CN108846671A - Safety on line method of commerce and system based on block chain - Google Patents

Safety on line method of commerce and system based on block chain Download PDF

Info

Publication number
CN108846671A
CN108846671A CN201810576322.9A CN201810576322A CN108846671A CN 108846671 A CN108846671 A CN 108846671A CN 201810576322 A CN201810576322 A CN 201810576322A CN 108846671 A CN108846671 A CN 108846671A
Authority
CN
China
Prior art keywords
user device
hashed value
transaction information
decrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810576322.9A
Other languages
Chinese (zh)
Other versions
CN108846671B (en
Inventor
杨建军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhenke Information Technology Service Co.,Ltd.
Original Assignee
Anhui Quality In Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Quality In Intelligent Technology Co Ltd filed Critical Anhui Quality In Intelligent Technology Co Ltd
Priority to CN201810576322.9A priority Critical patent/CN108846671B/en
Publication of CN108846671A publication Critical patent/CN108846671A/en
Application granted granted Critical
Publication of CN108846671B publication Critical patent/CN108846671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention is about a kind of safety on line method of commerce based on block chain, including reading the first Transaction Information from server by first user device, first Transaction Information and its hashed value are encrypted respectively and travel to second user device, the first Transaction Information and hashed value are decrypted and are verified respectively by second user device, and according to the first Transaction Information access server, first user device will be completed after completing transaction according to second user device from the read second Transaction Information confirmation transaction of server, and request server changes the first Transaction Information.The invention also discloses a kind of safety on line transaction systems based on block chain.

Description

Safety on line method of commerce and system based on block chain
Technical field
The present invention discloses the field about mechanics of communication, the safety on line transaction more specifically about a kind of based on block chain Method and system.
Background technique
Block chain is a kind of database of decentralization, and the record including a sustainable growth is the list of block, these Difference is linked and is encrypted by way of cryptography.Each block usually include previous block cryptographic hash, timestamp and Transaction data.Block chain can be used for data permanent secure save, once data are recorded, then unless modify its it is all after Continuous block, cannot all modify to the data, and have very high BFT fault-tolerance.Therefore, block chain is widely used at present In fields such as identification, online transaction, ideal money, account management, document storing, food safety trace backs.
In online transaction field, block chain due to the outstanding disclosure of the invention transparency, safety and reliability and realize Trading Model new such as bit coin.But because of it and there is no the processing center of a centralization, any one terminals It can regard a center as and possess complete block chain account, i.e., whole Transaction Information, so block chain and existing There is the cooperation of centralization transaction platform or third party transaction server to necessarily require some additional mechanism that can just smoothly complete.
Summary of the invention
The first purpose that the present invention discloses embodiment is to solve the above problem in the prior art, and provides and can increase The safety on line method of commerce and system of compatibility between existing centralization transaction platform and block chain Trading Model.
The present invention discloses some embodiments about a kind of safety on line method of commerce based on block chain, including is used by first Family device from remote server read the first Transaction Information, first Transaction Information include uniform resource position mark URL information and First Transaction Information input hash function is calculated the first hashed value by first user device, is filled by the first user by access information The private key encryption that the first hashed value is utilized to first user device is set, the first Transaction Information is utilized first by first user device The shared public key encryption of user apparatus and second user device, by first user device by encrypted the first hashed value and added The first close Transaction Information is added to the first block and travels to second user device, passes through second user by second user device The private key of device decrypts the first Transaction Information, by second user device by the first hashed value of public key decryptions, is filled by second user It sets the first Transaction Information input hash function that will be decrypted and calculates the second hashed value, in the first hashed value decrypted and second Decrypted access information is utilized to access on remote server corresponding to URL information as second user device when hashed value is consistent Internet resources, by second user device from remote server read the second Transaction Information, by second user device by second hand over Easy information input hash function calculates third hashed value, and third hashed value is utilized second user device by second user device Second Transaction Information is utilized public key encryption by second user device by private key encryption, by second user device by encrypted the Three hashed values and the second encrypted Transaction Information are added to the second block and travel to first user device, are filled by the first user It sets through public key decryptions third hashed value, is calculated the second Transaction Information decrypted input hash function by first user device 4th hashed value, and when the third hashed value decrypted is consistent with the 4th hashed value from first user device to remote service Device sends the confirmation message that transaction is completed and remote server is requested to change access information.
The present invention discloses a kind of safety on line transaction system based on block chain of embodiment also disclosure of the invention, including mutual First user device, second user device and the remote server of communicative couplings, wherein first user device is configured to from long-range Server reads the first Transaction Information, which includes uniform resource position mark URL information and access information, by the One Transaction Information inputs hash function and calculates the first hashed value, and the first hashed value is utilized to the private key encryption of first user device, By the first Transaction Information public key encryption shared using first user device and second user device, and encrypted first is dissipated Train value and the first encrypted Transaction Information are added to the first block and travel to second user device, the configuration of second user device The decrypted first transaction is believed with the first hashed value of public key decryptions at first Transaction Information received with private key decryption Breath input hash function calculates the second hashed value, utilizes and is decrypted when the first hashed value decrypted is consistent with the second hashed value Access information access URL information corresponding to Internet resources on remote server, read the second transaction from remote server Second Transaction Information input hash function is calculated third hashed value, third hashed value is utilized second user device by information Private key encryption;Second Transaction Information is utilized into public key encryption, and encrypted third hashed value and encrypted second are traded Information is added to the second block and travels to first user device and first user device is configured to decrypt by its private key The second Transaction Information decrypted input hash function is calculated the by public key decryptions third hashed value by the second Transaction Information Four hashed values send the confirmation that transaction is completed to remote server when the third hashed value decrypted is consistent with the 4th hashed value Message simultaneously requests remote server to change access information.
In some embodiments, access information is generated at random by remote server.
In some embodiments, second user device has not been stored in second user dress in the first hashed value decrypted Judge whether decrypted the first hashed value and the second hashed value are consistent in the case where setting again.
In some embodiments, first user device has not been stored in the first user dress in the third hashed value decrypted Judge whether decrypted third hashed value and the 4th hashed value are consistent in the case where setting again.
In some embodiments, first user device broadcasts public key together with the first block.
In some embodiments, the second Transaction Information does not include URL information and access information.
The embodiment of institute's disclosure of the invention can provide compatibility for the transaction between different types of third party transaction platform, The agreement that exchange follows can be selected in the case where keeping anonymous by allowing between random both parties, guarantee to pacify Conveniently complete to trade while full property, thus the transparency possessed by block chain Trading Model, safety, reliability and easily Maintainability can be suitable for existing various centralization transaction systems in certain aspects.
Detailed description of the invention
Provided attached drawing is in order to illustrate to being illustrated property of the embodiments herein, rather than in order to limit embodiment In illustrated range.
Fig. 1 is the block diagram according to the affaris safety trade system of one embodiment.
Fig. 2 is the flow chart according to the method for secure transactions of one embodiment.
Specific embodiment
It will be appreciated by those skilled in the art that although first, second, third, etc. repeatedly occurs herein to be used to describe respectively Kind of element, but these elements and should not be limited by these terms limitation.These terms are only used to element is distinguished from each other out.For example, the One element can be referred to as second element, and similarly, and second element can be referred to as the first element, without departing from model of the invention It encloses.As used herein, term "and/or" includes associated any or all group listed in one or more of project It closes.
Fig. 1 is the block diagram according to the affaris safety trade system 100 of one embodiment.System 100 includes first user device 101, second user device 111 and remote server 120.User apparatus 101 and 111 can be any fixing user terminal and shifting Dynamic user terminal, and can by support various agreements cable network or wireless network on the internet with remote server 120 are communicated.Remote server 120 may be embodied as server cluster, cloud etc. to construct the third party transaction of centralization Platform, and operated according to the self-defining rule of the transaction platform operator and agreement.Although illustrating only one in figure Remote server 120, but it will be appreciated by those skilled in the art that first user device 101 and second user device 111 can with it is right It answers multiple remote servers 120 of a variety of third party transaction platform trading rules to be communicated, and is selected in process of exchange Any trading rules.First user device 101 includes first processor 102, and first memory 103 and the first I/O connect Mouth 104.Second user device 111 includes second processor 112, second memory 113 and the 2nd I/O interface 114.Processor 102, it 112 the processor of any general or specialized type, controller be can be is executed instruction with operating corresponding user apparatus.It deposits Reservoir 103,113 preferably includes volatile storage medium and non-volatile memory medium, to be at least used for during store transaction The Transaction Information of generation and the instruction as performed by processor 102,112.I/O interface 104,114 may include being suitable for leading to Adapter, wired network adapter, the coaxial cable, optical fiber etc. that wired connection is communicated are crossed, further includes being used for wirelessly, example Such as 4G/LTE, GSM, CDMA, TDM or other cellular networks etc. are come transceiver, the antenna etc. that are communicated.
Fig. 2 is the flow chart according to the method for secure transactions of one embodiment.In step s 201, first by the first user Device 101 reads the first Transaction Information from remote server 120 by the first I/O interface 104.First Transaction Information include with The relevant uniform resource position mark URL information of the transaction to be initiated of first user device 101 and access information, such as user Name, session id, identification code, transaction feature code or password etc..What the access information preferably determined at random, that is, include one random Number, and all replaced after every transaction completion.The processor 102 of first user device 101 then will be read First Transaction Information inputs hash function and calculates the first hashed value.The hash function is, for example, in secure hash algorithm SHA SHA256 function, the function finally obtain 256 ratios by executing circulation encryption by logical operation is repeated after message piecemeal Special summary info, i.e. hashed value.First hashed value calculated can be stored in memory 103 by first user device 101, And the private key encryption held using first user device 101, and the first Transaction Information itself is then to utilize first user device 101 and second user device 102 common to public key encrypt.The public key and private key can be the public key in RSA signature algorithm And private key, and can generate and store by corresponding processor 102,112.Later, processor 102 can will be encrypted The first hashed value and the first encrypted Transaction Information second user device 111 traveled to by the first I/O interface 104.? In one embodiment, the first encrypted hashed value and the first encrypted Transaction Information can be used as an area in block chain Block is added to block chain, and the required data of other necessity are added, such as timestamp, the record of a upper block, Merkel's tree root Value etc..In one embodiment, added block can be broadcasted together with public key to allow not specific any use in network Family can receive and save.But spread scope can also be controlled in selected user by the way of unicast or multicast Group.The block can disperse to be stored by any one other users device in a network.
In step S202, second user device 111 decrypts the first Transaction Information by its private key first and passes through public key Decrypt the first hashed value.It will be stored in the memory 113 of second user device 111 corresponding with first user device 101 Hash function, the corresponding same input of the hash function will have same output, but can not shift its input onto from the output is counter Value.The processor 112 of second user device 111 by the first Transaction Information decrypted input hash function calculate one it is new Hashed value i.e. the second hashed value.If the first hashed value decrypted is consistent with the second hashed value, the transaction received is proved Information is not tampered with, and is true and reliable.Second user device 111 can also save the first hashed value decrypted every time, If it find that in memory 113 before store hashed value it is consistent with the first hashed value currently decrypted, then can abandon into Row is traded herein.Second user device 111 therefore can be the case where the first hashed value decrypted be not stored in memory 113 Under judge the first hashed value and the second hashed value whether unanimously to avoid repetitive operation again.Hereafter, 111 basis of second user device The URL information in the first Transaction Information and access information decrypted access remote server 120 by the 2nd I/O interface 114, And process relevant to transaction can be executed in remote server 120, such as obtain payment account information, modify the amount of money, is defeated Enter password etc..
In step S203, the is read from remote server 120 by the 2nd I/O interface 114 by second user device 111 Two Transaction Informations.Second Transaction Information preferably can be the confirmation message that confirmation transaction has been completed, and may include transaction Serial number, transaction complete identifier etc. without including any URL information or access information, and first user device 101 will therefore nothing It need to know the information of transaction performed by second user device 111, and need to only be confirmed with remote server 120.Second uses Read second Transaction Information is then inputted above-mentioned hash function and calculates third hashed value by family device 111, and third is hashed Value utilizes its private key encryption, and the second Transaction Information utilizes above-mentioned public key encryption.It is similar with above-mentioned steps, second user device 101 Encrypted third hashed value and the second encrypted Transaction Information are then added to the second block and travel to the first user Device 101 completes the process of exchange so as to the confirmation of first user device 101 later.First user device 101 can be according to second The second Transaction Information in block determines and carries out subsequent operation with remote server 120 after trading successfully.Second user device 111 can save second Transaction Information in its second memory 113 to avoid repeat business.
In step S204, first user device 101 is decrypted the second Transaction Information by the private key of its own and is passed through upper Public key decryptions third hashed value is stated, the second Transaction Information decrypted then is inputted into above-mentioned identical hash function and calculates the Four hashed values.When the third hashed value decrypted is consistent with the 4th hashed value, first user device 101 will pass through its first I/ O Interface 104 sends the confirmation message that transaction is completed to remote server 120, and confirmation both sides' process of exchange is completed, and can be with Remote server 120 carries out the subsequent operations such as transmission, integration managing or the account calculating of discount coupon.First user device 101 can The third hashed value decrypted every time is saved, for being confirmed whether to have carried out identical friendship when trading next time Easily.Similarly, first user device 101 can not be stored in first user device 101 in the third hashed value decrypted In the case where judge whether decrypted third hashed value and the 4th hashed value consistent again.Transmitted by first user device 101 Confirmation message is also used to that remote server 120 is requested to change the access that first user device 101 was read in step s 201 Information, to ensure that first user device 101 from read first Transaction Information of remote server 120 will have difference next time Access information or URL information, thus avoid the occurrence of overlapping transaction block.
Although for purposes of illustration, having been described that some specific embodiments herein, the present invention will cover this Any revision or change for the embodiment that text discusses.Embodiment described herein being limited only by the following claims, and it is not limited to have The step of body describes or component.

Claims (10)

1. a kind of safety on line method of commerce based on block chain, it is characterised in that including the following steps executed in order:
The first Transaction Information is read from remote server by first user device, which includes unified resource positioning Accord with URL information and access information;
The first Transaction Information input hash function is calculated into the first hashed value by first user device;
First hashed value is utilized to the private key encryption of first user device by first user device;
By the first user device public key encryption that the first Transaction Information is shared using first user device and second user device;
The first encrypted hashed value and the first encrypted Transaction Information are added to the first block simultaneously by first user device Travel to second user device;
The first Transaction Information is decrypted by the private key of second user device by second user device;
First hashed value of public key decryptions is passed through by second user device;
The first Transaction Information decrypted is inputted into the hash function by second user device and calculates the second hashed value;
Decrypted access is utilized by second user device when the first hashed value decrypted is consistent with second hashed value Internet resources on the remote server corresponding to URL information described in information access;
The second Transaction Information is read from the remote server by second user device;
The second Transaction Information is inputted into the hash function by second user device and calculates third hashed value;
Third hashed value is utilized to the private key encryption of second user device by second user device;
The second Transaction Information is utilized into the public key encryption by second user device;
Encrypted third hashed value and the second encrypted Transaction Information are added to the second block simultaneously by second user device Travel to first user device;
The second Transaction Information is decrypted by the private key of first user device by the first user device;
The public key decryptions third hashed value is passed through by the first user device;
The second Transaction Information decrypted is inputted into the hash function by first user device and calculates the 4th hashed value;And
When the third hashed value decrypted is consistent with the 4th hashed value from first user device to the remote server It sends the confirmation message that transaction is completed and the remote server is requested to change the access information.
2. method described in claim 1, it is characterised in that the access information is generated at random by the remote server.
3. method as claimed in claim 2, it is characterised in that further include the second user device in the first hash decrypted Value judge again in the case where not being stored in second user device decrypted the first hashed value and the second hashed value whether one It causes.
4. method as claimed in claim 3, it is characterised in that further include the first user device in the third hash decrypted Value judge again in the case where not being stored in first user device decrypted third hashed value and the 4th hashed value whether one It causes.
5. method as claimed in claim 4, it is characterised in that the first user device is by the public key and first block It is broadcasted together.
6. a kind of safety on line transaction system based on block chain, it is characterised in that including:
First user device, second user device and the remote server of coupling are communicated with each other,
Wherein the first user device is configured to read the first Transaction Information from remote server, which includes First Transaction Information input hash function is calculated the first hashed value, by the by uniform resource position mark URL information and access information One hashed value utilizes the private key encryption of first user device, and the first Transaction Information is filled using first user device and second user Shared public key encryption is set, and the first encrypted hashed value and the first encrypted Transaction Information are added to the first block simultaneously Travel to second user device;
The second user device is configured to decrypt the first received Transaction Information with private key, with the public key decryptions first The first Transaction Information decrypted is inputted the hash function and calculates the second hashed value by hashed value, is dissipated in first decrypted Train value utilizes decrypted access information to access when consistent with second hashed value described long-range corresponding to the URL information Internet resources on server read the second Transaction Information from the remote server, and the input of the second Transaction Information is described scattered Array function calculates third hashed value, and third hashed value is utilized to the private key encryption of second user device;By the second Transaction Information benefit With the public key encryption, and encrypted third hashed value and the second encrypted Transaction Information are added to the second block and passed It is multicast to first user device;And
First user device was configured to the public key decryptions third hashed value, and the second Transaction Information decrypted is inputted institute It states hash function and calculates the 4th hashed value, when the third hashed value decrypted is consistent with the 4th hashed value to remote service Device sends the confirmation message that transaction is completed and the remote server is requested to change the access information.
7. system as claimed in claim 6, it is characterised in that the access information is generated at random by the remote server.
8. system as claimed in claim 7, it is characterised in that the second user device is configured to dissipate in first decrypted Whether train value judges decrypted the first hashed value and the second hashed value again in the case where not being stored in second user device Unanimously.
9. system according to any one of claims 8, it is characterised in that the first user device is configured to dissipate in the third decrypted Whether train value judges decrypted third hashed value and the 4th hashed value again in the case where not being stored in first user device Unanimously.
10. system as claimed in claim 9, it is characterised in that the first user device be configured to by the public key with it is described First block is broadcasted together.
CN201810576322.9A 2018-06-05 2018-06-05 Online secure transaction method and system based on block chain Active CN108846671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810576322.9A CN108846671B (en) 2018-06-05 2018-06-05 Online secure transaction method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810576322.9A CN108846671B (en) 2018-06-05 2018-06-05 Online secure transaction method and system based on block chain

Publications (2)

Publication Number Publication Date
CN108846671A true CN108846671A (en) 2018-11-20
CN108846671B CN108846671B (en) 2021-10-26

Family

ID=64210514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810576322.9A Active CN108846671B (en) 2018-06-05 2018-06-05 Online secure transaction method and system based on block chain

Country Status (1)

Country Link
CN (1) CN108846671B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110119937A (en) * 2019-05-10 2019-08-13 中国联合网络通信集团有限公司 Virtual article trading method and system
CN110570321A (en) * 2019-09-16 2019-12-13 上海保险交易所股份有限公司 Block chain based reinsurance business method and system
CN110580785A (en) * 2019-01-18 2019-12-17 深圳市阿尔丰科技有限公司 Cash register system, cash register device and cash register method applied to cash register system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110580785A (en) * 2019-01-18 2019-12-17 深圳市阿尔丰科技有限公司 Cash register system, cash register device and cash register method applied to cash register system
CN110119937A (en) * 2019-05-10 2019-08-13 中国联合网络通信集团有限公司 Virtual article trading method and system
CN110570321A (en) * 2019-09-16 2019-12-13 上海保险交易所股份有限公司 Block chain based reinsurance business method and system

Also Published As

Publication number Publication date
CN108846671B (en) 2021-10-26

Similar Documents

Publication Publication Date Title
WO2019214312A1 (en) Blockchain-based logistics information transmission method, system and device
CN103918219B (en) Based on the method and apparatus of the electronic content distribution of privacy share
CN111292041B (en) Electronic contract generation method, device, equipment and storage medium
CN1839608B (en) Device and method for generating a unique user's identity for use between different domains
US20180205555A1 (en) Contract Agreement Method, Agreement Verification Method, Contract Agreement System, Agreement Verification Device, Contract Agreement Device, Contract Agreement Program and Agreement Verification Program
CN110383760A (en) User's control, distributing, distribution and safety content distribution
US10609010B2 (en) System, methods and software application for sending secured messages on decentralized networks
CN105407097B (en) Based on third-party data furnishing method and device
CN109447647A (en) A kind of safety payment system based on block chain
US20140046749A1 (en) Techniques for monetizing anonymized context
CN110502916A (en) A kind of sensitive data processing method and system based on block chain
CN110599342B (en) Block chain-based identity information authorization method and device
CN104365127B (en) Method for following the trail of mobile device in remote display unit
CN116049626A (en) Data statistics method, device, equipment and storage medium
CN108846671A (en) Safety on line method of commerce and system based on block chain
CN109858272A (en) Blacklist data processing system based on block chain
CN109377220B (en) Block chain-based media data transaction method and system and computer storage medium
US20220210140A1 (en) Systems and methods for federated learning on blockchain
CN113672949A (en) Data transmission method and system for protecting advertisement multiparty privacy
CN107025591A (en) Data trade platform
CN109948370A (en) A kind of method for processing business based on block chain, device and electronic equipment
CN114244851B (en) Block chain-based data distribution method
CN104361295B (en) Method for inquiring and verifying data of internet-of-vehicles RSU (Remote Subscriber Unit) based on cloud platform
CN113538019B (en) Food traceability information evidence storing method and device
CN110532786A (en) Using the block chain blacklist sharing method of Hash desensitization process

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210916

Address after: Room 105, building 10, 1385 Panyuan Road, Changxing Town, Chongming District, Shanghai 202150

Applicant after: Shanghai Zhenke Information Technology Service Co.,Ltd.

Address before: 230088 room 908, administration building, Yingtang Science Park, intersection of Wangjiang West Road and Fushan Road, high tech Zone, Hefei City, Anhui Province

Applicant before: ANHUI ZHIZAI INTELLIGENT TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant