CN110287254A - A kind of data trade method, apparatus and computer equipment based on alliance's chain - Google Patents
A kind of data trade method, apparatus and computer equipment based on alliance's chain Download PDFInfo
- Publication number
- CN110287254A CN110287254A CN201910383586.7A CN201910383586A CN110287254A CN 110287254 A CN110287254 A CN 110287254A CN 201910383586 A CN201910383586 A CN 201910383586A CN 110287254 A CN110287254 A CN 110287254A
- Authority
- CN
- China
- Prior art keywords
- data
- member node
- alliance
- chain
- trade
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of data trade method, apparatus and computer equipment based on alliance's chain, data trade method based on alliance's chain includes according to self-defined information template, it generates the first member node data and generates cryptographic Hash and outline data before data encryption by the data encryption, according to hash algorithm, then store the first member node data, cryptographic Hash and outline data into alliance's chain;According to the assessment rules in data template, is graded for the first time to the first member node data and reward on total mark is carried out to the first member node according to evaluation result;When the second member node in alliance's chain needs to obtain the first member node data, it is that second member node is possessed to exchange data for data equivalence integral, after ciphertext data, according to the integrality of hash algorithm verify data, and it can grade to the data, realize data trade.It solves to be unable to equality exchange information between enterprise, exchanges the authenticity of information, the problems such as safety cannot be guaranteed, information exchange logic complicated between enterprise is simplified.
Description
Technical field
The present invention, which discloses, is related to block chain technical field more particularly to a kind of data trade method based on alliance's chain, dress
It sets and computer equipment.
Background technique
Itself there are some valuable trade informations in the enterprise of same industry, itself preferably develops in order to allow, very
Multiple enterprises are intended to and go together and carry out the exchange of information, but how safe and reliable exchange these information, become these enterprises
A problem.The final purpose of the technical program is the information barrier between enterprise to be got through, and allowing between enterprise can be safe
The exchange information of equality.
Information exchange between current enterprise is more that a information, timeliness could be obtained after assessment by Bussiness Communications
Difference.In addition, the system architecture between different enterprises is different, exchanging information by internet also will receive many restrictions.Even if number
According to successfully exchanging, since each family is all centralized management oneself data, obtaining can not be effective to the judge of the information after data
Allow the whole network to know about.
Summary of the invention
The embodiment of the present invention exchanges the true of information to solve to be unable to equality exchange information between enterprise in the prior art
Property, safety the problems such as cannot be guaranteed, by can not the distorting of block chain, open fair characteristic, by number complicated between enterprise
Simplify according to exchange logic, while passing through the advantage of alliance's chain, the scope limitation of information will be exchanged in the member of alliance's chain.
One embodiment of the invention provides a kind of data trade method based on alliance's chain, and wherein alliance's chain includes multiple connects
Enter the member node of alliance's chain network, data trade method includes:
According to self-defining data template, generates the first member node data and given birth to by the data encryption, according to hash algorithm
At cryptographic Hash before data encryption and outline data, then the first member node data, cryptographic Hash and outline data are stored to connection
In alliance's chain;The wherein uniqueness of the true node data of cryptographic Hash, outline data are that data template is mentioned from the first member node data
The keyword of taking-up, such as data uplink time, place, upload data enterprise name information, facilitate the subsequent inspection to the data
Rope;
According to the assessment rules in data template, graded for the first time to the first member node data and according to the evaluation knot
Fruit carries out reward on total mark to the first member node;
When the second member node in alliance's chain needs to obtain the first member node data, the second member node is possessed
Exchange data for the integral of data equivalence, after ciphertext data, according to the integrality of hash algorithm verify data, to realize
Data trade.
Further, in data trade method provided in an embodiment of the present invention, the according to self-defining data template, is being generated
One member node data simultaneously will be before the step of the data encryption, further includes:
Receive the self-defining data template that third member node uploads;
After the member node of preset ratio approves data template, data template is published.
Further, in data trade method provided in an embodiment of the present invention, when the second member node in alliance's chain
It is that the second member node is possessed to exchange data for data equivalence integral when needing to obtain the first member node data, it solves
After ciphertext data, according to the integrality of hash algorithm verify data, thus after the step of realizing data trade, further includes:
It receives the second member node and data is evaluated again, calculate the data in real time in current Comprehensive Assessment knot
Fruit refers to the value of the data for the member node on alliance's chain.
Further, in data trade method provided in an embodiment of the present invention, when the second member node in alliance's chain needs
It is that the second member node is possessed to exchange data for data equivalence integral when obtaining the first member node data, it exposes
After data, according to the integrality of hash algorithm verify data, so that the step of realizing data trade specifically includes:
Receive the first member node data trade request of the second member node sending;
After the first member node knows data trade request, which is downloaded and decrypted from alliance's chain, is then made
The second member node is sent the data to ECDH Encryption Algorithm.
It is that the second member node is possessed to exchange number for data equivalence integral after the second member node obtains data
According to, and give integral to the first member node;
It, can be according to the integrality of hash algorithm verify data, to realize after the second member node carries out data deciphering
Data trade.
Further, in data trade method provided in an embodiment of the present invention, the assessment rules in data template include number
According to quality classification rule, data code of points and reward on total mark rule.
One embodiment of the invention provides a kind of data trade device, alliance's chain include multiple access alliance's chain networks at
Member's node, device include:
Encrypt memory module: for the first member node data being generated and adding the data according to self-defining data template
It is close, according to hash algorithm generate data encryption before cryptographic Hash and outline data, then by the first member node data, cryptographic Hash and
Outline data is stored into alliance's chain;
Assessment module for the first time: for according to the assessment rules in data template, to the first one-tenth of encryption memory module storage
Member's node data is graded for the first time and carries out reward on total mark to the first member node according to evaluation result;
Transaction modules, for needing to obtain the first one-tenth of encryption memory module storage when the second member node in alliance's chain
It is that the second member node is possessed to exchange data for data equivalence integral when member's node data, after ciphertext data, according to Kazakhstan
The integrality of uncommon proof of algorithm data, to realize data trade.
Further, data trade device further include:
Receiving module: for receiving the self-defining data template of third member node upload;
Release module: after approval for the member node when preset ratio to the received data template of receiving module,
Data template is published.
Further, data trade device further include:
Assessment module again: after data trade module realizes data trade, receive the second member node to data into
Row is evaluated again, calculates the data in real time in current Comprehensive Assessment as a result, for the member node on alliance's chain with reference to the number
According to value.
Further, data trade module includes:
Receiving unit: for receiving the first member node data trade request of the second member node sending;
Decryption re-encrypts unit: for inciting somebody to action after the first member node knows the received data trade request of receiving unit
The data are downloaded and are decrypted from alliance's chain, then send the data to the second member node using ECDH Encryption Algorithm;
Data trade unit: after the second member node, which gets encryption, re-encrypts the data of unit transmission, by the second one-tenth
Member's node possess with the integral of data equivalence to exchange data for, and integral is given to the first member node, in the second member section
After point carries out data deciphering, according to the integrality of hash algorithm verify data, to realize data trade.
One embodiment of the invention additionally provides a kind of computer readable storage medium for being stored with computer program, computer
Data trade method of any of the above-described based on alliance's chain is realized when program executes computer.
A kind of data trade method based on alliance's chain that one embodiment of the invention provides, is advised by self-defining data template
Model industry data rule, encrypts data by hash algorithm, it is ensured that and data safety can not distort, management assessment rules,
Guarantee the quality of transaction data.It solves to be unable to equality exchange information between enterprise in the prior art, exchanges authenticity, the peace of information
The problems such as full property cannot be guaranteed.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 2 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 3 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 4 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 5 is a kind of schematic diagram for data trade device based on alliance's chain that one embodiment of the invention provides;
Fig. 6 is a kind of schematic diagram for data trade device based on alliance's chain that one embodiment of the invention provides.
Specific embodiment
For technical problem to be solved of the embodiment of the present invention, technical solution and beneficial effect is more clearly understood, with
Lower combination accompanying drawings and embodiments, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein
It is only used to explain the present invention, be not intended to limit the present invention.
In being described below, for illustration and not for limitation, the tool of such as specific internal program, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate the technical solution of the embodiment of the present invention, the following is a description of specific embodiments.
The embodiment of the invention provides a kind of data trade method based on alliance's chain, Fig. 1 is that the embodiment of the present invention one mentions
The flow diagram of the data trade method based on alliance's chain supplied.As shown in Figure 1, the method for the present embodiment may include:
Step 101, according to self-defining data template, generate the first member node data and by the data encryption, according to Kazakhstan
Uncommon algorithm generates cryptographic Hash and outline data before data encryption, then by the first member node data, cryptographic Hash and outline data
It stores into alliance's chain;
The first member node is the enterprise A for needing to upload data in the present embodiment, and the enterprise is according to making by oneself in alliance's chain
Partial data in oneself system is generated report by adopted data template, and this report is the word for the reference format that template is specified
Symbol string, report generation process is locally generated in enterprise, generating mode by oneself it is internal determines, as long as report Final Format with
Data template is consistent.The data for uploading storage to alliance's chain include report, cryptographic Hash and outline data, and wherein cryptographic Hash is
It is automatically what data report generated by data template, for ensuring the uniqueness reported;Outline data is data template from enterprise
Data report in the keyword of the data report that extracts, mainly include the letter such as report generation time, place, enterprise name
Breath, facilitates the retrieval of this report to consult.
Step 102, according to the assessment rules in data template, grading and basis for the first time are carried out to the first member node data
Evaluation result carries out reward on total mark to the first member node;
According to the assessment rules in data template, the enterprise A data report uploaded is assessed, each project is compared
Sophistication initial results are provided according to rule: to enterprise A reward points M, while giving data report initial score N.
Step 103, when the second member node in alliance's chain needs to obtain the first member node data, by the second member
What node possessed exchanges data for the integral of data equivalence, after ciphertext data, according to the integrality of hash algorithm verify data,
To realize data trade.
The second member node is to need to buy the enterprise B of data report in the present embodiment, and enterprise B passes through block chain browser
The report for finding enterprise A publication judges whether it is report required for oneself by outline data, after determining purchase, initiates purchase
Information is bought, payment enterprise A is the integral of this report setting;After enterprise A discovery has the purchase of other enterprises, corresponding encryption number is downloaded
According to by Encryption Algorithm such as ecdh, passing data to enterprise B after decryption;After enterprise B obtains the data report, pass through Hash
After the integrality of proof of algorithm data, data trade process is completed.
In the present embodiment, enterprise stores the data encryption of oneself into alliance's chain according to customized data template, and
It is encrypted according to hash algorithm;Alliance's chain is evaluated according to data template assessment rules, to data report and gives reward
Integral;When member in alliance's chain obtains data, pass through the authenticity of hash algorithm verify data.By aforesaid operations, by
Alliance's chain realizes information trading between enterprise, solves to be unable to equality exchange information between enterprise in the prior art, exchanges the true of information
The problems such as reality, safety cannot be guaranteed guarantees equality exchange and data trade amount safety between each enterprise;It borrows simultaneously
Can not distorting, disclosing fair characteristic for block chain is helped, data exchange logic complicated between enterprise is simplified, while passing through connection
The advantage of alliance's chain will exchange the scope limitation of information in the member of alliance's chain.
As shown in Fig. 2, in the present embodiment, according to self-defining data template, the first member node data of generation simultaneously will
Before the step of data encryption, further includes:
Step 201, the self-defining data template that third member node uploads is received;
Step 202, after the member node of preset ratio approves data template, data template is subjected to open hair
Cloth.
Member in alliance's chain belongs to same field, therefore, can be formulated by wherein member a data template and
Then executing rule publishes in chain alliance, before publication, remaining member of alliance will assess data template, at
After 2/3 member approves the data template in member, can successfully it be issued in alliance's chain.
Executing rule mainly includes quality of data grading rule, data code of points, reward on total mark rule.
The quality of data grading rule, for guaranteeing the quality of data, for example, be arranged it is excellent, good, in, poor four ranks;
Data code of points be used to ensure data grading can dynamic change, such as:
90-100 points are excellent in code of points;80-89 points are good;During 60-79 point is;60 points the following are differences.
The data are rated in member 1 excellent, corresponding record is 95 points;It is 80 points that member 2, which carries out scoring to it, at this time
To the new scoring of the data in chain are as follows: (80+95)/2=87.5 points, therefore the data are recorded new grading in chain: it is good;Number
The data that can guarantee, which are changed, according to scoring obtains higher grading.
Reward on total mark stock is then the data for motivating alliance chain member actively to upload high quality, is given according to grading to data
Reward on total mark is given, the integral of acquisition can be used to exchange the data of other members publication.
In the present embodiment, by first defining data template, when data template by most of nodes approval after, be published to
On alliance's chain, subsequent node is carried out when uploading data according to data template predetermined, to guarantee the uniformity of data format;
It is graded by the setting quality of data, ensure that the quality of data;By the way that specific data code of points is arranged, data grading is realized
The survival of the fittest, further node is motivated to provide more good data informations.
As shown in Fig. 3, when the second member node in alliance's chain needs to obtain the first member node data, by
What two member nodes possessed exchanges data for the integral of data equivalence, after ciphertext data, according to hash algorithm verify data
Integrality, thus after the step of realizing data trade, further includes:
Step 306, it receives the second member node to evaluate data again, calculates the data in real time current comprehensive
Evaluation result is closed, the value of the data is referred to for the member node on alliance's chain.
After enterprise B buys data report, according to report content, judge whether the data information in report is accurate and reliable,
The position for finding publisher's this report in chain gives this report new scoring T.After scoring, it can trigger in alliance's chain to publication
The whole new scoring in side.Alliance's chain summarizes all scorings, generates an average mark, carries out ranking to report according to average mark, puts down
Respectively high report, the quality of data and with a high credibility check to obtain better data information convenient for other enterprises.
In the present embodiment, after the second member node checks data report, the reliability of information is voluntarily judged, while to report
Accepted opinion point is given again, this, which scores, generates a new scoring with the average mark to score before, so that data report generation is new
Ranking guarantee that the report quality of enterprise's purchase is more reliable by evaluating again, promote the equality of information trading and true
Property.
As shown in Fig. 4, when the second member node in alliance's chain needs to obtain data, the second member node is possessed
Data are exchanged for the integral of data equivalence, after ciphertext data, according to the integrality of hash algorithm verify data, to realize number
According to transaction, specifically include that
Step 401, the first member node data trade request that the second member node issues is received;
Step 402, after the first member node knows data trade request, which is downloaded and is solved from alliance's chain
It is close, then the second member node is sent the data to using ECDH Encryption Algorithm.
Step 403, after the second member node obtains data, the integral with data equivalence that the second member node is possessed
To exchange data for, and give integral to the first member node;
Step 404, the second member node carry out data deciphering after, can according to the integrality of hash algorithm verify data,
To realize data trade.
When enterprise B needs to buy this report, purchaser provides the public key of oneself, and using integral V, (integral V is on enterprise A
The value set when passing data report) it is exchanged, it is at this time lock state, waits publisher's response;Publisher has found that report has
After enterprise's purchase, the key confirmation purchasing process is inputted, can trigger following behavior on chain at this time: publisher should using key decryption
Report, using public key encryption this report of purchaser, the report after re-encrypted is stored in alliance's chain, and purchaser has found report
The function that accomplishes purchase, data are fetched from chain, decrypt the data using the private key of oneself;Whole process is all the mechanism inside chain,
It can ensure that data were not tampered with.
The data trade method based on alliance's chain in the present embodiment, from report publisher to report purchaser, Suo Youhang
All be to be operated in chain, avoid centralization bring data unreliability, by scoring, when have a large amount of enterprises or
When person individual participates in, the quality of report and publisher will select the superior and eliminate the inferior, in this way a decentralization mode, final energy
Good report is found in chain, provides good service for enterprise.Fraction is exchanged by setting, integral transfer is realized, guarantees
Information Equity reliably exchanges between enterprise.
The embodiment of the present invention provides a kind of data trade device based on alliance's chain, and Fig. 5 is provided in this embodiment is based on
The data trade device of alliance's chain, the device in the present embodiment may include,
501 encryption memory modules: generating the first member node data and generates number by the data encryption, according to hash algorithm
According to cryptographic Hash and outline data before encrypting, then the first member node data, cryptographic Hash and outline data are stored to alliance's chain
In;
502 assessment modules for the first time: for according to the assessment rules in data template, to the first of encryption memory module storage
Member node data are graded for the first time and carry out reward on total mark to the first member node according to evaluation result;
503 transaction modules need to obtain the of encryption memory module storage for the second member node in alliance's chain
It is that the second member node is possessed to exchange data for data equivalence integral when one member node data, after ciphertext data, root
According to the integrality of hash algorithm verify data, to realize data trade.
As shown in Fig. 6, can also include:
Receiving module 601: for receiving the self-defining data template of third member node upload;
Release module 602: the received data template of receiving module is approved for the member node when preset ratio
Afterwards, data template is published;
Assessment module 606 again: after data trade module realizes data trade, the second member node is received to data
It is evaluated again, calculates the data in real time in current Comprehensive Assessment as a result, should for the member node reference on alliance's chain
The value of data.
Wherein transaction modules include:
Receiving unit 6051: the request of data and the integral for exchanging data equivalence for that the second member node issues, number are received
According to containing the public key of the second member node in request;
Decryption re-encrypts unit 6052: after the first member node knows the received request of data of receiving unit, to data
It is decrypted, and carries out re-encrypted using the public key of the second member node and store into alliance's chain;
Data redemption unit 6053:, will when the second member node, which obtains decryption, re-encrypts the data of unit re-encrypted
What the second member node possessed exchanges data for the integral of data equivalence, after data deciphering, verifies number according to hash algorithm
According to authenticity, to realize data trade.
The embodiment of the invention provides a kind of electronic equipment, including memory and processor storage for store one or
A plurality of computer instruction, wherein one or more computer instruction is executed by processor the base to realize any of the above-described embodiment
In the data trade method of alliance's chain.
The embodiment of the invention also provides a kind of computer readable storage medium, computer-readable recording medium storage has meter
The data trade based on alliance's chain of any of the above-described embodiment may be implemented in calculation machine program when computer program executes computer
Method.It is apparent to those skilled in the art that for convenience and simplicity of description, the tool of the device of foregoing description
Body running process, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Illustratively, computer program can be divided into one or more module/units, and one or more module/
Unit is stored in memory, and is executed by processor, to complete the present invention.One or more module/units can be energy
The series of computation machine program instruction section of specific function is enough completed, the instruction segment is for describing computer program in computer equipment
In implementation procedure.
Computer equipment can be desktop PC, notebook, palm PC and cloud server etc. and calculate equipment.Meter
Calculating machine equipment may include, but be not limited only to, processor, memory.It will be understood by those skilled in the art that the present embodiment is only
The example of computer equipment does not constitute the restriction to computer equipment, may include components more more or fewer than diagram, or
Person combines certain components or different components, such as computer equipment can also be set including input-output equipment, network insertion
Standby, bus etc..
Processor can be central processing unit (Central Processing Unit, CPU), can also be that other are logical
With processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
Memory can be the internal storage unit of computer equipment, such as the hard disk or memory of computer equipment.Storage
Device is also possible to the External memory equipment of computer equipment, such as the plug-in type hard disk being equipped in computer equipment, intelligent storage
Block (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..
Further, memory can also both including computer equipment internal storage unit and also including External memory equipment.Memory
For storing other programs and data needed for computer program and computer equipment.Memory can be also used for temporarily depositing
Store up the data that has exported or will export.
The embodiment of the invention also provides a kind of computer readable storage medium for being stored with computer program, computer journeys
The data trade method based on alliance's chain of any of the above-described is realized when sequence executes computer.
Specific embodiments of the present invention are described in detail above.It should be appreciated that those skilled in the art are without wound
The property made labour, which according to the present invention can conceive, makes many modifications and variations.Therefore, all technician in the art
Pass through the available technology of logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea
Scheme, all should be within the scope of protection determined by the claims.
Claims (10)
1. a kind of data trade method based on alliance's chain, alliance's chain includes member's section of multiple access alliance's chain networks
Point, which is characterized in that the described method includes:
According to self-defining data template, generates the first member node data and generate number by the data encryption, according to hash algorithm
According to cryptographic Hash and outline data before encrypting, then the first member node data, cryptographic Hash and outline data are stored to connection
In alliance's chain;
According to the assessment rules in the data template, graded and the first member node data according to evaluation for the first time
As a result reward on total mark is carried out to first member node;
When the second member node in alliance's chain needs to obtain the first member node data, by second member
What node possessed exchanges the data for the integral of the data equivalence, after ciphertext data, verified according to hash algorithm described in
The integrality of data, to realize data trade.
2. data trade method according to claim 1, which is characterized in that raw described according to self-defining data template
At the first member node data and will be before the step of the data encryption, further includes:
Receive the self-defining data template that third member node uploads;
After the member node of preset ratio approves the data template, the data template is published.
3. data trade method according to claim 1, which is characterized in that in the second one-tenth when in alliance's chain
Member's node is when needing to obtain the first member node data, and what second member node was possessed is equivalent with the data
Integral exchanges the data for, after ciphertext data, the integrality of the data is verified according to hash algorithm, to realize that data are handed over
After easy step, further includes:
It receives second member node to evaluate the data again, calculates the data in real time and commented in current synthesis
Determine as a result, referring to the value of the data for the member node on alliance's chain.
4. the method according to claim 1, wherein second member node when in alliance's chain needs
It is that second member node is possessed to exchange for the data equivalence integral when obtaining the first member node data
The data after ciphertext data, the integrality of the data are verified according to hash algorithm, thus the step of realizing data trade tool
Body includes:
Receive the first member node data trade request of the second member node sending;
After the first member node knows the data trade request, which is downloaded and decrypted from alliance's chain, is then made
The second member node is sent the data to ECDH Encryption Algorithm;
When second member node obtains the data after, what second member node was possessed is equivalent with the data
Integral gives the integral to first member node to exchange the data for;
After the second member node carries out data deciphering, the integrality of the data can be verified according to hash algorithm, to realize
Data trade.
5. data trade method according to any one of claims 1 to 4, which is characterized in that in the data template
Assessment rules include quality of data grading rule, data code of points and reward on total mark rule.
6. a kind of data trade device based on alliance's chain, alliance's chain includes the member of multiple access alliance's chain networks
Node, which is characterized in that described device includes:
Encrypt memory module: for according to self-defining data template, generating the first member node data and by the data encryption, root
According to hash algorithm generate data encryption before cryptographic Hash and outline data, then by the first member node data, cryptographic Hash and
Outline data is stored into alliance's chain;
Assessment module for the first time: for according to the assessment rules in data template, to the first one-tenth of the encryption memory module storage
Member's node data is graded for the first time and carries out reward on total mark to first member node according to evaluation result;
Transaction modules need to obtain the of the encryption memory module storage for the second member node in alliance's chain
It is that second member node is possessed to exchange the data for the data equivalence integral when one member node data,
After ciphertext data, the integrality of the data is verified according to hash algorithm, to realize data trade.
7. device according to claim 6, which is characterized in that described device further include:
Receiving module: for receiving the self-defining data template of third member node upload;
Release module: after approval for the member node when preset ratio to the received data template of the receiving module,
The data template is published.
8. device according to claim 6, which is characterized in that described device further include:
Assessment module again: after the data trade module realizes data trade, second member node is received to institute
It states data to be evaluated again, calculates the data in real time in current Comprehensive Assessment as a result, for the member node on alliance's chain
With reference to the value of the data.
9. device according to claim 6, which is characterized in that the data trade module includes:
Receiving unit: for receiving the first member node data trade request of the second member node sending;
Decryption re-encrypts unit: for inciting somebody to action after the first member node knows the received data trade request of the receiving unit
The data are downloaded and are decrypted from alliance's chain, then send the data to the second member node using ECDH Encryption Algorithm;
Data trade unit: after second member node, which gets the encryption, re-encrypts the data of unit transmission, by institute
State it is that the second member node possesses exchange the data for data equivalence integral, and give described for the integral
One member node, after the second member node carries out data deciphering, the integrality of the data is verified according to hash algorithm, from
And realize data trade.
10. a kind of computer readable storage medium for being stored with computer program, which is characterized in that the computer program is counted
The data trade method based on alliance's chain stated such as any one of Claims 1-4 is realized when calculation machine executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910383586.7A CN110287254B (en) | 2019-05-08 | 2019-05-08 | Data transaction method and device based on alliance chain and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910383586.7A CN110287254B (en) | 2019-05-08 | 2019-05-08 | Data transaction method and device based on alliance chain and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110287254A true CN110287254A (en) | 2019-09-27 |
CN110287254B CN110287254B (en) | 2021-08-20 |
Family
ID=68001654
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910383586.7A Active CN110287254B (en) | 2019-05-08 | 2019-05-08 | Data transaction method and device based on alliance chain and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110287254B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111475580A (en) * | 2020-04-21 | 2020-07-31 | 吴海娟 | Data sharing method and system in alliance chain |
CN113496762A (en) * | 2021-05-20 | 2021-10-12 | 山东大学 | Biological gene sequence summary data generation method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180276668A1 (en) * | 2017-03-24 | 2018-09-27 | Alibaba Group Holding Limited | Method and apparatus for consensus verification |
CN108650270A (en) * | 2018-05-16 | 2018-10-12 | 苏宁易购集团股份有限公司 | Data sharing method based on alliance's chain and incentive mechanism and system |
CN109472596A (en) * | 2018-10-16 | 2019-03-15 | 中国传媒大学 | Alliance's chain common recognition method and system based on transaction assessment |
CN109509092A (en) * | 2018-10-16 | 2019-03-22 | 中国传媒大学 | Data trade motivational techniques and system based on alliance's chain |
-
2019
- 2019-05-08 CN CN201910383586.7A patent/CN110287254B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180276668A1 (en) * | 2017-03-24 | 2018-09-27 | Alibaba Group Holding Limited | Method and apparatus for consensus verification |
CN108650270A (en) * | 2018-05-16 | 2018-10-12 | 苏宁易购集团股份有限公司 | Data sharing method based on alliance's chain and incentive mechanism and system |
CN109472596A (en) * | 2018-10-16 | 2019-03-15 | 中国传媒大学 | Alliance's chain common recognition method and system based on transaction assessment |
CN109509092A (en) * | 2018-10-16 | 2019-03-22 | 中国传媒大学 | Data trade motivational techniques and system based on alliance's chain |
Non-Patent Citations (1)
Title |
---|
樊涛 等: "" 基于区块链技术的积分通兑平台"", 《2017电力行业信息化年会论文集 》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111475580A (en) * | 2020-04-21 | 2020-07-31 | 吴海娟 | Data sharing method and system in alliance chain |
CN113496762A (en) * | 2021-05-20 | 2021-10-12 | 山东大学 | Biological gene sequence summary data generation method and system |
CN113496762B (en) * | 2021-05-20 | 2022-09-27 | 山东大学 | Biological gene sequence summary data generation method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110287254B (en) | 2021-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109889504B (en) | Decentralized data access right transaction method and system | |
CN112132198B (en) | Data processing method, device and system and server | |
CN108197891B (en) | Electronic signing device and method based on block chain | |
EP3449451B1 (en) | Implementing logic gate functionality using a blockchain | |
CN113159327B (en) | Model training method and device based on federal learning system and electronic equipment | |
ES2957843T3 (en) | Verification of data processes in a network of computing resources | |
CN109472164A (en) | The verification method and its network and electronic equipment of contract dataset | |
CN109410076A (en) | Agricultural product based on block chain technology, which are traced to the source, insures public service platform | |
CN109155036A (en) | System and method for controlling asset-related actions via blockchain | |
CN109191003A (en) | Fruits and vegetables agricultural product quality safety traceability system based on block chain | |
CN106650495B (en) | File verification method and device | |
CN107292181A (en) | Database Systems based on block chain and the application method using the system | |
CN109299943A (en) | A kind of method and device of the intellectual property transaction based on block chain | |
CN106971302A (en) | A kind of threedimensional model based on block chain technology is really weighed and method of commerce | |
CN109491965A (en) | The storage method and its network and electronic equipment of purchase sale of electricity contract | |
US11133936B1 (en) | Methods and systems for introducing self-contained intent functionality into decentralized computer networks | |
CN108932410A (en) | A kind of digital resource copyright method for authenticating, device, system and storage medium | |
Cook et al. | Blockchain: Transforming the seafood supply chain | |
CN112613956B (en) | Bidding processing method and device | |
JP2019175417A (en) | Power transaction system | |
CN110148003A (en) | A kind of carbon emissions trading method and system | |
CN109905360A (en) | Data verification method and terminal device | |
CN109815289A (en) | Block generation method, calculating equipment, storage medium for block chain network | |
CN107743065A (en) | Battery uses verification method, battery system and automobile | |
US20240137280A1 (en) | Methods and systems for introducing self-contained intent functionality into decentralized computer networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |