CN109034796B - Alliance chain-based transaction supervision method, electronic device and readable storage medium - Google Patents
Alliance chain-based transaction supervision method, electronic device and readable storage medium Download PDFInfo
- Publication number
- CN109034796B CN109034796B CN201810618522.6A CN201810618522A CN109034796B CN 109034796 B CN109034796 B CN 109034796B CN 201810618522 A CN201810618522 A CN 201810618522A CN 109034796 B CN109034796 B CN 109034796B
- Authority
- CN
- China
- Prior art keywords
- transaction
- encryption
- public key
- receiver
- hash value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 239000003999 initiator Substances 0.000 claims abstract description 70
- 238000012544 monitoring process Methods 0.000 claims description 16
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 230000008520 organization Effects 0.000 abstract description 4
- 238000012546 transfer Methods 0.000 description 34
- 230000008569 process Effects 0.000 description 7
- 230000009977 dual effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
The invention relates to a transaction supervision method based on a alliance chain, an electronic device and a readable storage medium, wherein the method comprises the following steps: acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor; encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. The invention can ensure the privacy of the transaction data and can effectively monitor the transaction by the supervision organization.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a federation chain-based transaction supervision method, an electronic device, and a readable storage medium.
Background
When trading is performed in a blockchain of a alliance chain type, the trade data belongs to confidential data among organizations in the alliance chain, the confidentiality of the trade data needs to be ensured, namely any node in the blockchain cannot be enabled to acquire the content of the trade data, and meanwhile, for the trading in the blockchain, a supervision organization needs to know what trade is particularly done among enterprises and whether illegal trade behaviors are performed among the organizations according to the trade data. In the prior art, aiming at transactions in a blockchain of a alliance chain type, the confidentiality of transaction data can not be ensured at the same time, and a supervision organization can effectively supervise the transactions.
Disclosure of Invention
The invention aims to provide a trade supervision method, an electronic device and a readable storage medium based on a alliance chain, which aim to ensure the privacy of trade data and enable a supervision organization to effectively supervise the trade.
To achieve the above object, the present invention provides an electronic device including a memory, a processor, and a chain of alliance-based transaction monitoring system executable on the processor, the chain of alliance-based transaction monitoring system implementing the following steps when executed by the processor:
Acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
Preferably, the transaction information determined by the transaction initiator includes transaction service data and transaction content data, the step of encrypting the transaction information determined by the transaction initiator on the coalition chain by using the encryption private key in the encryption key pair, and generating encrypted transaction data includes:
Encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
Preferably, the processor is further configured to execute the coalition chain based transaction management system to implement the following steps:
encrypting the encryption public key in the encryption key pair by using an public key of an informed party of a preset third-party informed party node on the alliance chain to generate an encrypted public key of the informed party;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Preferably, the processor is further configured to execute the coalition chain based transaction management system to implement the following steps:
acquiring a preset signature key pair;
and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
In addition, in order to achieve the above object, the present invention also provides a transaction supervision method based on a federated chain, the transaction supervision method based on the federated chain includes:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
Preferably, the transaction information determined by the transaction initiator includes transaction service data and transaction content data, the step of encrypting the transaction information determined by the transaction initiator on the coalition chain by using the encryption private key in the encryption key pair, and generating encrypted transaction data includes:
encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
Preferably, the method further comprises:
encrypting the encryption public key in the encryption key pair by using an public key of an informed party of a preset third-party informed party node on the alliance chain to generate an encrypted public key of the informed party;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Preferably, the method further comprises:
acquiring a preset signature key pair;
And calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
Preferably, the method further comprises:
decrypting the encrypted hash value in the transaction body received by the transaction receiver by utilizing the public signature key in the public signature key pair to obtain a decrypted hash value;
calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value;
if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body;
if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing a chain of alliance-based transaction monitoring system executable by at least one processor to cause the at least one processor to perform the steps of the chain of alliance-based transaction monitoring method as described above.
The transaction supervision method, the system and the readable storage medium based on the alliance chain provided by the invention encrypt the transaction information determined by the transaction initiator on the alliance chain through the encryption private key in the preset encryption key pair to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. Because the encrypted transaction data and the receiver encryption public key can be formed into a transaction body to carry out transaction on a alliance chain, a transaction receiver on the alliance chain can decrypt the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, and decrypt the encrypted transaction data in the transaction body by utilizing the decrypted encryption public key to obtain determined transaction information, so that the transaction with the transaction initiator is completed; because only the receiving party encrypts the public key in the transaction body, other nodes on the alliance chain cannot decrypt and acquire the encrypted public key in the encryption key pair and cannot decrypt the encrypted transaction data in the transaction body, so that the confidentiality of the transaction data in the alliance chain is ensured. Meanwhile, the supervising side can decrypt the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained synchronously to obtain the determined transaction information, and the transaction information is supervised. The method and the system can ensure the privacy of the transaction data and enable the supervision authorities to effectively supervise the transactions.
Drawings
FIG. 1 is a schematic diagram of the operating environment of a preferred embodiment of a federated-based transaction monitoring system 10 of the present invention;
FIG. 2 is a flowchart of a federation chain-based transaction administration method according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The invention provides a trade supervision system based on a alliance chain. Referring to FIG. 1, a schematic diagram of the operating environment of a preferred embodiment of a federated-based transaction monitoring system 10 of the present invention is shown.
In this embodiment, the coalition chain based transaction monitoring system 10 is installed and operated in the electronic device 1. The electronic device 1 may include, but is not limited to, a memory 11, a processor 12, and a display 13. Fig. 1 shows only an electronic device 1 with components 11-13, but it is understood that not all shown components are required to be implemented, and that more or fewer components may alternatively be implemented.
The memory 11 is at least one type of readable computer storage medium, and the memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a hard disk or a memory of the electronic device 1. The memory 11 may in other embodiments also be an external storage device of the electronic apparatus 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic apparatus 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic apparatus 1. The memory 11 is used for storing application software and various data installed in the electronic device 1, such as program codes of the coalition chain-based transaction supervision system 10. The memory 11 may also be used for temporarily storing data that has been output or is to be output.
The processor 12 may in some embodiments be a central processing unit (Central Processing Unit, CPU), microprocessor or other data processing chip for executing program code or processing data stored in the memory 11, such as executing the federated chain based transaction monitoring system 10, etc.
The display 13 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like in some embodiments. The display 13 is used for displaying information processed in the electronic device 1 and for displaying visual user interfaces, such as generated transaction bodies, informed nodes in a coalition chain, transaction status, etc. The components 11-13 of the electronic device 1 communicate with each other via a system bus.
The federated chain-based transaction management system 10 includes at least one computer readable instruction stored in the memory 11 that is executable by the processor 12 to implement embodiments of the present application.
Wherein, the above-mentioned transaction supervision system 10 based on the alliance chain realizes the following steps when being executed by the processor 12:
Step S1, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor;
step S2, encrypting the transaction information determined by the transaction initiator on the alliance chain by using the encryption private key in the encryption key pair to generate encrypted transaction data;
step S3, encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
step S4, based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts the encryption transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
In the embodiment, the encryption private key in the preset encryption key pair is used for encrypting the transaction information determined by the transaction initiator on the alliance chain to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. Because the encrypted transaction data and the receiver encryption public key can be formed into a transaction body to carry out transaction on a alliance chain, a transaction receiver on the alliance chain can decrypt the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, and decrypt the encrypted transaction data in the transaction body by utilizing the decrypted encryption public key to obtain determined transaction information, so that the transaction with the transaction initiator is completed; because only the receiving party encrypts the public key in the transaction body, other nodes on the alliance chain cannot decrypt and acquire the encrypted public key in the encryption key pair and cannot decrypt the encrypted transaction data in the transaction body, so that the confidentiality of the transaction data in the alliance chain is ensured. Meanwhile, the supervising side can decrypt the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained synchronously to obtain the determined transaction information, and the transaction information is supervised. The method and the system can ensure the privacy of the transaction data and enable the supervision authorities to effectively supervise the transactions.
Further, in this embodiment, the transaction information determined by the transaction initiator includes transaction service data (such as identity information of both parties of the transaction, service parameters, etc.) and transaction content data (such as transaction share, exchange rate, etc.), and the step of encrypting the transaction information determined by the transaction initiator on the federation chain by using the encryption private key in the encryption key pair includes:
encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
In this embodiment, the federation chain further includes a preset third party notifier node (including a node that can completely or partially know the transaction) other than the transaction party, where, if the public key of the preset third party notifier node on the federation chain is used to encrypt the encryption public key in the encryption key pair, an encrypted public key of the notifier is generated; the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Further, the embodiment further includes a signature authentication step, firstly, a preset signature key pair is obtained; and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body. After a transaction receiver receives a transaction body on a alliance chain, firstly performing signature authentication, for example, decrypting an encrypted hash value in the transaction body received by the transaction receiver by using a signature public key in the signature key pair to obtain a decrypted hash value; calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value; if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body; if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
Specifically, in one embodiment, in the transaction on the alliance chain type blockchain, the related object node includes a transaction two-party node, a first notifier node, a second notifier node and a supervisor, wherein the transaction two-party is two parties for implementing the transaction, for example, the transaction two-party node includes a node A and a node B, the transaction is that A is transferred to B, and the transfer amount is 100; the first-party node is a party, such as node C, that can let it know the details of the entire transaction completely, let C know that the transaction is a transfer to B, and know the specific transfer amount 100; the second node of the knowledgeable party is a party that can let it know part of the transaction information, such as node D, let D know that the transaction is a transfer to B, but cannot let D know the specific transfer amount 100; the supervisor needs to know that the transaction is transferred from A to B and know the specific transfer amount 100 due to supervision requirements, so as to judge whether the transaction is legal or not according to the identity of the two sides of the transfer and the transfer amount, thereby realizing transaction supervision.
