CN108921696A - Intelligent contract based on block chain calls and the method for contract transaction verification - Google Patents

Intelligent contract based on block chain calls and the method for contract transaction verification Download PDF

Info

Publication number
CN108921696A
CN108921696A CN201810667205.3A CN201810667205A CN108921696A CN 108921696 A CN108921696 A CN 108921696A CN 201810667205 A CN201810667205 A CN 201810667205A CN 108921696 A CN108921696 A CN 108921696A
Authority
CN
China
Prior art keywords
contract
network
intelligent contract
block chain
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810667205.3A
Other languages
Chinese (zh)
Other versions
CN108921696B (en
Inventor
金风莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU TENTCOO SOFTWARE TECHNOLOGY Co.,Ltd.
Original Assignee
Guangzhou You Spectrum Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou You Spectrum Network Technology Co Ltd filed Critical Guangzhou You Spectrum Network Technology Co Ltd
Priority to CN201810667205.3A priority Critical patent/CN108921696B/en
Publication of CN108921696A publication Critical patent/CN108921696A/en
Application granted granted Critical
Publication of CN108921696B publication Critical patent/CN108921696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses based on block chain intelligent contract call and contract transaction verification method, the method includes:Intelligent contract generation method, intelligent contract storage method, intelligent contract call method, intelligent contract transaction verification method solve the poor technical problem of the existing intelligent contract storage mode storage security based on block chain, the intelligent contract storage security realized in this method is higher, and calls and the higher technical effect of transaction verification security.

Description

Intelligent contract based on block chain calls and the method for contract transaction verification
Technical field
The present invention relates to block chain application fields, and in particular, to the intelligent contract based on block chain calls and contract is handed over The method easily verified.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm Application model.So-called common recognition mechanism is that the mathematics calculation established between different nodes and trust, obtain equity is realized in block catenary system Method.
Block chain (Blockchain) is a key concept of bit coin, it is substantially the data of a decentralization Library, while the Floor layer Technology as bit coin.Block chain is a string using the associated data block generated of cryptography method, each The information of a bit coin network trading is contained in a data block, under verifying the validity (anti-fake) of its information and generating One block.
Intelligent contract (English:Smart contract) it is that one kind is intended to that conjunction is propagated, verified or executed in a manner of information-based Same computer protocol.The permission of intelligent contract carries out credible transaction in no third-party situation, these transaction it is traceable and It is irreversible.
Conventionally, as the storage advantage of block chain, intelligent contract are stored in block chain, but existing skill Intelligent contract is to be disclosed to be stored on block chain in art, other people are checked, then discovery loophole is attacked, because This, the poor problem of the existing intelligent contract storage mode storage security based on block chain.
Summary of the invention
The present invention provides the methods of intelligent contract calling and contract transaction verification based on block chain, solve existing The poor technical problem of intelligent contract storage mode storage security based on block chain, realizes the intelligent contract in this method Storage security is higher, and calls and the higher technical effect of transaction verification security.
For achieving the above object, this application provides intelligent contract calling and contract transaction verification based on block chain Method, the method includes:
Intelligent contract generation method:Network dealing record is obtained from network dealing platform, network deal contract, network are bought Protocol data is sold, extracts key data from network dealing record, network deal contract, network Agreement for Sale and Purchase;Based on pass Key digital data generates the first serial number data and label data;Random data is generated based on random number generator;By the first serial number number The first encryption data is generated according to the first predetermined encryption algorithm according to random data;By network buy and sell record, network deal contract, Network Agreement for Sale and Purchase data are encrypted, and generate encrypted network dealing record, network deal contract, network dealing association Discuss data, wherein encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data clear crytpographic key be the One encryption data;Label data and encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are carried out Matching;Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data and is stored in block chain database In, using label data as the critical data searched in block chain database;
Intelligent contract storage method:Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data It is stored in block chain database, and returns to memory block address and memory block node, the memory block address based on return Intelligent contract, which is generated, according to the second Encryption Algorithm with memory block node extracts password;
Intelligent contract call method:Search key is inputted, is searched in block chain database based on search key Rope matches search key with label data, if successful match, inputs intelligent contract and calls password, by intelligent conjunction It about calls password to extract password with intelligent contract to be matched, if successful match, calls the corresponding encrypted network of acquisition Buy and sell record, network deal contract, network Agreement for Sale and Purchase data;
Intelligent contract transaction verification method:Encrypted network dealing record, network deal contract, net are obtained based on calling Network Agreement for Sale and Purchase data input transaction verification clear crytpographic key, transaction verification clear crytpographic key are matched with the first encryption data, Encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are decrypted if successful match, are obtained Network after decryption buys and sells record, network deal contract, network Agreement for Sale and Purchase data, recorded based on the network dealing after decryption, Network deal contract, network Agreement for Sale and Purchase data carry out intelligent contract transaction verification.
Wherein, the principle of the present invention is:The intelligent contract of the application and traditional intelligent contract storage mode of getting along well is the same, The application first encrypts intelligent contract, is then stored, so that the user in block chain is merely able to see intelligent conjunction Storage label about still can't see content, and intelligent contract needs corresponding extraction password when calling, in decrypted transaction Corresponding special password is needed when verifying, so that entire intelligence contract safety in block chain is higher.
Wherein, the intelligent contract in the application is storing constantly, has carried out special generation to intelligent contract first and has designed, Key data is extracted from network dealing record, network deal contract, network Agreement for Sale and Purchase;It is generated based on key data First serial number data and label data, that is, the first serial number data and label data generated are close with intelligent contract content itself Connection;Random data is generated based on random number generator;First serial number data and random data are calculated according to the first predetermined encryption Method generates the first encryption data, by distinctive first serial number data, and the random data being randomly generated, along with encryption is calculated Method generates the first encryption data, so that first encryption data is cracked very difficult, further improves safety;It will mark Label data are matched with encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data;It will be encrypted Network dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, using label data as The critical data searched in block chain database quickly can search out needs from block chain by adding label data Data.
Further, the application has also carried out corresponding special designing to intelligent contract storage method:By encrypted network Dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, and return to memory block address With memory block node, memory block address and memory block node based on return generate intelligence according to the second Encryption Algorithm and close About extract password;Intelligent contract is generated according to the second Encryption Algorithm by the storage area block address and memory block node of return to extract Password, i.e. extraction password is closely related with memory block address and memory block node, and is also encrypted by Encryption Algorithm, peace Full property is higher, and is bonded with storage location precision.
Further, intelligent contract call method has also been devised in the application:Search key is inputted, search key is based on It is scanned in block chain database, search key is matched with label data, if successful match, inputs intelligence Contract calls password, calls password to extract password with intelligent contract intelligent contract and matches, if successful match, calling is obtained It obtains encrypted network accordingly and buys and sells record, network deal contract, network Agreement for Sale and Purchase data;Need to extract when calling Password is just capable of calling, and any with that can call difference per family on traditional block chain, and safety is higher.
Further, intelligent contract transaction verification method has also been devised in the application:Encrypted network is obtained based on calling Record, network deal contract, network Agreement for Sale and Purchase data are bought and sold, transaction verification clear crytpographic key is inputted, transaction verification is decrypted close Code is matched with the first encryption data, to encrypted network dealing record, network deal contract, network if successful match Agreement for Sale and Purchase data are decrypted, and the network after being decrypted buys and sells record, network deal contract, network Agreement for Sale and Purchase data, Intelligent contract transaction verification is carried out based on the network dealing record after decryption, network deal contract, network Agreement for Sale and Purchase data.It protects The safety of transaction verification is hindered.
Further, key data includes:Buy and sell type, the type of merchandise, transaction amount, exchange hour, both parties Title, dealing network platform title, transaction odd numbers.
Further, the first serial number data and label data are generated based on key data, specifically included:
To buy and sell the corresponding English classification of type, the corresponding number of the type of merchandise, the corresponding Arabic numerals of transaction amount, Exchange hour it is corresponding number, both parties' title it is corresponding Chinese or English, dealing network platform title it is corresponding Chinese or English, the corresponding Arabic numerals of transaction odd numbers are ranked up according to sequence from left to right, the data after generating sequence;It will row Punctuation mark removal in data after sequence retains English, number and Chinese and generates treated sorting data;Based on first turn Rule is changed, sorting data is converted from left to right by treated, the first serial number data of data combination producing after conversion;It will Both parties' title, dealing network platform title are combined generation label data;First transformation rule is:When encountering English When, corresponding number is converted to first, and conversion regime is that English A-Z respectively corresponds 1-26, and the number after conversion is preset Operation, the number after obtaining default operation;When encountering Chinese, according to the stroke number of Chinese, Chinese is converted into corresponding number Number after conversion is carried out default operation, the number after obtaining default operation by word;When encountering number, number is carried out pre- Number if operation, after obtaining default operation;The number obtained after operation is subjected to permutation and combination from left to right and generates the first sequence Number;Buying and selling type includes:The retail of A class and B class are wholesale;The type of merchandise is that network buys and sells platform to the number of commodity.Pass through Above-mentioned special cipher mode is related to network business activities first, and proper with actual transaction content, passes through above-mentioned encryption Mode ensures multi-enciphering, so that cracking, difficulty is big, and the both sides only to participate in business can decrypt, and safety is higher, The safety of data is ensured using block chain.
Further, it calls password to extract password with intelligent contract intelligent contract to match, if successful match, adopt It calls with the following methods and obtains corresponding encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data:
Data server in block chain is numbered, the position coordinates of the data server in block chain are obtained, it will The position coordinates of data server in block chain are matched with number, establish the position coordinates of the data server in block chain Map;
When receiving intelligent contract call instruction, intelligent contract call instruction is analyzed, intelligent contract is obtained and calls Instruct the position coordinates of sender, the data service based on the position coordinates of intelligent contract call instruction sender, in block chain It is labeled in the position coordinates map of device;
Position based on intelligent contract call instruction sender in position coordinates map, from away from a nearest area Corresponding encrypted network is called to buy and sell record, network deal contract, network Agreement for Sale and Purchase in data server in block chain Data and number, block chain server record the process of calling, are marked, are stored.
It calls data that quick calling may be implemented through the above way, the efficiency of calling is ensured, so that path is most short, and energy The storage condition of data is enough checked by the position coordinates map of data server.
Further, intelligent contract call instruction sender calls corresponding intelligent contract to be decrypted, block chain service Device records the result of decryption, and when decrypting failure result greater than 3 times, block chain server will prevent the intelligence contract tune With instruction, sender continues to call the intelligence contract.It can be avoided malice calling by above-mentioned design to be decrypted, the frequency of failure Malicious operation is then considered greater than 3 times, then shields its operation, ensures the safety of data on block chain.
Further, intelligent contract transaction verification instruction sender sends corresponding intelligent contract transaction verification instruction and carries out Verifying, block chain server record transaction verification clear crytpographic key and the matching result of the first encryption data, when verifying is lost When losing result greater than 3 times, block chain server will prevent intelligence contract transaction verification instruction from continuing to verify the intelligence contract.It is logical Crossing above-mentioned design can be avoided malice seriously, and authentication failed number, which is greater than 3 times, is then considered malicious operation, then shields its operation, Ensure the safety of data on block chain.
Further, the intelligent contract calls and the method for contract transaction verification further includes:
Record the calling record of intelligent contract;After some intelligent contract is called, then by intelligent contract and the called side Connection is established, and carries out Secondary ordination when intelligent contract calls for the intelligent contract contacted is established with other called sides, When some intelligent contract called side, which carries out intelligent contract, to be called, then first search establishes the intelligent contract contacted with it, and will The intelligent contract contacted is established with other called sides and carries out Secondary ordination, i.e., search is contacted with intelligent contract called side foundation first Intelligent contract, then search for and do not establish the intelligent contract contacted, final search and other intelligence with any intelligent contract called side Energy contract called side establishes the intelligent contract of connection.By the way that called side to be associated with intelligent contract foundation, calling can be improved Efficiency and accuracy rate avoid a large amount of operation of server from generating, huge data are store on block chain, if all to all data Then speed is slower for traversal, and serious load can be caused to server, efficiency is improved through the above way, when reducing operation Between, ensure the optimization processing of block chain data.
Further, the intelligent contract calls and the method for contract transaction verification further includes intelligent contract means of defence, Including:
When the intelligent contract storage server in block chain is by attacking, the first protection instruction is generated, and first is protected Finger shield order is propagated in block chain;
When the intelligent contract storage server in any one block chain receives the first protection instruction, then opening protection function is protected Revetment;
When the intelligent contract storage server in block chain is by attacking, attacker is divided by attack server Analysis obtains the attack address of attacker, attack pattern, is attacked position, attack content;Attack address based on attacker is attacked Mode is hit, Defense Countermeasure is generated by attack position, attack content, and will be propagated in Defense Countermeasure block chain;
When the intelligent contract storage server in any one block chain receives Defense Countermeasure, then Defense Countermeasure carries out phase The defence answered.
Since block chain is the huge network system, it comprises a large amount of server, each server, which exists, is attacked The risk hit will lead to virus or wooden horse propagated in block chain, large area is caused to damage after a server is attacked, Although data can be restored from other servers, recovery needs time and efforts, and therefore, the application devises block chain Guard method of the server when being attacked generates first when the intelligent contract storage server in block chain is by attacking Protection instruction, and the first protection instruction is propagated in block chain;When the intelligent contract storage service in any one block chain Then opening protection function protects wall when device receives the first protection instruction, avoids being propagated further for virus, actively improves defence rank;When When intelligent contract storage server in block chain is by attacking, attacker is analyzed by attack server, is attacked Position, attack content, are attacked at attack pattern in the attack address of person;Attack address, attack pattern based on attacker are attacked Hit position, attack content generates Defense Countermeasure, and will propagate in Defense Countermeasure block chain;Intelligence in any one block chain When contract storage server receives Defense Countermeasure, then Defense Countermeasure is defendd accordingly, i.e., carries out analysis acquisition to attacker Defense Countermeasure propagates Defense Countermeasure in block chain network, carries out specific aim defence.
Further, the intelligent contract calls and the method for contract transaction verification further includes that newly-increased block chain server is tested Card method, including:
Newly-increased block chain server is detected, address, the capacity, storage mode of newly-increased block chain server are obtained;
Newly-increased block chain server is detected, including the detection of safety detection, network performance, storage capacity detection, place The detection of reason ability, grades to newly-increased block chain server based on testing result;
When newly-increased block chain server passes through detection, then by other servers in newly-increased block chain server and block chain Connection is established, data are preferentially stored based on rating result.
The quantity of block chain server be it is flexible and changeable, may there is new server to be added at any time, but right in tradition There is no corresponding control modes for the server being newly added, and viral wooden horse is caused to be easy tradition in a network or certain services Device ability is limited, and there is no great effect or contributions, therefore, in order to improve safety and the processing energy of entire block chain Power has carried out special designing to the mode of newly-increased server, has ensured newly-increased server in the side such as safety and processing capacity Face is more excellent, to improve the ability and safety of block chain on the whole.
Further, the intelligent contract calls and the method for contract transaction verification further includes intelligent contract correlating method, Including:
When block chain server is in the new intelligent contract of storage, by the new corresponding label data of intelligent contract in block Matching is associated in chain Servers-all, the similarity degree based on label data matches multiple intelligence that are mutually related and closes About, when intelligent contract calls, multiple intelligent contracts that will be mutually related call out jointly.Improve the calling effect of intelligent contract Rate avoids repetitive operation.
One or more technical solution provided by the present application, has at least the following technical effects or advantages:
It solves the poor technical problem of the existing intelligent contract storage mode storage security based on block chain, realizes Intelligent contract storage security in this method is higher, and calls and transaction verification security higher technical effect.
Detailed description of the invention
Attached drawing described herein is used to provide to further understand the embodiment of the present invention, constitutes one of the application Point, do not constitute the restriction to the embodiment of the present invention;
Fig. 1 is the method schematic diagram of the intelligent contract calling and contract transaction verification in the application based on block chain.
Specific embodiment
The present invention provides the methods of intelligent contract calling and contract transaction verification based on block chain, solve existing The poor technical problem of intelligent contract storage mode storage security based on block chain, realizes the intelligent contract in this method Storage security is higher, and calls and the higher technical effect of transaction verification security.
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the case where not conflicting mutually, the application's Feature in embodiment and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also Implemented with being different from the other modes being described herein in range using other, therefore, protection scope of the present invention is not by under The limitation of specific embodiment disclosed in face.
Referring to FIG. 1, this application provides the method for intelligent contract calling and contract transaction verification based on block chain, institute The method of stating includes:
Intelligent contract generation method:Network dealing record is obtained from network dealing platform, network deal contract, network are bought Protocol data is sold, extracts key data from network dealing record, network deal contract, network Agreement for Sale and Purchase;Based on pass Key digital data generates the first serial number data and label data;Random data is generated based on random number generator;By the first serial number number The first encryption data is generated according to the first predetermined encryption algorithm according to random data;By network buy and sell record, network deal contract, Network Agreement for Sale and Purchase data are encrypted, and generate encrypted network dealing record, network deal contract, network dealing association Discuss data, wherein encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data clear crytpographic key be the One encryption data;Label data and encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are carried out Matching;Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data and is stored in block chain database In, using label data as the critical data searched in block chain database;
Intelligent contract storage method:Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data It is stored in block chain database, and returns to memory block address and memory block node, the memory block address based on return Intelligent contract, which is generated, according to the second Encryption Algorithm with memory block node extracts password;
Intelligent contract call method:Search key is inputted, is searched in block chain database based on search key Rope matches search key with label data, if successful match, inputs intelligent contract and calls password, by intelligent conjunction It about calls password to extract password with intelligent contract to be matched, if successful match, calls the corresponding encrypted network of acquisition Buy and sell record, network deal contract, network Agreement for Sale and Purchase data;
Intelligent contract transaction verification method:Encrypted network dealing record, network deal contract, net are obtained based on calling Network Agreement for Sale and Purchase data input transaction verification clear crytpographic key, transaction verification clear crytpographic key are matched with the first encryption data, Encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are decrypted if successful match, are obtained Network after decryption buys and sells record, network deal contract, network Agreement for Sale and Purchase data, recorded based on the network dealing after decryption, Network deal contract, network Agreement for Sale and Purchase data carry out intelligent contract transaction verification.
Wherein, the principle of the present invention is:The intelligent contract of the application and traditional intelligent contract storage mode of getting along well is the same, The application first encrypts intelligent contract, is then stored, so that the user in block chain is merely able to see intelligent conjunction Storage label about still can't see content, and intelligent contract needs corresponding extraction password when calling, in decrypted transaction Corresponding special password is needed when verifying, so that entire intelligence contract safety in block chain is higher.
Wherein, the intelligent contract in the application is storing constantly, has carried out special generation to intelligent contract first and has designed, Key data is extracted from network dealing record, network deal contract, network Agreement for Sale and Purchase;It is generated based on key data First serial number data and label data, that is, the first serial number data and label data generated are close with intelligent contract content itself Connection;Random data is generated based on random number generator;First serial number data and random data are calculated according to the first predetermined encryption Method generates the first encryption data, by distinctive first serial number data, and the random data being randomly generated, along with encryption is calculated Method generates the first encryption data, so that first encryption data is cracked very difficult, further improves safety;It will mark Label data are matched with encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data;It will be encrypted Network dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, using label data as The critical data searched in block chain database quickly can search out needs from block chain by adding label data Data.
Wherein, in the embodiment of the present application, the application has also carried out corresponding special designing to intelligent contract storage method:It will Encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, and return Memory block address and memory block node, memory block address and memory block node based on return are calculated according to the second encryption Method generates intelligent contract and extracts password;It is generated by the storage area block address and memory block node of return according to the second Encryption Algorithm Intelligent contract extracts password, i.e. extraction password is closely related with memory block address and memory block node, and also by adding Close algorithm for encryption, safety is higher, and is bonded with storage location precision.
Wherein, in the embodiment of the present application, intelligent contract call method has also been devised in the application:Search key is inputted, It is scanned in block chain database based on search key, search key is matched with label data, if matching Success then inputs intelligent contract and calls password, calls password to extract password with intelligent contract intelligent contract and matches, if With success, then acquisition corresponding encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are called;I.e. It needs to extract password when calling and is just capable of calling, and it is any with difference, safety can be called per family on traditional block chain It is higher.
Wherein, in the embodiment of the present application, intelligent contract transaction verification method has also been devised in the application:It is obtained based on calling Encrypted network buys and sells record, network deal contract, network Agreement for Sale and Purchase data, inputs transaction verification clear crytpographic key, will hand over Easily verifying clear crytpographic key is matched with the first encryption data, to encrypted network dealing record, network if successful match Deal contract, network Agreement for Sale and Purchase data are decrypted, network dealing record, network deal contract, network after being decrypted Agreement for Sale and Purchase data carry out intelligent conjunction based on the network dealing record after decryption, network deal contract, network Agreement for Sale and Purchase data About transaction verification.The safety of transaction verification is ensured.
Wherein, in the embodiment of the present application, key data includes:Buy and sell type, the type of merchandise, transaction amount, transaction Time, both parties' title, dealing network platform title, transaction odd numbers.
Wherein, in the embodiment of the present application, the first serial number data and label data are generated based on key data, it is specific to wrap It includes:
To buy and sell the corresponding English classification of type, the corresponding number of the type of merchandise, the corresponding Arabic numerals of transaction amount, Exchange hour it is corresponding number, both parties' title it is corresponding Chinese or English, dealing network platform title it is corresponding Chinese or English, the corresponding Arabic numerals of transaction odd numbers are ranked up according to sequence from left to right, the data after generating sequence;It will row Punctuation mark removal in data after sequence retains English, number and Chinese and generates treated sorting data;Based on first turn Rule is changed, sorting data is converted from left to right by treated, the first serial number data of data combination producing after conversion;It will Both parties' title, dealing network platform title are combined generation label data;First transformation rule is:When encountering English When, corresponding number is converted to first, and conversion regime is that English A-Z respectively corresponds 1-26, and the number after conversion is preset Operation, the number after obtaining default operation;When encountering Chinese, according to the stroke number of Chinese, Chinese is converted into corresponding number Number after conversion is carried out default operation, the number after obtaining default operation by word;When encountering number, number is carried out pre- Number if operation, after obtaining default operation;The number obtained after operation is subjected to permutation and combination from left to right and generates the first sequence Number;Buying and selling type includes:The retail of A class and B class are wholesale;The type of merchandise is that network buys and sells platform to the number of commodity.Pass through Above-mentioned special cipher mode is related to network business activities first, and proper with actual transaction content, passes through above-mentioned encryption Mode ensures multi-enciphering, so that cracking, difficulty is big, and the both sides only to participate in business can decrypt, and safety is higher, The safety of data is ensured using block chain.
Wherein, in the embodiment of the present application, it calls password to extract password with intelligent contract intelligent contract to match, if Successful match is then called in the following ways and obtains corresponding encrypted network dealing record, network deal contract, network are bought Sell protocol data:
Data server in block chain is numbered, the position coordinates of the data server in block chain are obtained, it will The position coordinates of data server in block chain are matched with number, establish the position coordinates of the data server in block chain Map;
When receiving intelligent contract call instruction, intelligent contract call instruction is analyzed, intelligent contract is obtained and calls Instruct the position coordinates of sender, the data service based on the position coordinates of intelligent contract call instruction sender, in block chain It is labeled in the position coordinates map of device;
Position based on intelligent contract call instruction sender in position coordinates map, from away from a nearest area Corresponding encrypted network is called to buy and sell record, network deal contract, network Agreement for Sale and Purchase in data server in block chain Data and number, block chain server record the process of calling, are marked, are stored.
It calls data that quick calling may be implemented through the above way, the efficiency of calling is ensured, so that path is most short, and energy The storage condition of data is enough checked by the position coordinates map of data server.
Wherein, in the embodiment of the present application, intelligent contract call instruction sender calls corresponding intelligent contract to solve Close, block chain server records the result of decryption, and when decrypting failure result greater than 3 times, block chain server will hinder Only intelligence contract call instruction sender continues to call the intelligence contract.It can be avoided malice by above-mentioned design and call progress Decryption, the frequency of failure, which is greater than 3 times, is then considered malicious operation, then shields its operation, ensure the safety of data on block chain.
Wherein, in the embodiment of the present application, intelligent contract transaction verification instruction sender sends corresponding intelligent contract and hands over Easily verifying instruction is verified, and block chain server carries out the matching result of transaction verification clear crytpographic key and the first encryption data Record, when authentication failed result is greater than 3 times, block chain server will prevent intelligence contract transaction verification instruction from continuing to verify The intelligence contract.It is serious to can be avoided malice by above-mentioned design, authentication failed number, which is greater than 3 times, is then considered malicious operation, Its operation is then shielded, ensures the safety of data on block chain.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes:
Record the calling record of intelligent contract;After some intelligent contract is called, then by intelligent contract and the called side Connection is established, and carries out Secondary ordination when intelligent contract calls for the intelligent contract contacted is established with other called sides, When some intelligent contract called side, which carries out intelligent contract, to be called, then first search establishes the intelligent contract contacted with it, and will The intelligent contract contacted is established with other called sides and carries out Secondary ordination, i.e., search is contacted with intelligent contract called side foundation first Intelligent contract, then search for and do not establish the intelligent contract contacted, final search and other intelligence with any intelligent contract called side Energy contract called side establishes the intelligent contract of connection.By the way that called side to be associated with intelligent contract foundation, calling can be improved Efficiency and accuracy rate avoid a large amount of operation of server from generating, huge data are store on block chain, if all to all data Then speed is slower for traversal, and serious load can be caused to server, efficiency is improved through the above way, when reducing operation Between, ensure the optimization processing of block chain data.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes intelligence Contract means of defence, including:
When the intelligent contract storage server in block chain is by attacking, the first protection instruction is generated, and first is protected Finger shield order is propagated in block chain;
When the intelligent contract storage server in any one block chain receives the first protection instruction, then opening protection function is protected Revetment;
When the intelligent contract storage server in block chain is by attacking, attacker is divided by attack server Analysis obtains the attack address of attacker, attack pattern, is attacked position, attack content;Attack address based on attacker is attacked Mode is hit, Defense Countermeasure is generated by attack position, attack content, and will be propagated in Defense Countermeasure block chain;
When the intelligent contract storage server in any one block chain receives Defense Countermeasure, then Defense Countermeasure carries out phase The defence answered.
Since block chain is the huge network system, it comprises a large amount of server, each server, which exists, is attacked The risk hit will lead to virus or wooden horse propagated in block chain, large area is caused to damage after a server is attacked, Although data can be restored from other servers, recovery needs time and efforts, and therefore, the application devises block chain Guard method of the server when being attacked generates first when the intelligent contract storage server in block chain is by attacking Protection instruction, and the first protection instruction is propagated in block chain;When the intelligent contract storage service in any one block chain Then opening protection function protects wall when device receives the first protection instruction, avoids being propagated further for virus, actively improves defence rank;When When intelligent contract storage server in block chain is by attacking, attacker is analyzed by attack server, is attacked Position, attack content, are attacked at attack pattern in the attack address of person;Attack address, attack pattern based on attacker are attacked Hit position, attack content generates Defense Countermeasure, and will propagate in Defense Countermeasure block chain;Intelligence in any one block chain When contract storage server receives Defense Countermeasure, then Defense Countermeasure is defendd accordingly, i.e., carries out analysis acquisition to attacker Defense Countermeasure propagates Defense Countermeasure in block chain network, carries out specific aim defence.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes increasing newly Block chain server validation method, including:
Newly-increased block chain server is detected, address, the capacity, storage mode of newly-increased block chain server are obtained;
Newly-increased block chain server is detected, including the detection of safety detection, network performance, storage capacity detection, place The detection of reason ability, grades to newly-increased block chain server based on testing result;
When newly-increased block chain server passes through detection, then by other servers in newly-increased block chain server and block chain Connection is established, data are preferentially stored based on rating result.
The quantity of block chain server be it is flexible and changeable, may there is new server to be added at any time, but right in tradition There is no corresponding control modes for the server being newly added, and viral wooden horse is caused to be easy tradition in a network or certain services Device ability is limited, and there is no great effect or contributions, therefore, in order to improve safety and the processing energy of entire block chain Power has carried out special designing to the mode of newly-increased server, has ensured newly-increased server in the side such as safety and processing capacity Face is more excellent, to improve the ability and safety of block chain on the whole.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes intelligence Contract correlating method, including:
When block chain server is in the new intelligent contract of storage, by the new corresponding label data of intelligent contract in block Matching is associated in chain Servers-all, the similarity degree based on label data matches multiple intelligence that are mutually related and closes About, when intelligent contract calls, multiple intelligent contracts that will be mutually related call out jointly.Improve the calling effect of intelligent contract Rate avoids repetitive operation.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. the intelligent contract based on block chain calls and the method for contract transaction verification, which is characterized in that the method includes:
Intelligent contract generation method:Network dealing record, network deal contract, network dealing association are obtained from network dealing platform Data are discussed, extract key data from network dealing record, network deal contract, network Agreement for Sale and Purchase;Based on keyword Data generate the first serial number data and label data;Random data is generated based on random number generator;By the first serial number data and Random data generates the first encryption data according to the first predetermined encryption algorithm;By network dealing record, network deal contract, network Agreement for Sale and Purchase data are encrypted, and generate encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase number Clear crytpographic key according to, wherein encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data is first to add Ciphertext data;By label data and encrypted network dealing record, network deal contract, the progress of network Agreement for Sale and Purchase data Match;Encrypted network is bought and sold record, network deal contract, network Agreement for Sale and Purchase data to be stored in block chain database, Using label data as the critical data searched in block chain database;
Intelligent contract storage method:Encrypted network is bought and sold into record, network deal contract, the storage of network Agreement for Sale and Purchase data In block chain database, and memory block address and memory block node are returned to, the memory block address based on return and deposited Storage area block node generates intelligent contract according to the second Encryption Algorithm and extracts password;
Intelligent contract call method:Search key is inputted, is scanned in block chain database based on search key, it will Search key is matched with label data, if successful match, is inputted intelligent contract and is called password, intelligent contract is called Password extracts password with intelligent contract and is matched, if successful match, calls the corresponding encrypted network dealing note of acquisition Record, network deal contract, network Agreement for Sale and Purchase data;
Intelligent contract transaction verification method:Based on calling, the encrypted network of acquisition buys and sells record, network deal contract, network are bought Protocol data is sold, transaction verification clear crytpographic key is inputted, transaction verification clear crytpographic key is matched with the first encryption data, if Then encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are decrypted with success, are decrypted Network afterwards buys and sells record, network deal contract, network Agreement for Sale and Purchase data, based on network dealing record, the network after decryption Deal contract, network Agreement for Sale and Purchase data carry out intelligent contract transaction verification.
2. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, key data includes:Buy and sell type, the type of merchandise, transaction amount, exchange hour, both parties' title, dealing network Platform names, transaction odd numbers.
3. the intelligent contract according to claim 2 based on block chain calls and the method for contract transaction verification, feature It is, the first serial number data and label data is generated based on key data, specifically included:
The corresponding English classification of type, the corresponding number of the type of merchandise, the corresponding Arabic numerals of transaction amount, transaction will be bought and sold Time it is corresponding number, both parties' title it is corresponding Chinese or English, dealing network platform title it is corresponding Chinese or English, The corresponding Arabic numerals of transaction odd numbers are ranked up according to sequence from left to right, the data after generating sequence;After sorting Data in punctuation mark removal, retain English, number and Chinese and generate treated sorting data;Based on the first conversion rule Then, by treated, sorting data is converted from left to right, the first serial number data of data combination producing after conversion;It will dealing Both sides' title, dealing network platform title are combined generation label data;First transformation rule is:It is first when encountering English Corresponding number is first converted to, conversion regime is that English A-Z respectively corresponds 1-26, the number after conversion is subjected to default operation, Number after obtaining default operation;When encountering Chinese, according to the stroke number of Chinese, Chinese is converted into corresponding number, it will Number after conversion carries out default operation, the number after obtaining default operation;When encountering number, number is subjected to default fortune It calculates, the number after obtaining default operation;The number obtained after operation is subjected to permutation and combination from left to right and generates the first serial number number According to;Buying and selling type includes:The retail of A class and B class are wholesale;The type of merchandise is that network buys and sells platform to the number of commodity.
4. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, calls password to extract password with intelligent contract intelligent contract and match, if successful match, adjust in the following ways Record, network deal contract, network Agreement for Sale and Purchase data are bought and sold with corresponding encrypted network is obtained:
Data server in block chain is numbered, the position coordinates of the data server in block chain are obtained, by block The position coordinates of data server in chain are matched with number, with establishing the position coordinates of the data server in block chain Figure;
When receiving intelligent contract call instruction, intelligent contract call instruction is analyzed, obtains intelligent contract call instruction The position coordinates of sender, based on the position coordinates of intelligent contract call instruction sender, data server in block chain It is labeled in position coordinates map;
Position based on intelligent contract call instruction sender in position coordinates map, from away from a nearest block chain In data server in call corresponding encrypted network to buy and sell record, network deal contract, network Agreement for Sale and Purchase data And number, block chain server record the process of calling, are marked, are stored.
5. the intelligent contract according to claim 4 based on block chain calls and the method for contract transaction verification, feature It is, intelligent contract call instruction sender calls corresponding intelligent contract to be decrypted, knot of the block chain server to decryption Fruit is recorded, and when decrypting failure result greater than 3 times, block chain server will prevent intelligence contract call instruction sender Continue to call the intelligence contract.
6. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, intelligent contract transaction verification instruction sender sends corresponding intelligent contract transaction verification instruction and verifies, block chain Server records transaction verification clear crytpographic key and the matching result of the first encryption data, when authentication failed result is greater than 3 When secondary, block chain server will prevent intelligence contract transaction verification instruction from continuing to verify the intelligence contract.
7. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, the intelligence contract calls and the method for contract transaction verification further includes:
Record the calling record of intelligent contract;After some intelligent contract is called, then intelligent contract and the called side are established Connection, and Secondary ordination is carried out when intelligent contract calls by the intelligent contract contacted is established with other called sides, when certain When a intelligence contract called side carries out intelligent contract calling, then first search establishes the intelligent contract contacted with it, and will be with it The intelligent contract that his called side establishes connection carries out Secondary ordination, i.e., searches for first and establish the intelligence contacted with intelligent contract called side Then energy contract is searched for and does not establish the intelligent contract contacted, final search and other intelligently conjunctions with any intelligent contract called side About called side establishes the intelligent contract contacted.
8. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, the intelligence contract calls and the method for contract transaction verification further includes intelligent contract means of defence, including:
When the intelligent contract storage server in block chain is by attacking, the first protection instruction is generated, and the first protection is referred to Order is propagated in block chain;
When the intelligent contract storage server in any one block chain receives the first protection instruction, then opening protection function protects wall;
When the intelligent contract storage server in block chain is by attacking, attacker is analyzed by attack server, is obtained It obtains the attack address of attacker, attack pattern, attacked position, attack content;Attack address based on attacker, attacker Formula is generated Defense Countermeasure, and will be propagated in Defense Countermeasure block chain by attack position, attack content;
When the intelligent contract storage server in any one block chain receives Defense Countermeasure, then Defense Countermeasure carries out corresponding Defence.
9. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, the intelligence contract calls and the method for contract transaction verification further includes newly-increased block chain server validation method, including:
Newly-increased block chain server is detected, address, the capacity, storage mode of newly-increased block chain server are obtained;
Newly-increased block chain server is detected, including the detection of safety detection, network performance, storage capacity detection, processing energy Power detection, grades to newly-increased block chain server based on testing result;
When newly-increased block chain server passes through detection, then other servers in newly-increased block chain server and block chain are established Connection, preferentially stores data based on rating result.
10. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature It is, the intelligence contract calls and the method for contract transaction verification further includes intelligent contract correlating method, including:
When block chain server is in the new intelligent contract of storage, by the new corresponding label data of intelligent contract in block chain institute Having and is associated matching in server, the similarity degree based on label data matches multiple intelligent contracts that are mutually related, When intelligent contract calls, multiple intelligent contracts that will be mutually related call out jointly.
CN201810667205.3A 2018-06-26 2018-06-26 Intelligent contract calling and contract transaction verification method based on block chain Active CN108921696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810667205.3A CN108921696B (en) 2018-06-26 2018-06-26 Intelligent contract calling and contract transaction verification method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810667205.3A CN108921696B (en) 2018-06-26 2018-06-26 Intelligent contract calling and contract transaction verification method based on block chain

Publications (2)

Publication Number Publication Date
CN108921696A true CN108921696A (en) 2018-11-30
CN108921696B CN108921696B (en) 2020-10-16

Family

ID=64423086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810667205.3A Active CN108921696B (en) 2018-06-26 2018-06-26 Intelligent contract calling and contract transaction verification method based on block chain

Country Status (1)

Country Link
CN (1) CN108921696B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711200A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Accurate poverty alleviation method, apparatus, equipment and medium based on block chain
CN109903123A (en) * 2019-01-18 2019-06-18 众安信息技术服务有限公司 A kind of house lease method and system
CN109934000A (en) * 2019-03-12 2019-06-25 黑龙江世纪精彩科技有限公司 Entertainment industry cooperation intention matching process and storage medium based on block chain technology
CN110135986A (en) * 2019-04-23 2019-08-16 武汉大学 It is a kind of to can search for encrypted file data method based on what block chain intelligence contract was realized
CN110148003A (en) * 2019-05-26 2019-08-20 贾渊培 A kind of carbon emissions trading method and system
CN110190968A (en) * 2019-06-03 2019-08-30 魏靖 Block chain big data security processing system and method
CN112052473A (en) * 2019-06-05 2020-12-08 国际商业机器公司 Geographic location compliance
CN113407188A (en) * 2021-06-03 2021-09-17 广东辰宜信息科技有限公司 Intelligent contract construction method and device, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295401A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 A kind of read-only secure file storage system and method for block chain
CA2938758A1 (en) * 2015-08-13 2017-02-13 The Toronto-Dominion Bank A system and method for implementing hybrid public-private block-chain ledgers
US20170177898A1 (en) * 2015-12-16 2017-06-22 International Business Machines Corporation Personal ledger blockchain
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107730254A (en) * 2016-08-12 2018-02-23 深圳市嗨马支付信息有限公司 Currency affaris safety trade system and currency method for secure transactions
EP3312756A1 (en) * 2016-10-24 2018-04-25 Trustonic Limited Establishing cryptographic identity for an electronic device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2938758A1 (en) * 2015-08-13 2017-02-13 The Toronto-Dominion Bank A system and method for implementing hybrid public-private block-chain ledgers
US20170177898A1 (en) * 2015-12-16 2017-06-22 International Business Machines Corporation Personal ledger blockchain
CN107730254A (en) * 2016-08-12 2018-02-23 深圳市嗨马支付信息有限公司 Currency affaris safety trade system and currency method for secure transactions
CN106295401A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 A kind of read-only secure file storage system and method for block chain
EP3312756A1 (en) * 2016-10-24 2018-04-25 Trustonic Limited Establishing cryptographic identity for an electronic device
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
祝烈煌等: "区块链交易数据隐私保护机制", 《大数据》 *
翟社平等: "区块链技术:应用及问题", 《西安邮电大学学报》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711200A (en) * 2018-12-29 2019-05-03 百度在线网络技术(北京)有限公司 Accurate poverty alleviation method, apparatus, equipment and medium based on block chain
CN109903123A (en) * 2019-01-18 2019-06-18 众安信息技术服务有限公司 A kind of house lease method and system
CN109934000A (en) * 2019-03-12 2019-06-25 黑龙江世纪精彩科技有限公司 Entertainment industry cooperation intention matching process and storage medium based on block chain technology
CN109934000B (en) * 2019-03-12 2021-06-29 黑龙江世纪精彩科技有限公司 Entertainment industry cooperative intention matching method based on block chain technology and storage medium
CN110135986A (en) * 2019-04-23 2019-08-16 武汉大学 It is a kind of to can search for encrypted file data method based on what block chain intelligence contract was realized
CN110135986B (en) * 2019-04-23 2024-01-16 武汉大学 Method for realizing searchable encrypted file data based on blockchain intelligent contract
CN110148003A (en) * 2019-05-26 2019-08-20 贾渊培 A kind of carbon emissions trading method and system
CN110190968A (en) * 2019-06-03 2019-08-30 魏靖 Block chain big data security processing system and method
CN112052473A (en) * 2019-06-05 2020-12-08 国际商业机器公司 Geographic location compliance
CN113407188A (en) * 2021-06-03 2021-09-17 广东辰宜信息科技有限公司 Intelligent contract construction method and device, computer equipment and storage medium
CN113407188B (en) * 2021-06-03 2024-02-09 广东辰宜信息科技有限公司 Intelligent contract construction method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN108921696B (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN108921696A (en) Intelligent contract based on block chain calls and the method for contract transaction verification
US8429421B2 (en) Server-side encrypted pattern matching
CN106776904B (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
Zhuang et al. A new ultralightweight RFID protocol for low-cost tags: R 2 AP
CN110224808A (en) Bank data sharing method and relevant device based on block chain
Chen et al. Graph-fraudster: Adversarial attacks on graph neural network-based vertical federated learning
Kumar Cloud computing security issues and its challenges: a comprehensive research
Latchoumi et al. Synthetic Identity of Crime Detection
Shoker Brief announcement: Sustainable blockchains through proof of exercise
Prianga et al. Evolutionary survey on data security in cloud computing using blockchain
Dubey et al. SQL filtering: An effective technique to prevent SQL injection attack
Chaum et al. W-OTS+ up my sleeve! a hidden secure fallback for cryptocurrency wallets
Polpong et al. Authentication and password storing improvement using SXR algorithm with a hash function
Vahedi et al. Identifying and categorizing malicious content on paste sites: a neural topic modeling approach
Biswas et al. Protecting network-on-chip intellectual property using timing channel fingerprinting
Li et al. DSE-RB: A privacy-preserving dynamic searchable encryption framework on redactable blockchain
KR20210053844A (en) Server of artificial intelligence personal privacy data security system
Zhang et al. Privacy-preserving multi-pattern matching
Peng et al. All roads lead to Rome: Many ways to double spend your cryptocurrency
Geetha et al. Blockchain based Mechanism for Cloud Security
Fareed et al. Proposal to enhance the information security system of the cloud using data mining techniques
KR102010644B1 (en) METHOD AND SYSTEM FOR k-NN CLASSIFICATION PROCESSING BASED ON GARBLED CIRCUIT
Sude et al. Authenticated CRF based improved ranked multi-keyword search for multi-owner model in cloud computing
Mishra Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier
Islam et al. Trojan bio-hacking of DNA-sequencing pipeline

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200804

Address after: 510000 room 711, floor 7, No. 733 (1), Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province (only for office use)

Applicant after: GUANGZHOU TENTCOO SOFTWARE TECHNOLOGY Co.,Ltd.

Address before: 510000 Guangdong Guangzhou Haizhuqu District Xingang East Road 1000 1103, 1104, 1105, 1106 rooms

Applicant before: GUANGZHOU YOUPU NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant