CN109034796B - Alliance chain-based transaction supervision method, electronic device and readable storage medium - Google Patents

Alliance chain-based transaction supervision method, electronic device and readable storage medium Download PDF

Info

Publication number
CN109034796B
CN109034796B CN201810618522.6A CN201810618522A CN109034796B CN 109034796 B CN109034796 B CN 109034796B CN 201810618522 A CN201810618522 A CN 201810618522A CN 109034796 B CN109034796 B CN 109034796B
Authority
CN
China
Prior art keywords
transaction
encryption
public key
receiver
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810618522.6A
Other languages
Chinese (zh)
Other versions
CN109034796A (en
Inventor
董国超
刘倞坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anda Data Technology Shenzhen Co ltd
Original Assignee
Anda Data Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anda Data Technology Shenzhen Co ltd filed Critical Anda Data Technology Shenzhen Co ltd
Priority to CN201810618522.6A priority Critical patent/CN109034796B/en
Publication of CN109034796A publication Critical patent/CN109034796A/en
Application granted granted Critical
Publication of CN109034796B publication Critical patent/CN109034796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention relates to a transaction supervision method based on a alliance chain, an electronic device and a readable storage medium, wherein the method comprises the following steps: acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor; encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. The invention can ensure the privacy of the transaction data and can effectively monitor the transaction by the supervision organization.

Description

Alliance chain-based transaction supervision method, electronic device and readable storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a federation chain-based transaction supervision method, an electronic device, and a readable storage medium.
Background
When trading is performed in a blockchain of a alliance chain type, the trade data belongs to confidential data among organizations in the alliance chain, the confidentiality of the trade data needs to be ensured, namely any node in the blockchain cannot be enabled to acquire the content of the trade data, and meanwhile, for the trading in the blockchain, a supervision organization needs to know what trade is particularly done among enterprises and whether illegal trade behaviors are performed among the organizations according to the trade data. In the prior art, aiming at transactions in a blockchain of a alliance chain type, the confidentiality of transaction data can not be ensured at the same time, and a supervision organization can effectively supervise the transactions.
Disclosure of Invention
The invention aims to provide a trade supervision method, an electronic device and a readable storage medium based on a alliance chain, which aim to ensure the privacy of trade data and enable a supervision organization to effectively supervise the trade.
To achieve the above object, the present invention provides an electronic device including a memory, a processor, and a chain of alliance-based transaction monitoring system executable on the processor, the chain of alliance-based transaction monitoring system implementing the following steps when executed by the processor:
Acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
Preferably, the transaction information determined by the transaction initiator includes transaction service data and transaction content data, the step of encrypting the transaction information determined by the transaction initiator on the coalition chain by using the encryption private key in the encryption key pair, and generating encrypted transaction data includes:
Encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
Preferably, the processor is further configured to execute the coalition chain based transaction management system to implement the following steps:
encrypting the encryption public key in the encryption key pair by using an public key of an informed party of a preset third-party informed party node on the alliance chain to generate an encrypted public key of the informed party;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Preferably, the processor is further configured to execute the coalition chain based transaction management system to implement the following steps:
acquiring a preset signature key pair;
and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
In addition, in order to achieve the above object, the present invention also provides a transaction supervision method based on a federated chain, the transaction supervision method based on the federated chain includes:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
Preferably, the transaction information determined by the transaction initiator includes transaction service data and transaction content data, the step of encrypting the transaction information determined by the transaction initiator on the coalition chain by using the encryption private key in the encryption key pair, and generating encrypted transaction data includes:
encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
Preferably, the method further comprises:
encrypting the encryption public key in the encryption key pair by using an public key of an informed party of a preset third-party informed party node on the alliance chain to generate an encrypted public key of the informed party;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Preferably, the method further comprises:
acquiring a preset signature key pair;
And calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
Preferably, the method further comprises:
decrypting the encrypted hash value in the transaction body received by the transaction receiver by utilizing the public signature key in the public signature key pair to obtain a decrypted hash value;
calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value;
if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body;
if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing a chain of alliance-based transaction monitoring system executable by at least one processor to cause the at least one processor to perform the steps of the chain of alliance-based transaction monitoring method as described above.
The transaction supervision method, the system and the readable storage medium based on the alliance chain provided by the invention encrypt the transaction information determined by the transaction initiator on the alliance chain through the encryption private key in the preset encryption key pair to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. Because the encrypted transaction data and the receiver encryption public key can be formed into a transaction body to carry out transaction on a alliance chain, a transaction receiver on the alliance chain can decrypt the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, and decrypt the encrypted transaction data in the transaction body by utilizing the decrypted encryption public key to obtain determined transaction information, so that the transaction with the transaction initiator is completed; because only the receiving party encrypts the public key in the transaction body, other nodes on the alliance chain cannot decrypt and acquire the encrypted public key in the encryption key pair and cannot decrypt the encrypted transaction data in the transaction body, so that the confidentiality of the transaction data in the alliance chain is ensured. Meanwhile, the supervising side can decrypt the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained synchronously to obtain the determined transaction information, and the transaction information is supervised. The method and the system can ensure the privacy of the transaction data and enable the supervision authorities to effectively supervise the transactions.
Drawings
FIG. 1 is a schematic diagram of the operating environment of a preferred embodiment of a federated-based transaction monitoring system 10 of the present invention;
FIG. 2 is a flowchart of a federation chain-based transaction administration method according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The invention provides a trade supervision system based on a alliance chain. Referring to FIG. 1, a schematic diagram of the operating environment of a preferred embodiment of a federated-based transaction monitoring system 10 of the present invention is shown.
In this embodiment, the coalition chain based transaction monitoring system 10 is installed and operated in the electronic device 1. The electronic device 1 may include, but is not limited to, a memory 11, a processor 12, and a display 13. Fig. 1 shows only an electronic device 1 with components 11-13, but it is understood that not all shown components are required to be implemented, and that more or fewer components may alternatively be implemented.
The memory 11 is at least one type of readable computer storage medium, and the memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a hard disk or a memory of the electronic device 1. The memory 11 may in other embodiments also be an external storage device of the electronic apparatus 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic apparatus 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic apparatus 1. The memory 11 is used for storing application software and various data installed in the electronic device 1, such as program codes of the coalition chain-based transaction supervision system 10. The memory 11 may also be used for temporarily storing data that has been output or is to be output.
The processor 12 may in some embodiments be a central processing unit (Central Processing Unit, CPU), microprocessor or other data processing chip for executing program code or processing data stored in the memory 11, such as executing the federated chain based transaction monitoring system 10, etc.
The display 13 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like in some embodiments. The display 13 is used for displaying information processed in the electronic device 1 and for displaying visual user interfaces, such as generated transaction bodies, informed nodes in a coalition chain, transaction status, etc. The components 11-13 of the electronic device 1 communicate with each other via a system bus.
The federated chain-based transaction management system 10 includes at least one computer readable instruction stored in the memory 11 that is executable by the processor 12 to implement embodiments of the present application.
Wherein, the above-mentioned transaction supervision system 10 based on the alliance chain realizes the following steps when being executed by the processor 12:
Step S1, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor;
step S2, encrypting the transaction information determined by the transaction initiator on the alliance chain by using the encryption private key in the encryption key pair to generate encrypted transaction data;
step S3, encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
step S4, based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts the encryption transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
In the embodiment, the encryption private key in the preset encryption key pair is used for encrypting the transaction information determined by the transaction initiator on the alliance chain to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. Because the encrypted transaction data and the receiver encryption public key can be formed into a transaction body to carry out transaction on a alliance chain, a transaction receiver on the alliance chain can decrypt the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, and decrypt the encrypted transaction data in the transaction body by utilizing the decrypted encryption public key to obtain determined transaction information, so that the transaction with the transaction initiator is completed; because only the receiving party encrypts the public key in the transaction body, other nodes on the alliance chain cannot decrypt and acquire the encrypted public key in the encryption key pair and cannot decrypt the encrypted transaction data in the transaction body, so that the confidentiality of the transaction data in the alliance chain is ensured. Meanwhile, the supervising side can decrypt the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained synchronously to obtain the determined transaction information, and the transaction information is supervised. The method and the system can ensure the privacy of the transaction data and enable the supervision authorities to effectively supervise the transactions.
Further, in this embodiment, the transaction information determined by the transaction initiator includes transaction service data (such as identity information of both parties of the transaction, service parameters, etc.) and transaction content data (such as transaction share, exchange rate, etc.), and the step of encrypting the transaction information determined by the transaction initiator on the federation chain by using the encryption private key in the encryption key pair includes:
encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
In this embodiment, the federation chain further includes a preset third party notifier node (including a node that can completely or partially know the transaction) other than the transaction party, where, if the public key of the preset third party notifier node on the federation chain is used to encrypt the encryption public key in the encryption key pair, an encrypted public key of the notifier is generated; the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Further, the embodiment further includes a signature authentication step, firstly, a preset signature key pair is obtained; and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body. After a transaction receiver receives a transaction body on a alliance chain, firstly performing signature authentication, for example, decrypting an encrypted hash value in the transaction body received by the transaction receiver by using a signature public key in the signature key pair to obtain a decrypted hash value; calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value; if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body; if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
Specifically, in one embodiment, in the transaction on the alliance chain type blockchain, the related object node includes a transaction two-party node, a first notifier node, a second notifier node and a supervisor, wherein the transaction two-party is two parties for implementing the transaction, for example, the transaction two-party node includes a node A and a node B, the transaction is that A is transferred to B, and the transfer amount is 100; the first-party node is a party, such as node C, that can let it know the details of the entire transaction completely, let C know that the transaction is a transfer to B, and know the specific transfer amount 100; the second node of the knowledgeable party is a party that can let it know part of the transaction information, such as node D, let D know that the transaction is a transfer to B, but cannot let D know the specific transfer amount 100; the supervisor needs to know that the transaction is transferred from A to B and know the specific transfer amount 100 due to supervision requirements, so as to judge whether the transaction is legal or not according to the identity of the two sides of the transfer and the transfer amount, thereby realizing transaction supervision.
The dual key pair is prepared in advance: a signing key, an encryption key. It should be noted that, these key pairs may be preset and synchronously notified to the administrator. The key pairs can also be obtained from the CA center application, and the supervision party can apply for knowing the key pairs by the CA center according to own supervision identity. The transaction information is divided into transaction service data, for example, "a transfer to B" and transaction content data, for example, "transfer amount 100".
The transaction initiator A obtains a preset encryption key pair of the transaction or obtains the encryption key pair of the transaction from a CA center application. The transaction initiator a encrypts the transaction content data of the transaction by using the applied encryption private key in the encryption key pair to generate encrypted transaction content data, for example, encrypts the plaintext data 100 to generate encrypted transaction content data, and forms a transaction body, where the transaction body includes the transaction service data and the encrypted transaction content data.
Further, the public encryption key in the encryption key pair applied by the transaction initiator A from the CA center is encrypted by the public encryption key of the transaction receiver B, so as to generate the public encryption key of the receiver. And encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node to generate a first encryption public key. The receiver encrypted public key and the first encrypted public key are added to the transaction body, and the new transaction body comprises transaction service data, encrypted transaction content data, the receiver encrypted public key and the first encrypted public key.
The transaction initiator A uses a hash algorithm to calculate a corresponding hash value of the whole transaction body, encrypts the hash value calculated by the whole transaction body by using a signature private key applied from a CA center to obtain an encrypted hash value, and adds the encrypted hash value to the transaction body, so that the finally formed transaction body comprises five parts, namely transaction service data, encrypted transaction content data, a receiver encryption public key, a first encryption public key and an encryption hash value.
The transaction initiator A initiates a transaction on the blockchain based on the transaction body, and the transaction receiver B firstly performs signature authentication operation after acquiring the transaction body from the blockchain as follows:
the transaction receiver B applies for a signature public key corresponding to the signature private key of the transaction initiator A from the CA center, and decrypts the encrypted hash value in the transaction body by using the applied signature public key to obtain a decrypted hash value, wherein the decrypted hash value is a hash value calculated by the transaction initiator A for the whole transaction body. The transaction receiver B uses a hash algorithm to the acquired transaction body to calculate a corresponding hash value. Comparing the hash value calculated by the transaction receiver B with the hash value decrypted before, if the hash value calculated by the transaction receiver B is identical to the hash value decrypted before, the transaction receiver B can carry out subsequent operation according to the transaction body, wherein the transaction is signed by the transaction initiator A and the transaction information is not tampered, namely, the fact that the transaction is initiated by the transaction initiator A and is true and effective is proved. Otherwise, the transaction information is tampered, and the process is ended.
After the transaction receiver B verifies that the transaction is signed by the transaction initiator a and the transaction information is not tampered, the transaction receiver B can decrypt the public encryption key of the receiver by using its own private key of the receiver, so as to obtain the public encryption key of the encryption key pair applied by the transaction initiator a from the CA center. The transaction receiver B can decrypt the encrypted transaction content data in the transaction body by using the decrypted encryption public key, namely, the transaction content data such as 'transfer amount 100' can be obtained by decryption, and the transaction receiver B can complete the transaction with the transaction initiator A on the blockchain according to the decrypted transaction content data.
Because the transaction body comprises the first encryption public key, the first encryption public key is generated by encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node, and therefore, the first informed node C can decrypt the first encryption public key through the first private key of the first informed node C so as to obtain the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center. The first notifier node C may decrypt the encrypted transaction content data in the transaction body by using the decrypted encrypted public key, i.e. may decrypt the encrypted transaction content data to obtain the transaction content data, such as "transfer amount 100", so that the first notifier node C may know that the transaction is a transfer to B and know that the specific transfer amount 100 is a transfer.
For the second notifier node D, the public key of the second notifier node D is not encrypted in the transaction body, so that the second notifier node D cannot decrypt the encrypted transaction content data in the transaction body after receiving the transaction body, and the second notifier node D cannot learn the transaction content data such as the "transfer amount 100", thereby ensuring the privacy of the transaction data in the blockchain.
For the policer, since the dual key pair is prepared in advance: the signing secret key and the encryption secret key are obtained by the supervisor according to the supervision requirement, so that the supervisor can supervise the transaction body in the blockchain, for example, the supervisor can obtain transaction service data and decrypt the encrypted transaction content data in the transaction body to obtain the transaction content data, and judge whether the transaction service data and the transaction content data are legal or not. For example, the supervisor may be a CA center, and after the transaction initiator a applies for the encryption key pair from the CA center, the CA center stores the encryption key pair of the present transaction. When supervision is needed, the CA center acquires a transaction body generated by the transaction initiator A, and decrypts the encrypted transaction content data in the transaction body by utilizing the corresponding key in the stored encryption key pair of the transaction, so that the transaction service data is acquired as 'A is transferred to B', the transaction content data is acquired as 'transfer amount 100', and whether the transaction service data and the transaction content data are legal or not can be judged.
It should be noted that, the algorithm used in this embodiment adopts symmetric and asymmetric algorithms according to the service requirement, and the symmetric algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256 bits), DES, AES (128 bits), etc. Asymmetric algorithms include, but are not limited to: RSA (2048 bit), SM2 (domestic), ECC (210 bit), DH, DSA, RSA (1024 bit), and the like. Unidirectional (hash) algorithms include, but are not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5, etc. Wherein the symmetric algorithm is used for encryption, and the asymmetric algorithm and the hash algorithm are used for the hash value calculation process.
As shown in fig. 2, fig. 2 is a flowchart of an embodiment of a chain of alliance-based transaction supervision method according to the present invention, the chain of alliance-based transaction supervision method includes the following steps:
step S10, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor;
step S20, encrypting the transaction information determined by the transaction initiator on the alliance chain by using the encryption private key in the encryption key pair to generate encrypted transaction data;
step S30, encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
Step S40, based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts the encryption transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
In the embodiment, the encryption private key in the preset encryption key pair is used for encrypting the transaction information determined by the transaction initiator on the alliance chain to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. Because the encrypted transaction data and the receiver encryption public key can be formed into a transaction body to carry out transaction on a alliance chain, a transaction receiver on the alliance chain can decrypt the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, and decrypt the encrypted transaction data in the transaction body by utilizing the decrypted encryption public key to obtain determined transaction information, so that the transaction with the transaction initiator is completed; because only the receiving party encrypts the public key in the transaction body, other nodes on the alliance chain cannot decrypt and acquire the encrypted public key in the encryption key pair and cannot decrypt the encrypted transaction data in the transaction body, so that the confidentiality of the transaction data in the alliance chain is ensured. Meanwhile, the supervising side can decrypt the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained synchronously to obtain the determined transaction information, and the transaction information is supervised. The method and the system can ensure the privacy of the transaction data and enable the supervision authorities to effectively supervise the transactions.
Further, in this embodiment, the transaction information determined by the transaction initiator includes transaction service data (such as identity information of both parties of the transaction, service parameters, etc.) and transaction content data (such as transaction share, exchange rate, etc.), and the step of encrypting the transaction information determined by the transaction initiator on the federation chain by using the encryption private key in the encryption key pair includes:
encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
In this embodiment, the federation chain further includes a preset third party notifier node (including a node that can completely or partially know the transaction) other than the transaction party, where, if the public key of the preset third party notifier node on the federation chain is used to encrypt the encryption public key in the encryption key pair, an encrypted public key of the notifier is generated; the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Further, the embodiment further includes a signature authentication step, firstly, a preset signature key pair is obtained; and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body. After a transaction receiver receives a transaction body on a alliance chain, firstly performing signature authentication, for example, decrypting an encrypted hash value in the transaction body received by the transaction receiver by using a signature public key in the signature key pair to obtain a decrypted hash value; calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value; if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body; if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
Specifically, in one embodiment, in the transaction on the alliance chain type blockchain, the related object node includes a transaction two-party node, a first notifier node, a second notifier node and a supervisor, wherein the transaction two-party is two parties for implementing the transaction, for example, the transaction two-party node includes a node A and a node B, the transaction is that A is transferred to B, and the transfer amount is 100; the first-party node is a party, such as node C, that can let it know the details of the entire transaction completely, let C know that the transaction is a transfer to B, and know the specific transfer amount 100; the second node of the knowledgeable party is a party that can let it know part of the transaction information, such as node D, let D know that the transaction is a transfer to B, but cannot let D know the specific transfer amount 100; the supervisor needs to know that the transaction is transferred from A to B and know the specific transfer amount 100 due to supervision requirements, so as to judge whether the transaction is legal or not according to the identity of the two sides of the transfer and the transfer amount, thereby realizing transaction supervision.
The dual key pair is prepared in advance: a signing key, an encryption key. It should be noted that, these key pairs may be preset and synchronously notified to the administrator. The key pairs can also be obtained from the CA center application, and the supervision party can apply for knowing the key pairs by the CA center according to own supervision identity. The transaction information is divided into transaction service data, for example, "a transfer to B" and transaction content data, for example, "transfer amount 100".
The transaction initiator A obtains a preset encryption key pair of the transaction or obtains the encryption key pair of the transaction from a CA center application. The transaction initiator a encrypts the transaction content data of the transaction by using the applied encryption private key in the encryption key pair to generate encrypted transaction content data, for example, encrypts the plaintext data 100 to generate encrypted transaction content data, and forms a transaction body, where the transaction body includes the transaction service data and the encrypted transaction content data.
Further, the public encryption key in the encryption key pair applied by the transaction initiator A from the CA center is encrypted by the public encryption key of the transaction receiver B, so as to generate the public encryption key of the receiver. And encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node to generate a first encryption public key. The receiver encrypted public key and the first encrypted public key are added to the transaction body, and the new transaction body comprises transaction service data, encrypted transaction content data, the receiver encrypted public key and the first encrypted public key.
The transaction initiator A uses a hash algorithm to calculate a corresponding hash value of the whole transaction body, encrypts the hash value calculated by the whole transaction body by using a signature private key applied from a CA center to obtain an encrypted hash value, and adds the encrypted hash value to the transaction body, so that the finally formed transaction body comprises five parts, namely transaction service data, encrypted transaction content data, a receiver encryption public key, a first encryption public key and an encryption hash value.
The transaction initiator A initiates a transaction on the blockchain based on the transaction body, and the transaction receiver B firstly performs signature authentication operation after acquiring the transaction body from the blockchain as follows:
the transaction receiver B applies for a signature public key corresponding to the signature private key of the transaction initiator A from the CA center, and decrypts the encrypted hash value in the transaction body by using the applied signature public key to obtain a decrypted hash value, wherein the decrypted hash value is a hash value calculated by the transaction initiator A for the whole transaction body. The transaction receiver B uses a hash algorithm to the acquired transaction body to calculate a corresponding hash value. Comparing the hash value calculated by the transaction receiver B with the hash value decrypted before, if the hash value calculated by the transaction receiver B is identical to the hash value decrypted before, the transaction receiver B can carry out subsequent operation according to the transaction body, wherein the transaction is signed by the transaction initiator A and the transaction information is not tampered, namely, the fact that the transaction is initiated by the transaction initiator A and is true and effective is proved. Otherwise, the transaction information is tampered, and the process is ended.
After the transaction receiver B verifies that the transaction is signed by the transaction initiator a and the transaction information is not tampered, the transaction receiver B can decrypt the public encryption key of the receiver by using its own private key of the receiver, so as to obtain the public encryption key of the encryption key pair applied by the transaction initiator a from the CA center. The transaction receiver B can decrypt the encrypted transaction content data in the transaction body by using the decrypted encryption public key, namely, the transaction content data such as 'transfer amount 100' can be obtained by decryption, and the transaction receiver B can complete the transaction with the transaction initiator A on the blockchain according to the decrypted transaction content data.
Because the transaction body comprises the first encryption public key, the first encryption public key is generated by encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node, and therefore, the first informed node C can decrypt the first encryption public key through the first private key of the first informed node C so as to obtain the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center. The first notifier node C may decrypt the encrypted transaction content data in the transaction body by using the decrypted encrypted public key, i.e. may decrypt the encrypted transaction content data to obtain the transaction content data, such as "transfer amount 100", so that the first notifier node C may know that the transaction is a transfer to B and know that the specific transfer amount 100 is a transfer.
For the second notifier node D, the public key of the second notifier node D is not encrypted in the transaction body, so that the second notifier node D cannot decrypt the encrypted transaction content data in the transaction body after receiving the transaction body, and the second notifier node D cannot learn the transaction content data such as the "transfer amount 100", thereby ensuring the privacy of the transaction data in the blockchain.
For the policer, since the dual key pair is prepared in advance: the signing secret key and the encryption secret key are obtained by the supervisor according to the supervision requirement, so that the supervisor can supervise the transaction body in the blockchain, for example, the supervisor can obtain transaction service data and decrypt the encrypted transaction content data in the transaction body to obtain the transaction content data, and judge whether the transaction service data and the transaction content data are legal or not. For example, the supervisor may be a CA center, and after the transaction initiator a applies for the encryption key pair from the CA center, the CA center stores the encryption key pair of the present transaction. When supervision is needed, the CA center acquires a transaction body generated by the transaction initiator A, and decrypts the encrypted transaction content data in the transaction body by utilizing the corresponding key in the stored encryption key pair of the transaction, so that the transaction service data is acquired as 'A is transferred to B', the transaction content data is acquired as 'transfer amount 100', and whether the transaction service data and the transaction content data are legal or not can be judged.
It should be noted that, the algorithm used in this embodiment adopts symmetric and asymmetric algorithms according to the service requirement, and the symmetric algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256 bits), DES, AES (128 bits), etc. Asymmetric algorithms include, but are not limited to: RSA (2048 bit), SM2 (domestic), ECC (210 bit), DH, DSA, RSA (1024 bit), and the like. Unidirectional (hash) algorithms include, but are not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5, etc. Wherein the symmetric algorithm is used for encryption, and the asymmetric algorithm and the hash algorithm are used for the hash value calculation process.
In addition, the present invention further provides a computer readable storage medium, where the computer readable storage medium stores a chain of alliance-based transaction monitoring system, where the chain of alliance-based transaction monitoring system may be executed by at least one processor, so that the at least one processor performs the steps of the chain of alliance-based transaction monitoring method in the above embodiment, where specific implementation procedures of steps S10, S20, S30, etc. of the chain of alliance-based transaction monitoring method are described above, and are not repeated herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The preferred embodiments of the present invention have been described above with reference to the accompanying drawings, and thus do not limit the scope of the claims of the present invention. The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments. In addition, while a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in a different order than is shown.
Those skilled in the art will appreciate that many modifications are possible in which the invention is practiced without departing from its scope or spirit, e.g., features of one embodiment can be used with another embodiment to yield yet a further embodiment. Any modification, equivalent replacement and improvement made within the technical idea of the present invention should be within the scope of the claims of the present invention.

Claims (9)

1. An electronic device comprising a memory, a processor, the memory having stored thereon a chain of alliance-based transaction monitoring system operable on the processor, the chain of alliance-based transaction monitoring system, when executed by the processor, performing the steps of:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key;
the encryption public key of the receiving party and a first encryption public key generated after a preset first knowledge party node encrypts the encryption public key in the encryption key pair by using the first public key form a transaction body;
based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; the first informed party node decrypts the first encryption public key through the first private key to obtain an encryption public key of the encryption key pair, and then decrypts the encrypted transaction content data in the transaction body by using the decrypted encryption public key to obtain transaction content data; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
2. The electronic device of claim 1, wherein the transaction information determined by the transaction initiator includes transaction business data and transaction content data, wherein the step of encrypting the transaction information determined by the transaction initiator on the coalition chain using an encryption private key of the encryption key pair, and generating the encrypted transaction data includes:
and encrypting the transaction content data in the transaction information by using an encryption private key in the encryption key pair to generate encrypted transaction content data.
3. The electronic device of claim 1, wherein the processor is further configured to execute the coalition chain based transaction management system to implement the steps of:
acquiring a preset signature key pair;
and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
4. An electronic device as claimed in claim 3, characterized in that:
after the transaction receiver receives the transaction body, firstly decrypting the encrypted hash value in the transaction body by using the signature public key in the signature key pair to obtain a decrypted hash value;
Calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value;
if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body;
if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
5. A chain of alliance-based transaction policing method, comprising:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key;
the encryption public key of the receiving party and a first encryption public key generated after a preset first knowledge party node encrypts the encryption public key in the encryption key pair by using the first public key form a transaction body;
Based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; the first informed party node decrypts the first encryption public key through the first private key to obtain an encryption public key of the encryption key pair, and then decrypts the encrypted transaction content data in the transaction body by using the decrypted encryption public key to obtain transaction content data; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
6. The federation chain-based transaction administration method according to claim 5, wherein the transaction information determined by the transaction initiator includes transaction service data and transaction content data, the step of encrypting the transaction information determined by the transaction initiator on the federation chain using the encryption private key of the encryption key pair, and generating encrypted transaction data includes:
And encrypting the transaction content data in the transaction information by using an encryption private key in the encryption key pair to generate encrypted transaction content data.
7. The federation chain-based transaction policing method of claim 5, further comprising:
acquiring a preset signature key pair;
and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
8. The federation chain-based transaction policing method of claim 7, further comprising:
decrypting the encrypted hash value in the transaction body received by the transaction receiver by utilizing the public signature key in the public signature key pair to obtain a decrypted hash value;
calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value;
if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body;
If the calculated hash value is different from the decrypted hash value, ending the transaction flow.
9. A computer readable storage medium having stored thereon a chain of alliance based transaction monitoring system which when executed by a processor implements the steps of the chain of alliance based transaction monitoring method of any of claims 5 to 8.
CN201810618522.6A 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium Active CN109034796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810618522.6A CN109034796B (en) 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810618522.6A CN109034796B (en) 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium

Publications (2)

Publication Number Publication Date
CN109034796A CN109034796A (en) 2018-12-18
CN109034796B true CN109034796B (en) 2023-09-22

Family

ID=64609745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810618522.6A Active CN109034796B (en) 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium

Country Status (1)

Country Link
CN (1) CN109034796B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816525A (en) * 2018-12-27 2019-05-28 石更箭数据科技(上海)有限公司 A kind of data processing method and its device, medium, terminal
CN111698192B (en) * 2019-03-13 2021-12-03 华为技术有限公司 Method for monitoring transaction system, transaction device, monitoring device and system
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110474908B (en) * 2019-08-16 2022-04-05 广东省微位数字身份科技有限公司 Transaction supervision method and device, storage medium and computer equipment
CN110519059B (en) * 2019-09-29 2023-05-05 四川师范大学 Bilinear mapping-based block chain double-key hidden address processing method
CN110855631B (en) * 2019-10-24 2022-05-17 南京可信区块链与算法经济研究院有限公司 Method, system and storage medium for verifying supervision-capable zero knowledge in block chain
CN112749965B (en) * 2019-10-30 2024-04-09 深圳市迅雷网络技术有限公司 Information monitoring method, system, equipment and storage medium
CN110808999B (en) * 2019-11-12 2022-02-15 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium
CN111177259A (en) * 2019-12-13 2020-05-19 杭州复杂美科技有限公司 Parallel chain transaction encryption method, device and storage medium
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184495A (en) * 2011-04-21 2011-09-14 北京天地融科技有限公司 Network payment method and system
CN103108245A (en) * 2011-11-15 2013-05-15 中国银联股份有限公司 Smart television payment secret key system and payment method based on smart television
CN104751364A (en) * 2013-12-30 2015-07-01 上海方付通商务服务有限公司 Security certification type trans-regional direct-selling bank alliance transaction method and system
CN106534097A (en) * 2016-10-27 2017-03-22 上海亿账通区块链科技有限公司 Block chain trading based authority control method and system
CN106685989A (en) * 2017-02-07 2017-05-17 杭州秘猿科技有限公司 Privacy communication method based on license chain support and supervision
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
JP2017204704A (en) * 2016-05-10 2017-11-16 日本電信電話株式会社 Validity guarantee method, validity guarantee system and validity guarantee program

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107851111A (en) * 2015-05-05 2018-03-27 识卡公司 Use the identity management services of block chain
US11188900B2 (en) * 2016-12-01 2021-11-30 Mastercard International Incorporated Method and system for payment card verification via blockchain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184495A (en) * 2011-04-21 2011-09-14 北京天地融科技有限公司 Network payment method and system
CN103108245A (en) * 2011-11-15 2013-05-15 中国银联股份有限公司 Smart television payment secret key system and payment method based on smart television
CN104751364A (en) * 2013-12-30 2015-07-01 上海方付通商务服务有限公司 Security certification type trans-regional direct-selling bank alliance transaction method and system
JP2017204704A (en) * 2016-05-10 2017-11-16 日本電信電話株式会社 Validity guarantee method, validity guarantee system and validity guarantee program
CN106534097A (en) * 2016-10-27 2017-03-22 上海亿账通区块链科技有限公司 Block chain trading based authority control method and system
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN106685989A (en) * 2017-02-07 2017-05-17 杭州秘猿科技有限公司 Privacy communication method based on license chain support and supervision
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Dianli Guo, 等.Adaptively Secure Broadcast Encryption With Constant Ciphertexts.《IEEE Transactions on Information Forensics and Security》.2016,第62卷(第3期),第709-715页. *
Makoto Sato,等.Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.《Journal of Information Processing》.2016,第24卷(第1期),第2-8页. *
孙媛媛.基于信任链的P2P可信身份认证模型的研究与设计.《中国优秀硕士学位论文全文数据库信息科技辑》.2016,(第03期),第I139-355页. *
庹小忠.基于区块链的加密信息备份系统研究与设计.《中国优秀硕士学位论文全文数据库信息科技辑》.2018,(第01期),第I138-86页. *

Also Published As

Publication number Publication date
CN109034796A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN109034796B (en) Alliance chain-based transaction supervision method, electronic device and readable storage medium
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
US10616213B2 (en) Password manipulation for secure account creation and verification through third-party servers
CN105553951B (en) Data transmission method and device
US9331989B2 (en) Secure shared key sharing systems and methods
US20180234255A1 (en) Method and system for distributing attestation key and certificate in trusted computing
CN110890962B (en) Authentication key negotiation method, device, storage medium and equipment
CN110290108B (en) Data processing method, system and related equipment in block chain network
TW202015378A (en) Cryptographic operation method, method for creating work key, and cryptographic service platform and device
CN109547209B (en) Two-party SM2 digital signature generation method
JP2010220212A (en) Securing communications sent by first user to second user
AU2021271512A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
WO2017131775A1 (en) Device attestation
WO2018112482A1 (en) Method and system for distributing attestation key and certificate in trusted computing
JP2022521525A (en) Cryptographic method for validating data
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN106161472A (en) A kind of method of data encryption, Apparatus and system
CN111294203A (en) Information transmission method
CN111161075B (en) Blockchain transaction data proving and supervising method, system and related equipment
CN113556230A (en) Data security transmission method, certificate correlation method, server, system and medium
CN104821884A (en) Private key protection method based on asymmetric secret key system
CN111008400A (en) Data processing method, device and system
EP3010173B1 (en) Key storage device, key storage method, and program therefor
CN109510711B (en) Network communication method, server, client and system
CN111460463A (en) Electronic deposit certificate storage and notarization method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230825

Address after: 518000, Building 2410, Building 2, Research and Development Building 1 and 2, Fangda Plaza (Phase I), North Ring Avenue, Taoyuan Community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong Province

Applicant after: Anda Data Technology (Shenzhen) Co.,Ltd.

Address before: 400010 38 / F, 39 / F, unit 1, 99 Wuyi Road, Yuzhong District, Chongqing

Applicant before: CHONGQING FINANCIAL ASSETS EXCHANGE Co.,Ltd.

GR01 Patent grant
GR01 Patent grant