The dual key pair is prepared in advance: a signing key, an encryption key. It should be noted that, these key pairs may be preset and synchronously notified to the administrator. The key pairs can also be obtained from the CA center application, and the supervision party can apply for knowing the key pairs by the CA center according to own supervision identity. The transaction information is divided into transaction service data, for example, "a transfer to B" and transaction content data, for example, "transfer amount 100".
The transaction initiator A obtains a preset encryption key pair of the transaction or obtains the encryption key pair of the transaction from a CA center application. The transaction initiator a encrypts the transaction content data of the transaction by using the applied encryption private key in the encryption key pair to generate encrypted transaction content data, for example, encrypts the plaintext data 100 to generate encrypted transaction content data, and forms a transaction body, where the transaction body includes the transaction service data and the encrypted transaction content data.
Further, the public encryption key in the encryption key pair applied by the transaction initiator A from the CA center is encrypted by the public encryption key of the transaction receiver B, so as to generate the public encryption key of the receiver. And encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node to generate a first encryption public key. The receiver encrypted public key and the first encrypted public key are added to the transaction body, and the new transaction body comprises transaction service data, encrypted transaction content data, the receiver encrypted public key and the first encrypted public key.
The transaction initiator A uses a hash algorithm to calculate a corresponding hash value of the whole transaction body, encrypts the hash value calculated by the whole transaction body by using a signature private key applied from a CA center to obtain an encrypted hash value, and adds the encrypted hash value to the transaction body, so that the finally formed transaction body comprises five parts, namely transaction service data, encrypted transaction content data, a receiver encryption public key, a first encryption public key and an encryption hash value.
The transaction initiator A initiates a transaction on the blockchain based on the transaction body, and the transaction receiver B firstly performs signature authentication operation after acquiring the transaction body from the blockchain as follows:
the transaction receiver B applies for a signature public key corresponding to the signature private key of the transaction initiator A from the CA center, and decrypts the encrypted hash value in the transaction body by using the applied signature public key to obtain a decrypted hash value, wherein the decrypted hash value is a hash value calculated by the transaction initiator A for the whole transaction body. The transaction receiver B uses a hash algorithm to the acquired transaction body to calculate a corresponding hash value. Comparing the hash value calculated by the transaction receiver B with the hash value decrypted before, if the hash value calculated by the transaction receiver B is identical to the hash value decrypted before, the transaction receiver B can carry out subsequent operation according to the transaction body, wherein the transaction is signed by the transaction initiator A and the transaction information is not tampered, namely, the fact that the transaction is initiated by the transaction initiator A and is true and effective is proved. Otherwise, the transaction information is tampered, and the process is ended.
After the transaction receiver B verifies that the transaction is signed by the transaction initiator a and the transaction information is not tampered, the transaction receiver B can decrypt the public encryption key of the receiver by using its own private key of the receiver, so as to obtain the public encryption key of the encryption key pair applied by the transaction initiator a from the CA center. The transaction receiver B can decrypt the encrypted transaction content data in the transaction body by using the decrypted encryption public key, namely, the transaction content data such as 'transfer amount 100' can be obtained by decryption, and the transaction receiver B can complete the transaction with the transaction initiator A on the blockchain according to the decrypted transaction content data.
Because the transaction body comprises the first encryption public key, the first encryption public key is generated by encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node, and therefore, the first informed node C can decrypt the first encryption public key through the first private key of the first informed node C so as to obtain the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center. The first notifier node C may decrypt the encrypted transaction content data in the transaction body by using the decrypted encrypted public key, i.e. may decrypt the encrypted transaction content data to obtain the transaction content data, such as "transfer amount 100", so that the first notifier node C may know that the transaction is a transfer to B and know that the specific transfer amount 100 is a transfer.
For the second notifier node D, the public key of the second notifier node D is not encrypted in the transaction body, so that the second notifier node D cannot decrypt the encrypted transaction content data in the transaction body after receiving the transaction body, and the second notifier node D cannot learn the transaction content data such as the "transfer amount 100", thereby ensuring the privacy of the transaction data in the blockchain.
For the policer, since the dual key pair is prepared in advance: the signing secret key and the encryption secret key are obtained by the supervisor according to the supervision requirement, so that the supervisor can supervise the transaction body in the blockchain, for example, the supervisor can obtain transaction service data and decrypt the encrypted transaction content data in the transaction body to obtain the transaction content data, and judge whether the transaction service data and the transaction content data are legal or not. For example, the supervisor may be a CA center, and after the transaction initiator a applies for the encryption key pair from the CA center, the CA center stores the encryption key pair of the present transaction. When supervision is needed, the CA center acquires a transaction body generated by the transaction initiator A, and decrypts the encrypted transaction content data in the transaction body by utilizing the corresponding key in the stored encryption key pair of the transaction, so that the transaction service data is acquired as 'A is transferred to B', the transaction content data is acquired as 'transfer amount 100', and whether the transaction service data and the transaction content data are legal or not can be judged.
It should be noted that, the algorithm used in this embodiment adopts symmetric and asymmetric algorithms according to the service requirement, and the symmetric algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256 bits), DES, AES (128 bits), etc. Asymmetric algorithms include, but are not limited to: RSA (2048 bit), SM2 (domestic), ECC (210 bit), DH, DSA, RSA (1024 bit), and the like. Unidirectional (hash) algorithms include, but are not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5, etc. Wherein the symmetric algorithm is used for encryption, and the asymmetric algorithm and the hash algorithm are used for the hash value calculation process.
As shown in fig. 2, fig. 2 is a flowchart of an embodiment of a chain of alliance-based transaction supervision method according to the present invention, the chain of alliance-based transaction supervision method includes the following steps:
step S10, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor;
step S20, encrypting the transaction information determined by the transaction initiator on the alliance chain by using the encryption private key in the encryption key pair to generate encrypted transaction data;
step S30, encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver;
Step S40, based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts the encryption transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
In the embodiment, the encryption private key in the preset encryption key pair is used for encrypting the transaction information determined by the transaction initiator on the alliance chain to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key; forming a transaction body by the encrypted transaction data and the encryption public key of the receiver; a transaction is initiated on the coalition chain based on the transaction body. Because the encrypted transaction data and the receiver encryption public key can be formed into a transaction body to carry out transaction on a alliance chain, a transaction receiver on the alliance chain can decrypt the receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, and decrypt the encrypted transaction data in the transaction body by utilizing the decrypted encryption public key to obtain determined transaction information, so that the transaction with the transaction initiator is completed; because only the receiving party encrypts the public key in the transaction body, other nodes on the alliance chain cannot decrypt and acquire the encrypted public key in the encryption key pair and cannot decrypt the encrypted transaction data in the transaction body, so that the confidentiality of the transaction data in the alliance chain is ensured. Meanwhile, the supervising side can decrypt the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained synchronously to obtain the determined transaction information, and the transaction information is supervised. The method and the system can ensure the privacy of the transaction data and enable the supervision authorities to effectively supervise the transactions.
Further, in this embodiment, the transaction information determined by the transaction initiator includes transaction service data (such as identity information of both parties of the transaction, service parameters, etc.) and transaction content data (such as transaction share, exchange rate, etc.), and the step of encrypting the transaction information determined by the transaction initiator on the federation chain by using the encryption private key in the encryption key pair includes:
encrypting the transaction content data in the transaction information by utilizing an encryption private key in the encryption key pair to generate encrypted transaction content data;
the composing the encrypted transaction data and the receiver encrypted public key into a transaction body comprises:
the transaction service data, the encrypted transaction content data and the encrypted public key of the receiver form a transaction body.
In this embodiment, the federation chain further includes a preset third party notifier node (including a node that can completely or partially know the transaction) other than the transaction party, where, if the public key of the preset third party notifier node on the federation chain is used to encrypt the encryption public key in the encryption key pair, an encrypted public key of the notifier is generated; the transaction service data, the encrypted transaction content data, the receiver encryption public key and the knowledge Fang Jiami public key form a transaction body.
Further, the embodiment further includes a signature authentication step, firstly, a preset signature key pair is obtained; and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body. After a transaction receiver receives a transaction body on a alliance chain, firstly performing signature authentication, for example, decrypting an encrypted hash value in the transaction body received by the transaction receiver by using a signature public key in the signature key pair to obtain a decrypted hash value; calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value; if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body; if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
Specifically, in one embodiment, in the transaction on the alliance chain type blockchain, the related object node includes a transaction two-party node, a first notifier node, a second notifier node and a supervisor, wherein the transaction two-party is two parties for implementing the transaction, for example, the transaction two-party node includes a node A and a node B, the transaction is that A is transferred to B, and the transfer amount is 100; the first-party node is a party, such as node C, that can let it know the details of the entire transaction completely, let C know that the transaction is a transfer to B, and know the specific transfer amount 100; the second node of the knowledgeable party is a party that can let it know part of the transaction information, such as node D, let D know that the transaction is a transfer to B, but cannot let D know the specific transfer amount 100; the supervisor needs to know that the transaction is transferred from A to B and know the specific transfer amount 100 due to supervision requirements, so as to judge whether the transaction is legal or not according to the identity of the two sides of the transfer and the transfer amount, thereby realizing transaction supervision.
The dual key pair is prepared in advance: a signing key, an encryption key. It should be noted that, these key pairs may be preset and synchronously notified to the administrator. The key pairs can also be obtained from the CA center application, and the supervision party can apply for knowing the key pairs by the CA center according to own supervision identity. The transaction information is divided into transaction service data, for example, "a transfer to B" and transaction content data, for example, "transfer amount 100".
The transaction initiator A obtains a preset encryption key pair of the transaction or obtains the encryption key pair of the transaction from a CA center application. The transaction initiator a encrypts the transaction content data of the transaction by using the applied encryption private key in the encryption key pair to generate encrypted transaction content data, for example, encrypts the plaintext data 100 to generate encrypted transaction content data, and forms a transaction body, where the transaction body includes the transaction service data and the encrypted transaction content data.
Further, the public encryption key in the encryption key pair applied by the transaction initiator A from the CA center is encrypted by the public encryption key of the transaction receiver B, so as to generate the public encryption key of the receiver. And encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node to generate a first encryption public key. The receiver encrypted public key and the first encrypted public key are added to the transaction body, and the new transaction body comprises transaction service data, encrypted transaction content data, the receiver encrypted public key and the first encrypted public key.
The transaction initiator A uses a hash algorithm to calculate a corresponding hash value of the whole transaction body, encrypts the hash value calculated by the whole transaction body by using a signature private key applied from a CA center to obtain an encrypted hash value, and adds the encrypted hash value to the transaction body, so that the finally formed transaction body comprises five parts, namely transaction service data, encrypted transaction content data, a receiver encryption public key, a first encryption public key and an encryption hash value.
The transaction initiator A initiates a transaction on the blockchain based on the transaction body, and the transaction receiver B firstly performs signature authentication operation after acquiring the transaction body from the blockchain as follows:
the transaction receiver B applies for a signature public key corresponding to the signature private key of the transaction initiator A from the CA center, and decrypts the encrypted hash value in the transaction body by using the applied signature public key to obtain a decrypted hash value, wherein the decrypted hash value is a hash value calculated by the transaction initiator A for the whole transaction body. The transaction receiver B uses a hash algorithm to the acquired transaction body to calculate a corresponding hash value. Comparing the hash value calculated by the transaction receiver B with the hash value decrypted before, if the hash value calculated by the transaction receiver B is identical to the hash value decrypted before, the transaction receiver B can carry out subsequent operation according to the transaction body, wherein the transaction is signed by the transaction initiator A and the transaction information is not tampered, namely, the fact that the transaction is initiated by the transaction initiator A and is true and effective is proved. Otherwise, the transaction information is tampered, and the process is ended.
After the transaction receiver B verifies that the transaction is signed by the transaction initiator a and the transaction information is not tampered, the transaction receiver B can decrypt the public encryption key of the receiver by using its own private key of the receiver, so as to obtain the public encryption key of the encryption key pair applied by the transaction initiator a from the CA center. The transaction receiver B can decrypt the encrypted transaction content data in the transaction body by using the decrypted encryption public key, namely, the transaction content data such as 'transfer amount 100' can be obtained by decryption, and the transaction receiver B can complete the transaction with the transaction initiator A on the blockchain according to the decrypted transaction content data.
Because the transaction body comprises the first encryption public key, the first encryption public key is generated by encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed node, and therefore, the first informed node C can decrypt the first encryption public key through the first private key of the first informed node C so as to obtain the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center. The first notifier node C may decrypt the encrypted transaction content data in the transaction body by using the decrypted encrypted public key, i.e. may decrypt the encrypted transaction content data to obtain the transaction content data, such as "transfer amount 100", so that the first notifier node C may know that the transaction is a transfer to B and know that the specific transfer amount 100 is a transfer.
For the second notifier node D, the public key of the second notifier node D is not encrypted in the transaction body, so that the second notifier node D cannot decrypt the encrypted transaction content data in the transaction body after receiving the transaction body, and the second notifier node D cannot learn the transaction content data such as the "transfer amount 100", thereby ensuring the privacy of the transaction data in the blockchain.
For the policer, since the dual key pair is prepared in advance: the signing secret key and the encryption secret key are obtained by the supervisor according to the supervision requirement, so that the supervisor can supervise the transaction body in the blockchain, for example, the supervisor can obtain transaction service data and decrypt the encrypted transaction content data in the transaction body to obtain the transaction content data, and judge whether the transaction service data and the transaction content data are legal or not. For example, the supervisor may be a CA center, and after the transaction initiator a applies for the encryption key pair from the CA center, the CA center stores the encryption key pair of the present transaction. When supervision is needed, the CA center acquires a transaction body generated by the transaction initiator A, and decrypts the encrypted transaction content data in the transaction body by utilizing the corresponding key in the stored encryption key pair of the transaction, so that the transaction service data is acquired as 'A is transferred to B', the transaction content data is acquired as 'transfer amount 100', and whether the transaction service data and the transaction content data are legal or not can be judged.
It should be noted that, the algorithm used in this embodiment adopts symmetric and asymmetric algorithms according to the service requirement, and the symmetric algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256 bits), DES, AES (128 bits), etc. Asymmetric algorithms include, but are not limited to: RSA (2048 bit), SM2 (domestic), ECC (210 bit), DH, DSA, RSA (1024 bit), and the like. Unidirectional (hash) algorithms include, but are not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5, etc. Wherein the symmetric algorithm is used for encryption, and the asymmetric algorithm and the hash algorithm are used for the hash value calculation process.
In addition, the present invention further provides a computer readable storage medium, where the computer readable storage medium stores a chain of alliance-based transaction monitoring system, where the chain of alliance-based transaction monitoring system may be executed by at least one processor, so that the at least one processor performs the steps of the chain of alliance-based transaction monitoring method in the above embodiment, where specific implementation procedures of steps S10, S20, S30, etc. of the chain of alliance-based transaction monitoring method are described above, and are not repeated herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The preferred embodiments of the present invention have been described above with reference to the accompanying drawings, and thus do not limit the scope of the claims of the present invention. The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments. In addition, while a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in a different order than is shown.
Those skilled in the art will appreciate that many modifications are possible in which the invention is practiced without departing from its scope or spirit, e.g., features of one embodiment can be used with another embodiment to yield yet a further embodiment. Any modification, equivalent replacement and improvement made within the technical idea of the present invention should be within the scope of the claims of the present invention.
Claims (9)
1. An electronic device comprising a memory, a processor, the memory having stored thereon a chain of alliance-based transaction monitoring system operable on the processor, the chain of alliance-based transaction monitoring system, when executed by the processor, performing the steps of:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key;
the encryption public key of the receiving party and a first encryption public key generated after a preset first knowledge party node encrypts the encryption public key in the encryption key pair by using the first public key form a transaction body;
based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; the first informed party node decrypts the first encryption public key through the first private key to obtain an encryption public key of the encryption key pair, and then decrypts the encrypted transaction content data in the transaction body by using the decrypted encryption public key to obtain transaction content data; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
2. The electronic device of claim 1, wherein the transaction information determined by the transaction initiator includes transaction business data and transaction content data, wherein the step of encrypting the transaction information determined by the transaction initiator on the coalition chain using an encryption private key of the encryption key pair, and generating the encrypted transaction data includes:
and encrypting the transaction content data in the transaction information by using an encryption private key in the encryption key pair to generate encrypted transaction content data.
3. The electronic device of claim 1, wherein the processor is further configured to execute the coalition chain based transaction management system to implement the steps of:
acquiring a preset signature key pair;
and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
4. An electronic device as claimed in claim 3, characterized in that:
after the transaction receiver receives the transaction body, firstly decrypting the encrypted hash value in the transaction body by using the signature public key in the signature key pair to obtain a decrypted hash value;
Calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value;
if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body;
if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
5. A chain of alliance-based transaction policing method, comprising:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
encrypting the transaction information determined by the transaction initiator on the alliance chain by using an encryption private key in the encryption key pair to generate encrypted transaction data;
encrypting the encryption public key in the encryption key pair by utilizing a receiver public key preset by a transaction receiver to generate a receiver encryption public key;
the encryption public key of the receiving party and a first encryption public key generated after a preset first knowledge party node encrypts the encryption public key in the encryption key pair by using the first public key form a transaction body;
Based on the transaction body, initiating a transaction on the alliance chain, so that the transaction receiver decrypts a receiver encryption public key in the transaction body through a preset receiver private key to obtain an encryption public key in the encryption key pair, decrypts encrypted transaction data in the transaction body by using the decrypted encryption public key to obtain determined transaction information, and completes the transaction with the transaction initiator; the first informed party node decrypts the first encryption public key through the first private key to obtain an encryption public key of the encryption key pair, and then decrypts the encrypted transaction content data in the transaction body by using the decrypted encryption public key to obtain transaction content data; and the supervision party decrypts the encrypted transaction data in the transaction body according to the encryption public key in the encryption key pair obtained by synchronization to obtain determined transaction information, and supervises the transaction information.
6. The federation chain-based transaction administration method according to claim 5, wherein the transaction information determined by the transaction initiator includes transaction service data and transaction content data, the step of encrypting the transaction information determined by the transaction initiator on the federation chain using the encryption private key of the encryption key pair, and generating encrypted transaction data includes:
And encrypting the transaction content data in the transaction information by using an encryption private key in the encryption key pair to generate encrypted transaction content data.
7. The federation chain-based transaction policing method of claim 5, further comprising:
acquiring a preset signature key pair;
and calculating a corresponding hash value of the whole transaction body by utilizing a hash algorithm, encrypting the hash value calculated by the whole transaction body by utilizing a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body.
8. The federation chain-based transaction policing method of claim 7, further comprising:
decrypting the encrypted hash value in the transaction body received by the transaction receiver by utilizing the public signature key in the public signature key pair to obtain a decrypted hash value;
calculating a corresponding hash value of a transaction body received by the transaction receiver by utilizing a hash algorithm, and comparing the calculated hash value with a decrypted hash value;
if the calculated hash value is the same as the decrypted hash value, completing the transaction between the transaction receiver and the transaction initiator based on the transaction body;
If the calculated hash value is different from the decrypted hash value, ending the transaction flow.
9. A computer readable storage medium having stored thereon a chain of alliance based transaction monitoring system which when executed by a processor implements the steps of the chain of alliance based transaction monitoring method of any of claims 5 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810618522.6A CN109034796B (en) | 2018-06-15 | 2018-06-15 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810618522.6A CN109034796B (en) | 2018-06-15 | 2018-06-15 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109034796A CN109034796A (en) | 2018-12-18 |
CN109034796B true CN109034796B (en) | 2023-09-22 |
Family
ID=64609745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810618522.6A Active CN109034796B (en) | 2018-06-15 | 2018-06-15 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109034796B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109816525A (en) * | 2018-12-27 | 2019-05-28 | 石更箭数据科技(上海)有限公司 | A kind of data processing method and its device, medium, terminal |
CN111698192B (en) * | 2019-03-13 | 2021-12-03 | 华为技术有限公司 | Method for monitoring transaction system, transaction device, monitoring device and system |
CN110458558A (en) * | 2019-07-04 | 2019-11-15 | 重庆金融资产交易所有限责任公司 | Data encryption method, device and computer equipment based on block chain |
CN110474908B (en) * | 2019-08-16 | 2022-04-05 | 广东省微位数字身份科技有限公司 | Transaction supervision method and device, storage medium and computer equipment |
CN110519059B (en) * | 2019-09-29 | 2023-05-05 | 四川师范大学 | Bilinear mapping-based block chain double-key hidden address processing method |
CN110855631B (en) * | 2019-10-24 | 2022-05-17 | 南京可信区块链与算法经济研究院有限公司 | Method, system and storage medium for verifying supervision-capable zero knowledge in block chain |
CN112749965B (en) * | 2019-10-30 | 2024-04-09 | 深圳市迅雷网络技术有限公司 | Information monitoring method, system, equipment and storage medium |
CN110808999B (en) * | 2019-11-12 | 2022-02-15 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium |
CN111177259A (en) * | 2019-12-13 | 2020-05-19 | 杭州复杂美科技有限公司 | Parallel chain transaction encryption method, device and storage medium |
CN112507363A (en) * | 2020-12-15 | 2021-03-16 | 平安科技(深圳)有限公司 | Data supervision method, device and equipment based on block chain and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184495A (en) * | 2011-04-21 | 2011-09-14 | 北京天地融科技有限公司 | Network payment method and system |
CN103108245A (en) * | 2011-11-15 | 2013-05-15 | 中国银联股份有限公司 | Smart television payment secret key system and payment method based on smart television |
CN104751364A (en) * | 2013-12-30 | 2015-07-01 | 上海方付通商务服务有限公司 | Security certification type trans-regional direct-selling bank alliance transaction method and system |
CN106534097A (en) * | 2016-10-27 | 2017-03-22 | 上海亿账通区块链科技有限公司 | Block chain trading based authority control method and system |
CN106685989A (en) * | 2017-02-07 | 2017-05-17 | 杭州秘猿科技有限公司 | Privacy communication method based on license chain support and supervision |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN107172074A (en) * | 2017-06-26 | 2017-09-15 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
JP2017204704A (en) * | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | Validity guarantee method, validity guarantee system and validity guarantee program |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107851111A (en) * | 2015-05-05 | 2018-03-27 | 识卡公司 | Use the identity management services of block chain |
US11188900B2 (en) * | 2016-12-01 | 2021-11-30 | Mastercard International Incorporated | Method and system for payment card verification via blockchain |
-
2018
- 2018-06-15 CN CN201810618522.6A patent/CN109034796B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184495A (en) * | 2011-04-21 | 2011-09-14 | 北京天地融科技有限公司 | Network payment method and system |
CN103108245A (en) * | 2011-11-15 | 2013-05-15 | 中国银联股份有限公司 | Smart television payment secret key system and payment method based on smart television |
CN104751364A (en) * | 2013-12-30 | 2015-07-01 | 上海方付通商务服务有限公司 | Security certification type trans-regional direct-selling bank alliance transaction method and system |
JP2017204704A (en) * | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | Validity guarantee method, validity guarantee system and validity guarantee program |
CN106534097A (en) * | 2016-10-27 | 2017-03-22 | 上海亿账通区块链科技有限公司 | Block chain trading based authority control method and system |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN106685989A (en) * | 2017-02-07 | 2017-05-17 | 杭州秘猿科技有限公司 | Privacy communication method based on license chain support and supervision |
CN107172074A (en) * | 2017-06-26 | 2017-09-15 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
Non-Patent Citations (4)
Title |
---|
Dianli Guo, 等.Adaptively Secure Broadcast Encryption With Constant Ciphertexts.《IEEE Transactions on Information Forensics and Security》.2016,第62卷(第3期),第709-715页. * |
Makoto Sato,等.Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.《Journal of Information Processing》.2016,第24卷(第1期),第2-8页. * |
孙媛媛.基于信任链的P2P可信身份认证模型的研究与设计.《中国优秀硕士学位论文全文数据库信息科技辑》.2016,(第03期),第I139-355页. * |
庹小忠.基于区块链的加密信息备份系统研究与设计.《中国优秀硕士学位论文全文数据库信息科技辑》.2018,(第01期),第I138-86页. * |
Also Published As
Publication number | Publication date |
---|---|
CN109034796A (en) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034796B (en) | Alliance chain-based transaction supervision method, electronic device and readable storage medium | |
CN109862041B (en) | Digital identity authentication method, equipment, device, system and storage medium | |
US10616213B2 (en) | Password manipulation for secure account creation and verification through third-party servers | |
CN105553951B (en) | Data transmission method and device | |
US9331989B2 (en) | Secure shared key sharing systems and methods | |
US20180234255A1 (en) | Method and system for distributing attestation key and certificate in trusted computing | |
CN110890962B (en) | Authentication key negotiation method, device, storage medium and equipment | |
CN110290108B (en) | Data processing method, system and related equipment in block chain network | |
TW202015378A (en) | Cryptographic operation method, method for creating work key, and cryptographic service platform and device | |
CN109547209B (en) | Two-party SM2 digital signature generation method | |
JP2010220212A (en) | Securing communications sent by first user to second user | |
AU2021271512A1 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
WO2017131775A1 (en) | Device attestation | |
WO2018112482A1 (en) | Method and system for distributing attestation key and certificate in trusted computing | |
JP2022521525A (en) | Cryptographic method for validating data | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN106161472A (en) | A kind of method of data encryption, Apparatus and system | |
CN111294203A (en) | Information transmission method | |
CN111161075B (en) | Blockchain transaction data proving and supervising method, system and related equipment | |
CN113556230A (en) | Data security transmission method, certificate correlation method, server, system and medium | |
CN104821884A (en) | Private key protection method based on asymmetric secret key system | |
CN111008400A (en) | Data processing method, device and system | |
EP3010173B1 (en) | Key storage device, key storage method, and program therefor | |
CN109510711B (en) | Network communication method, server, client and system | |
CN111460463A (en) | Electronic deposit certificate storage and notarization method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230825 Address after: 518000, Building 2410, Building 2, Research and Development Building 1 and 2, Fangda Plaza (Phase I), North Ring Avenue, Taoyuan Community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong Province Applicant after: Anda Data Technology (Shenzhen) Co.,Ltd. Address before: 400010 38 / F, 39 / F, unit 1, 99 Wuyi Road, Yuzhong District, Chongqing Applicant before: CHONGQING FINANCIAL ASSETS EXCHANGE Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |