CN108846671A - Safety on line method of commerce and system based on block chain - Google Patents
Safety on line method of commerce and system based on block chain Download PDFInfo
- Publication number
- CN108846671A CN108846671A CN201810576322.9A CN201810576322A CN108846671A CN 108846671 A CN108846671 A CN 108846671A CN 201810576322 A CN201810576322 A CN 201810576322A CN 108846671 A CN108846671 A CN 108846671A
- Authority
- CN
- China
- Prior art keywords
- user device
- hashed value
- transaction information
- decrypted
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention is about a kind of safety on line method of commerce based on block chain, including reading the first Transaction Information from server by first user device, first Transaction Information and its hashed value are encrypted respectively and travel to second user device, the first Transaction Information and hashed value are decrypted and are verified respectively by second user device, and according to the first Transaction Information access server, first user device will be completed after completing transaction according to second user device from the read second Transaction Information confirmation transaction of server, and request server changes the first Transaction Information.The invention also discloses a kind of safety on line transaction systems based on block chain.
Description
Technical field
The present invention discloses the field about mechanics of communication, the safety on line transaction more specifically about a kind of based on block chain
Method and system.
Background technique
Block chain is a kind of database of decentralization, and the record including a sustainable growth is the list of block, these
Difference is linked and is encrypted by way of cryptography.Each block usually include previous block cryptographic hash, timestamp and
Transaction data.Block chain can be used for data permanent secure save, once data are recorded, then unless modify its it is all after
Continuous block, cannot all modify to the data, and have very high BFT fault-tolerance.Therefore, block chain is widely used at present
In fields such as identification, online transaction, ideal money, account management, document storing, food safety trace backs.
In online transaction field, block chain due to the outstanding disclosure of the invention transparency, safety and reliability and realize
Trading Model new such as bit coin.But because of it and there is no the processing center of a centralization, any one terminals
It can regard a center as and possess complete block chain account, i.e., whole Transaction Information, so block chain and existing
There is the cooperation of centralization transaction platform or third party transaction server to necessarily require some additional mechanism that can just smoothly complete.
Summary of the invention
The first purpose that the present invention discloses embodiment is to solve the above problem in the prior art, and provides and can increase
The safety on line method of commerce and system of compatibility between existing centralization transaction platform and block chain Trading Model.
The present invention discloses some embodiments about a kind of safety on line method of commerce based on block chain, including is used by first
Family device from remote server read the first Transaction Information, first Transaction Information include uniform resource position mark URL information and
First Transaction Information input hash function is calculated the first hashed value by first user device, is filled by the first user by access information
The private key encryption that the first hashed value is utilized to first user device is set, the first Transaction Information is utilized first by first user device
The shared public key encryption of user apparatus and second user device, by first user device by encrypted the first hashed value and added
The first close Transaction Information is added to the first block and travels to second user device, passes through second user by second user device
The private key of device decrypts the first Transaction Information, by second user device by the first hashed value of public key decryptions, is filled by second user
It sets the first Transaction Information input hash function that will be decrypted and calculates the second hashed value, in the first hashed value decrypted and second
Decrypted access information is utilized to access on remote server corresponding to URL information as second user device when hashed value is consistent
Internet resources, by second user device from remote server read the second Transaction Information, by second user device by second hand over
Easy information input hash function calculates third hashed value, and third hashed value is utilized second user device by second user device
Second Transaction Information is utilized public key encryption by second user device by private key encryption, by second user device by encrypted the
Three hashed values and the second encrypted Transaction Information are added to the second block and travel to first user device, are filled by the first user
It sets through public key decryptions third hashed value, is calculated the second Transaction Information decrypted input hash function by first user device
4th hashed value, and when the third hashed value decrypted is consistent with the 4th hashed value from first user device to remote service
Device sends the confirmation message that transaction is completed and remote server is requested to change access information.
The present invention discloses a kind of safety on line transaction system based on block chain of embodiment also disclosure of the invention, including mutual
First user device, second user device and the remote server of communicative couplings, wherein first user device is configured to from long-range
Server reads the first Transaction Information, which includes uniform resource position mark URL information and access information, by the
One Transaction Information inputs hash function and calculates the first hashed value, and the first hashed value is utilized to the private key encryption of first user device,
By the first Transaction Information public key encryption shared using first user device and second user device, and encrypted first is dissipated
Train value and the first encrypted Transaction Information are added to the first block and travel to second user device, the configuration of second user device
The decrypted first transaction is believed with the first hashed value of public key decryptions at first Transaction Information received with private key decryption
Breath input hash function calculates the second hashed value, utilizes and is decrypted when the first hashed value decrypted is consistent with the second hashed value
Access information access URL information corresponding to Internet resources on remote server, read the second transaction from remote server
Second Transaction Information input hash function is calculated third hashed value, third hashed value is utilized second user device by information
Private key encryption;Second Transaction Information is utilized into public key encryption, and encrypted third hashed value and encrypted second are traded
Information is added to the second block and travels to first user device and first user device is configured to decrypt by its private key
The second Transaction Information decrypted input hash function is calculated the by public key decryptions third hashed value by the second Transaction Information
Four hashed values send the confirmation that transaction is completed to remote server when the third hashed value decrypted is consistent with the 4th hashed value
Message simultaneously requests remote server to change access information.
In some embodiments, access information is generated at random by remote server.
In some embodiments, second user device has not been stored in second user dress in the first hashed value decrypted
Judge whether decrypted the first hashed value and the second hashed value are consistent in the case where setting again.
In some embodiments, first user device has not been stored in the first user dress in the third hashed value decrypted
Judge whether decrypted third hashed value and the 4th hashed value are consistent in the case where setting again.
In some embodiments, first user device broadcasts public key together with the first block.
In some embodiments, the second Transaction Information does not include URL information and access information.
The embodiment of institute's disclosure of the invention can provide compatibility for the transaction between different types of third party transaction platform,
The agreement that exchange follows can be selected in the case where keeping anonymous by allowing between random both parties, guarantee to pacify
Conveniently complete to trade while full property, thus the transparency possessed by block chain Trading Model, safety, reliability and easily
Maintainability can be suitable for existing various centralization transaction systems in certain aspects.
Detailed description of the invention
Provided attached drawing is in order to illustrate to being illustrated property of the embodiments herein, rather than in order to limit embodiment
In illustrated range.
Fig. 1 is the block diagram according to the affaris safety trade system of one embodiment.
Fig. 2 is the flow chart according to the method for secure transactions of one embodiment.
Specific embodiment
It will be appreciated by those skilled in the art that although first, second, third, etc. repeatedly occurs herein to be used to describe respectively
Kind of element, but these elements and should not be limited by these terms limitation.These terms are only used to element is distinguished from each other out.For example, the
One element can be referred to as second element, and similarly, and second element can be referred to as the first element, without departing from model of the invention
It encloses.As used herein, term "and/or" includes associated any or all group listed in one or more of project
It closes.
Fig. 1 is the block diagram according to the affaris safety trade system 100 of one embodiment.System 100 includes first user device
101, second user device 111 and remote server 120.User apparatus 101 and 111 can be any fixing user terminal and shifting
Dynamic user terminal, and can by support various agreements cable network or wireless network on the internet with remote server
120 are communicated.Remote server 120 may be embodied as server cluster, cloud etc. to construct the third party transaction of centralization
Platform, and operated according to the self-defining rule of the transaction platform operator and agreement.Although illustrating only one in figure
Remote server 120, but it will be appreciated by those skilled in the art that first user device 101 and second user device 111 can with it is right
It answers multiple remote servers 120 of a variety of third party transaction platform trading rules to be communicated, and is selected in process of exchange
Any trading rules.First user device 101 includes first processor 102, and first memory 103 and the first I/O connect
Mouth 104.Second user device 111 includes second processor 112, second memory 113 and the 2nd I/O interface 114.Processor
102, it 112 the processor of any general or specialized type, controller be can be is executed instruction with operating corresponding user apparatus.It deposits
Reservoir 103,113 preferably includes volatile storage medium and non-volatile memory medium, to be at least used for during store transaction
The Transaction Information of generation and the instruction as performed by processor 102,112.I/O interface 104,114 may include being suitable for leading to
Adapter, wired network adapter, the coaxial cable, optical fiber etc. that wired connection is communicated are crossed, further includes being used for wirelessly, example
Such as 4G/LTE, GSM, CDMA, TDM or other cellular networks etc. are come transceiver, the antenna etc. that are communicated.
Fig. 2 is the flow chart according to the method for secure transactions of one embodiment.In step s 201, first by the first user
Device 101 reads the first Transaction Information from remote server 120 by the first I/O interface 104.First Transaction Information include with
The relevant uniform resource position mark URL information of the transaction to be initiated of first user device 101 and access information, such as user
Name, session id, identification code, transaction feature code or password etc..What the access information preferably determined at random, that is, include one random
Number, and all replaced after every transaction completion.The processor 102 of first user device 101 then will be read
First Transaction Information inputs hash function and calculates the first hashed value.The hash function is, for example, in secure hash algorithm SHA
SHA256 function, the function finally obtain 256 ratios by executing circulation encryption by logical operation is repeated after message piecemeal
Special summary info, i.e. hashed value.First hashed value calculated can be stored in memory 103 by first user device 101,
And the private key encryption held using first user device 101, and the first Transaction Information itself is then to utilize first user device
101 and second user device 102 common to public key encrypt.The public key and private key can be the public key in RSA signature algorithm
And private key, and can generate and store by corresponding processor 102,112.Later, processor 102 can will be encrypted
The first hashed value and the first encrypted Transaction Information second user device 111 traveled to by the first I/O interface 104.?
In one embodiment, the first encrypted hashed value and the first encrypted Transaction Information can be used as an area in block chain
Block is added to block chain, and the required data of other necessity are added, such as timestamp, the record of a upper block, Merkel's tree root
Value etc..In one embodiment, added block can be broadcasted together with public key to allow not specific any use in network
Family can receive and save.But spread scope can also be controlled in selected user by the way of unicast or multicast
Group.The block can disperse to be stored by any one other users device in a network.
In step S202, second user device 111 decrypts the first Transaction Information by its private key first and passes through public key
Decrypt the first hashed value.It will be stored in the memory 113 of second user device 111 corresponding with first user device 101
Hash function, the corresponding same input of the hash function will have same output, but can not shift its input onto from the output is counter
Value.The processor 112 of second user device 111 by the first Transaction Information decrypted input hash function calculate one it is new
Hashed value i.e. the second hashed value.If the first hashed value decrypted is consistent with the second hashed value, the transaction received is proved
Information is not tampered with, and is true and reliable.Second user device 111 can also save the first hashed value decrypted every time,
If it find that in memory 113 before store hashed value it is consistent with the first hashed value currently decrypted, then can abandon into
Row is traded herein.Second user device 111 therefore can be the case where the first hashed value decrypted be not stored in memory 113
Under judge the first hashed value and the second hashed value whether unanimously to avoid repetitive operation again.Hereafter, 111 basis of second user device
The URL information in the first Transaction Information and access information decrypted access remote server 120 by the 2nd I/O interface 114,
And process relevant to transaction can be executed in remote server 120, such as obtain payment account information, modify the amount of money, is defeated
Enter password etc..
In step S203, the is read from remote server 120 by the 2nd I/O interface 114 by second user device 111
Two Transaction Informations.Second Transaction Information preferably can be the confirmation message that confirmation transaction has been completed, and may include transaction
Serial number, transaction complete identifier etc. without including any URL information or access information, and first user device 101 will therefore nothing
It need to know the information of transaction performed by second user device 111, and need to only be confirmed with remote server 120.Second uses
Read second Transaction Information is then inputted above-mentioned hash function and calculates third hashed value by family device 111, and third is hashed
Value utilizes its private key encryption, and the second Transaction Information utilizes above-mentioned public key encryption.It is similar with above-mentioned steps, second user device 101
Encrypted third hashed value and the second encrypted Transaction Information are then added to the second block and travel to the first user
Device 101 completes the process of exchange so as to the confirmation of first user device 101 later.First user device 101 can be according to second
The second Transaction Information in block determines and carries out subsequent operation with remote server 120 after trading successfully.Second user device
111 can save second Transaction Information in its second memory 113 to avoid repeat business.
In step S204, first user device 101 is decrypted the second Transaction Information by the private key of its own and is passed through upper
Public key decryptions third hashed value is stated, the second Transaction Information decrypted then is inputted into above-mentioned identical hash function and calculates the
Four hashed values.When the third hashed value decrypted is consistent with the 4th hashed value, first user device 101 will pass through its first I/
O Interface 104 sends the confirmation message that transaction is completed to remote server 120, and confirmation both sides' process of exchange is completed, and can be with
Remote server 120 carries out the subsequent operations such as transmission, integration managing or the account calculating of discount coupon.First user device 101 can
The third hashed value decrypted every time is saved, for being confirmed whether to have carried out identical friendship when trading next time
Easily.Similarly, first user device 101 can not be stored in first user device 101 in the third hashed value decrypted
In the case where judge whether decrypted third hashed value and the 4th hashed value consistent again.Transmitted by first user device 101
Confirmation message is also used to that remote server 120 is requested to change the access that first user device 101 was read in step s 201
Information, to ensure that first user device 101 from read first Transaction Information of remote server 120 will have difference next time
Access information or URL information, thus avoid the occurrence of overlapping transaction block.
Although for purposes of illustration, having been described that some specific embodiments herein, the present invention will cover this
Any revision or change for the embodiment that text discusses.Embodiment described herein being limited only by the following claims, and it is not limited to have
The step of body describes or component.
Claims (10)
1. a kind of safety on line method of commerce based on block chain, it is characterised in that including the following steps executed in order:
The first Transaction Information is read from remote server by first user device, which includes unified resource positioning
Accord with URL information and access information;
The first Transaction Information input hash function is calculated into the first hashed value by first user device;
First hashed value is utilized to the private key encryption of first user device by first user device;
By the first user device public key encryption that the first Transaction Information is shared using first user device and second user device;
The first encrypted hashed value and the first encrypted Transaction Information are added to the first block simultaneously by first user device
Travel to second user device;
The first Transaction Information is decrypted by the private key of second user device by second user device;
First hashed value of public key decryptions is passed through by second user device;
The first Transaction Information decrypted is inputted into the hash function by second user device and calculates the second hashed value;
Decrypted access is utilized by second user device when the first hashed value decrypted is consistent with second hashed value
Internet resources on the remote server corresponding to URL information described in information access;
The second Transaction Information is read from the remote server by second user device;
The second Transaction Information is inputted into the hash function by second user device and calculates third hashed value;
Third hashed value is utilized to the private key encryption of second user device by second user device;
The second Transaction Information is utilized into the public key encryption by second user device;
Encrypted third hashed value and the second encrypted Transaction Information are added to the second block simultaneously by second user device
Travel to first user device;
The second Transaction Information is decrypted by the private key of first user device by the first user device;
The public key decryptions third hashed value is passed through by the first user device;
The second Transaction Information decrypted is inputted into the hash function by first user device and calculates the 4th hashed value;And
When the third hashed value decrypted is consistent with the 4th hashed value from first user device to the remote server
It sends the confirmation message that transaction is completed and the remote server is requested to change the access information.
2. method described in claim 1, it is characterised in that the access information is generated at random by the remote server.
3. method as claimed in claim 2, it is characterised in that further include the second user device in the first hash decrypted
Value judge again in the case where not being stored in second user device decrypted the first hashed value and the second hashed value whether one
It causes.
4. method as claimed in claim 3, it is characterised in that further include the first user device in the third hash decrypted
Value judge again in the case where not being stored in first user device decrypted third hashed value and the 4th hashed value whether one
It causes.
5. method as claimed in claim 4, it is characterised in that the first user device is by the public key and first block
It is broadcasted together.
6. a kind of safety on line transaction system based on block chain, it is characterised in that including:
First user device, second user device and the remote server of coupling are communicated with each other,
Wherein the first user device is configured to read the first Transaction Information from remote server, which includes
First Transaction Information input hash function is calculated the first hashed value, by the by uniform resource position mark URL information and access information
One hashed value utilizes the private key encryption of first user device, and the first Transaction Information is filled using first user device and second user
Shared public key encryption is set, and the first encrypted hashed value and the first encrypted Transaction Information are added to the first block simultaneously
Travel to second user device;
The second user device is configured to decrypt the first received Transaction Information with private key, with the public key decryptions first
The first Transaction Information decrypted is inputted the hash function and calculates the second hashed value by hashed value, is dissipated in first decrypted
Train value utilizes decrypted access information to access when consistent with second hashed value described long-range corresponding to the URL information
Internet resources on server read the second Transaction Information from the remote server, and the input of the second Transaction Information is described scattered
Array function calculates third hashed value, and third hashed value is utilized to the private key encryption of second user device;By the second Transaction Information benefit
With the public key encryption, and encrypted third hashed value and the second encrypted Transaction Information are added to the second block and passed
It is multicast to first user device;And
First user device was configured to the public key decryptions third hashed value, and the second Transaction Information decrypted is inputted institute
It states hash function and calculates the 4th hashed value, when the third hashed value decrypted is consistent with the 4th hashed value to remote service
Device sends the confirmation message that transaction is completed and the remote server is requested to change the access information.
7. system as claimed in claim 6, it is characterised in that the access information is generated at random by the remote server.
8. system as claimed in claim 7, it is characterised in that the second user device is configured to dissipate in first decrypted
Whether train value judges decrypted the first hashed value and the second hashed value again in the case where not being stored in second user device
Unanimously.
9. system according to any one of claims 8, it is characterised in that the first user device is configured to dissipate in the third decrypted
Whether train value judges decrypted third hashed value and the 4th hashed value again in the case where not being stored in first user device
Unanimously.
10. system as claimed in claim 9, it is characterised in that the first user device be configured to by the public key with it is described
First block is broadcasted together.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810576322.9A CN108846671B (en) | 2018-06-05 | 2018-06-05 | Online secure transaction method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810576322.9A CN108846671B (en) | 2018-06-05 | 2018-06-05 | Online secure transaction method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108846671A true CN108846671A (en) | 2018-11-20 |
CN108846671B CN108846671B (en) | 2021-10-26 |
Family
ID=64210514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810576322.9A Active CN108846671B (en) | 2018-06-05 | 2018-06-05 | Online secure transaction method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108846671B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110119937A (en) * | 2019-05-10 | 2019-08-13 | 中国联合网络通信集团有限公司 | Virtual article trading method and system |
CN110570321A (en) * | 2019-09-16 | 2019-12-13 | 上海保险交易所股份有限公司 | Block chain based reinsurance business method and system |
CN110580785A (en) * | 2019-01-18 | 2019-12-17 | 深圳市阿尔丰科技有限公司 | Cash register system, cash register device and cash register method applied to cash register system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038578A (en) * | 2017-04-19 | 2017-08-11 | 浙江数秦科技有限公司 | Multi-signature exchange information processing method in data trade platform based on block chain |
CN107038638A (en) * | 2017-02-24 | 2017-08-11 | 杭州象链网络技术有限公司 | A kind of equity registration transaction system construction method based on alliance's chain |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
-
2018
- 2018-06-05 CN CN201810576322.9A patent/CN108846671B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038638A (en) * | 2017-02-24 | 2017-08-11 | 杭州象链网络技术有限公司 | A kind of equity registration transaction system construction method based on alliance's chain |
CN107038578A (en) * | 2017-04-19 | 2017-08-11 | 浙江数秦科技有限公司 | Multi-signature exchange information processing method in data trade platform based on block chain |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110580785A (en) * | 2019-01-18 | 2019-12-17 | 深圳市阿尔丰科技有限公司 | Cash register system, cash register device and cash register method applied to cash register system |
CN110119937A (en) * | 2019-05-10 | 2019-08-13 | 中国联合网络通信集团有限公司 | Virtual article trading method and system |
CN110570321A (en) * | 2019-09-16 | 2019-12-13 | 上海保险交易所股份有限公司 | Block chain based reinsurance business method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108846671B (en) | 2021-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019214312A1 (en) | Blockchain-based logistics information transmission method, system and device | |
CN103918219B (en) | Based on the method and apparatus of the electronic content distribution of privacy share | |
CN111292041B (en) | Electronic contract generation method, device, equipment and storage medium | |
CN1839608B (en) | Device and method for generating a unique user's identity for use between different domains | |
US20180205555A1 (en) | Contract Agreement Method, Agreement Verification Method, Contract Agreement System, Agreement Verification Device, Contract Agreement Device, Contract Agreement Program and Agreement Verification Program | |
CN110383760A (en) | User's control, distributing, distribution and safety content distribution | |
US10609010B2 (en) | System, methods and software application for sending secured messages on decentralized networks | |
CN105407097B (en) | Based on third-party data furnishing method and device | |
CN109447647A (en) | A kind of safety payment system based on block chain | |
US20140046749A1 (en) | Techniques for monetizing anonymized context | |
CN110502916A (en) | A kind of sensitive data processing method and system based on block chain | |
CN110599342B (en) | Block chain-based identity information authorization method and device | |
CN104365127B (en) | Method for following the trail of mobile device in remote display unit | |
CN116049626A (en) | Data statistics method, device, equipment and storage medium | |
CN108846671A (en) | Safety on line method of commerce and system based on block chain | |
CN109858272A (en) | Blacklist data processing system based on block chain | |
CN109377220B (en) | Block chain-based media data transaction method and system and computer storage medium | |
US20220210140A1 (en) | Systems and methods for federated learning on blockchain | |
CN113672949A (en) | Data transmission method and system for protecting advertisement multiparty privacy | |
CN107025591A (en) | Data trade platform | |
CN109948370A (en) | A kind of method for processing business based on block chain, device and electronic equipment | |
CN114244851B (en) | Block chain-based data distribution method | |
CN104361295B (en) | Method for inquiring and verifying data of internet-of-vehicles RSU (Remote Subscriber Unit) based on cloud platform | |
CN113538019B (en) | Food traceability information evidence storing method and device | |
CN110532786A (en) | Using the block chain blacklist sharing method of Hash desensitization process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210916 Address after: Room 105, building 10, 1385 Panyuan Road, Changxing Town, Chongming District, Shanghai 202150 Applicant after: Shanghai Zhenke Information Technology Service Co.,Ltd. Address before: 230088 room 908, administration building, Yingtang Science Park, intersection of Wangjiang West Road and Fushan Road, high tech Zone, Hefei City, Anhui Province Applicant before: ANHUI ZHIZAI INTELLIGENT TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |