CN109872155A (en) 2019-02-22 2019-02-22 Data processing method and device

Publications (1)

Publication Number Publication Date
CN109872155A true CN109872155A (en) 2019-06-11

Family

ID=66919103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910132899.5A Pending CN109872155A (en) 2019-02-22 2019-02-22 Data processing method and device

Country Status (1)

Country Link
CN (1) CN109872155A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110278078A (en) * 2019-06-17 2019-09-24 矩阵元技术(深圳)有限公司 A kind of data processing method, apparatus and system
CN110289968A (en) * 2019-06-27 2019-09-27 矩阵元技术(深圳)有限公司 Private key restores, cooperates with creation, endorsement method and device, the storage medium of address
CN110363528A (en) * 2019-06-27 2019-10-22 矩阵元技术(深圳)有限公司 Cooperate with generation, trading signature method and device, the storage medium of address
CN111343160A (en) * 2020-02-13 2020-06-26 南京如般量子科技有限公司 Anti-quantum computation blockchain transaction method and system based on secret sharing and routing device
CN111490878A (en) * 2020-04-09 2020-08-04 腾讯科技(深圳)有限公司 Key generation method, device, equipment and medium
CN111723385A (en) * 2020-06-01 2020-09-29 清华大学 Data information processing method, device, electronic device and storage medium
WO2020252617A1 (en) * 2019-06-17 2020-12-24 云图有限公司 Data processing method, apparatus and system
WO2020258126A1 (en) * 2019-06-27 2020-12-30 云图有限公司 Generation method and device for collaborative address, transaction signing method and device for collaborative address, and storage medium
CN112966280A (en) * 2021-03-12 2021-06-15 北京数字认证股份有限公司 Data processing method and device, server and data management system
WO2021169521A1 (en) * 2020-02-24 2021-09-02 华为技术有限公司 Signature method, terminal device and network device
CN113486320A (en) * 2021-07-22 2021-10-08 广州炒米信息科技有限公司 Enterprise electronic signature control method and device, storage medium and terminal equipment
CN113496398A (en) * 2020-03-19 2021-10-12 中移(上海)信息通信科技有限公司 Data processing method, device, equipment and medium based on intelligent contract
CN114666066A (en) * 2022-05-20 2022-06-24 杭州天谷信息科技有限公司 Private key recovery method and system and private key updating method and system
CN117635136A (en) * 2023-11-03 2024-03-01 中移互联网有限公司 Transaction authentication method, device, electronic equipment and storage medium
WO2025031042A1 (en) * 2023-08-09 2025-02-13 腾讯科技(深圳)有限公司 Data processing method and apparatus based on blockchain key, and device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101523800A (en) * 2006-10-10 2009-09-02 高通股份有限公司 Method and apparatus for mutual authentication
US20160191252A1 (en) * 2013-08-16 2016-06-30 China Iwncomm Co., Ltd. Method and device for generating digital signature
CN106027255A (en) * 2016-04-18 2016-10-12 李明 Identity card reading response security control method and device
CN106549770A (en) * 2017-01-13 2017-03-29 武汉理工大学 SM2 digital signature generation method and system
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106961336A (en) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithms
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN107302438A (en) * 2017-08-07 2017-10-27 收付宝科技有限公司 A kind of private key protection method based on key updating, system and device
CN107948189A (en) * 2017-12-19 2018-04-20 数安时代科技股份有限公司 Asymmetric cryptography authentication identifying method, device, computer equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101523800A (en) * 2006-10-10 2009-09-02 高通股份有限公司 Method and apparatus for mutual authentication
US20160191252A1 (en) * 2013-08-16 2016-06-30 China Iwncomm Co., Ltd. Method and device for generating digital signature
CN106027255A (en) * 2016-04-18 2016-10-12 李明 Identity card reading response security control method and device
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106549770A (en) * 2017-01-13 2017-03-29 武汉理工大学 SM2 digital signature generation method and system
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN106961336A (en) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 A kind of key components trustship method and system based on SM2 algorithms
CN107302438A (en) * 2017-08-07 2017-10-27 收付宝科技有限公司 A kind of private key protection method based on key updating, system and device
CN107948189A (en) * 2017-12-19 2018-04-20 数安时代科技股份有限公司 Asymmetric cryptography authentication identifying method, device, computer equipment and storage medium

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110278078A (en) * 2019-06-17 2019-09-24 矩阵元技术(深圳)有限公司 A kind of data processing method, apparatus and system
WO2020252617A1 (en) * 2019-06-17 2020-12-24 云图有限公司 Data processing method, apparatus and system
WO2020258126A1 (en) * 2019-06-27 2020-12-30 云图有限公司 Generation method and device for collaborative address, transaction signing method and device for collaborative address, and storage medium
CN110289968A (en) * 2019-06-27 2019-09-27 矩阵元技术(深圳)有限公司 Private key restores, cooperates with creation, endorsement method and device, the storage medium of address
CN110363528A (en) * 2019-06-27 2019-10-22 矩阵元技术(深圳)有限公司 Cooperate with generation, trading signature method and device, the storage medium of address
CN110289968B (en) * 2019-06-27 2022-06-24 矩阵元技术(深圳)有限公司 Private key recovery method, collaborative address creation method, collaborative address signature device and storage medium
CN110363528B (en) * 2019-06-27 2022-06-24 矩阵元技术(深圳)有限公司 Collaborative address generation method, collaborative address generation device, transaction signature method, transaction signature device and storage medium
CN111343160A (en) * 2020-02-13 2020-06-26 南京如般量子科技有限公司 Anti-quantum computation blockchain transaction method and system based on secret sharing and routing device
CN111343160B (en) * 2020-02-13 2022-07-08 南京如般量子科技有限公司 Anti-quantum computation blockchain transaction method and system based on secret sharing and routing device
WO2021169521A1 (en) * 2020-02-24 2021-09-02 华为技术有限公司 Signature method, terminal device and network device
CN113496398A (en) * 2020-03-19 2021-10-12 中移(上海)信息通信科技有限公司 Data processing method, device, equipment and medium based on intelligent contract
US12081658B2 (en) 2020-04-09 2024-09-03 Tencent Technology (Shenzhen) Company Limited Key generation method and apparatus, device, and medium
CN111490878A (en) * 2020-04-09 2020-08-04 腾讯科技(深圳)有限公司 Key generation method, device, equipment and medium
CN111723385A (en) * 2020-06-01 2020-09-29 清华大学 Data information processing method, device, electronic device and storage medium
CN111723385B (en) * 2020-06-01 2024-02-09 清华大学 Data information processing method, device, electronic equipment and storage medium
CN112966280A (en) * 2021-03-12 2021-06-15 北京数字认证股份有限公司 Data processing method and device, server and data management system
CN113486320A (en) * 2021-07-22 2021-10-08 广州炒米信息科技有限公司 Enterprise electronic signature control method and device, storage medium and terminal equipment
CN113486320B (en) * 2021-07-22 2024-03-29 广州炒米信息科技有限公司 Enterprise electronic signature management and control method and device, storage medium and terminal equipment
CN114666066A (en) * 2022-05-20 2022-06-24 杭州天谷信息科技有限公司 Private key recovery method and system and private key updating method and system
WO2025031042A1 (en) * 2023-08-09 2025-02-13 腾讯科技(深圳)有限公司 Data processing method and apparatus based on blockchain key, and device and storage medium
CN117635136A (en) * 2023-11-03 2024-03-01 中移互联网有限公司 Transaction authentication method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109872155A (en) Data processing method and device
US12192381B2 (en) System and method for secure multi-party computation based blockchain transaction
Xiong et al. A key protection scheme based on secret sharing for blockchain-based construction supply chain system
KR101634158B1 (en) Method for authenticating identity and generating share key
CN108768633A (en) Realize the method and device of information sharing in block chain
US11616643B2 (en) System and method of management of a shared cryptographic account
CN109861816A (en) Data processing method and device
CN109064324A (en) Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN110138548B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
US12192326B2 (en) System and method of multi-party computation based multi-factor authentication
WO2020253108A1 (en) Information hiding method, apparatus, device, and storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN109272314B (en) A secure communication method and system based on two-party collaborative signature calculation
CN105847000A (en) Token generation method and communication system based on same
CN110046906A (en) A kind of the two-way authentication method of commerce and system of MPOS machine and server
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN113779606A (en) An information verification method and system for reducing the risk of privacy leakage
CN107154916A (en) A kind of authentication information acquisition methods, offer method and device
CN117081736A (en) Key distribution method, key distribution device, communication method, and communication device
CN110176989B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool
CN111784338A (en) Information processing method, device, system and storage medium
CN110363528B (en) Collaborative address generation method, collaborative address generation device, transaction signature method, transaction signature device and storage medium
CN110266483B (en) Quantum communication service station key negotiation method, system and device based on asymmetric key pool pair and QKD
CN116823257A (en) Information processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40009460

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190611