CN110287254A - A kind of data trade method, apparatus and computer equipment based on alliance's chain - Google Patents

A kind of data trade method, apparatus and computer equipment based on alliance's chain Download PDF

Info

Publication number
CN110287254A
CN110287254A CN201910383586.7A CN201910383586A CN110287254A CN 110287254 A CN110287254 A CN 110287254A CN 201910383586 A CN201910383586 A CN 201910383586A CN 110287254 A CN110287254 A CN 110287254A
Authority
CN
China
Prior art keywords
data
member node
alliance
chain
trade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910383586.7A
Other languages
Chinese (zh)
Other versions
CN110287254B (en
Inventor
武健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Sangio Software Co Ltd
Original Assignee
Hangzhou Sangio Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Sangio Software Co Ltd filed Critical Hangzhou Sangio Software Co Ltd
Priority to CN201910383586.7A priority Critical patent/CN110287254B/en
Publication of CN110287254A publication Critical patent/CN110287254A/en
Application granted granted Critical
Publication of CN110287254B publication Critical patent/CN110287254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of data trade method, apparatus and computer equipment based on alliance's chain, data trade method based on alliance's chain includes according to self-defined information template, it generates the first member node data and generates cryptographic Hash and outline data before data encryption by the data encryption, according to hash algorithm, then store the first member node data, cryptographic Hash and outline data into alliance's chain;According to the assessment rules in data template, is graded for the first time to the first member node data and reward on total mark is carried out to the first member node according to evaluation result;When the second member node in alliance's chain needs to obtain the first member node data, it is that second member node is possessed to exchange data for data equivalence integral, after ciphertext data, according to the integrality of hash algorithm verify data, and it can grade to the data, realize data trade.It solves to be unable to equality exchange information between enterprise, exchanges the authenticity of information, the problems such as safety cannot be guaranteed, information exchange logic complicated between enterprise is simplified.

Description

A kind of data trade method, apparatus and computer equipment based on alliance's chain
Technical field
The present invention, which discloses, is related to block chain technical field more particularly to a kind of data trade method based on alliance's chain, dress It sets and computer equipment.
Background technique
Itself there are some valuable trade informations in the enterprise of same industry, itself preferably develops in order to allow, very Multiple enterprises are intended to and go together and carry out the exchange of information, but how safe and reliable exchange these information, become these enterprises A problem.The final purpose of the technical program is the information barrier between enterprise to be got through, and allowing between enterprise can be safe The exchange information of equality.
Information exchange between current enterprise is more that a information, timeliness could be obtained after assessment by Bussiness Communications Difference.In addition, the system architecture between different enterprises is different, exchanging information by internet also will receive many restrictions.Even if number According to successfully exchanging, since each family is all centralized management oneself data, obtaining can not be effective to the judge of the information after data Allow the whole network to know about.
Summary of the invention
The embodiment of the present invention exchanges the true of information to solve to be unable to equality exchange information between enterprise in the prior art Property, safety the problems such as cannot be guaranteed, by can not the distorting of block chain, open fair characteristic, by number complicated between enterprise Simplify according to exchange logic, while passing through the advantage of alliance's chain, the scope limitation of information will be exchanged in the member of alliance's chain.
One embodiment of the invention provides a kind of data trade method based on alliance's chain, and wherein alliance's chain includes multiple connects Enter the member node of alliance's chain network, data trade method includes:
According to self-defining data template, generates the first member node data and given birth to by the data encryption, according to hash algorithm At cryptographic Hash before data encryption and outline data, then the first member node data, cryptographic Hash and outline data are stored to connection In alliance's chain;The wherein uniqueness of the true node data of cryptographic Hash, outline data are that data template is mentioned from the first member node data The keyword of taking-up, such as data uplink time, place, upload data enterprise name information, facilitate the subsequent inspection to the data Rope;
According to the assessment rules in data template, graded for the first time to the first member node data and according to the evaluation knot Fruit carries out reward on total mark to the first member node;
When the second member node in alliance's chain needs to obtain the first member node data, the second member node is possessed Exchange data for the integral of data equivalence, after ciphertext data, according to the integrality of hash algorithm verify data, to realize Data trade.
Further, in data trade method provided in an embodiment of the present invention, the according to self-defining data template, is being generated One member node data simultaneously will be before the step of the data encryption, further includes:
Receive the self-defining data template that third member node uploads;
After the member node of preset ratio approves data template, data template is published.
Further, in data trade method provided in an embodiment of the present invention, when the second member node in alliance's chain It is that the second member node is possessed to exchange data for data equivalence integral when needing to obtain the first member node data, it solves After ciphertext data, according to the integrality of hash algorithm verify data, thus after the step of realizing data trade, further includes:
It receives the second member node and data is evaluated again, calculate the data in real time in current Comprehensive Assessment knot Fruit refers to the value of the data for the member node on alliance's chain.
Further, in data trade method provided in an embodiment of the present invention, when the second member node in alliance's chain needs It is that the second member node is possessed to exchange data for data equivalence integral when obtaining the first member node data, it exposes After data, according to the integrality of hash algorithm verify data, so that the step of realizing data trade specifically includes:
Receive the first member node data trade request of the second member node sending;
After the first member node knows data trade request, which is downloaded and decrypted from alliance's chain, is then made The second member node is sent the data to ECDH Encryption Algorithm.
It is that the second member node is possessed to exchange number for data equivalence integral after the second member node obtains data According to, and give integral to the first member node;
It, can be according to the integrality of hash algorithm verify data, to realize after the second member node carries out data deciphering Data trade.
Further, in data trade method provided in an embodiment of the present invention, the assessment rules in data template include number According to quality classification rule, data code of points and reward on total mark rule.
One embodiment of the invention provides a kind of data trade device, alliance's chain include multiple access alliance's chain networks at Member's node, device include:
Encrypt memory module: for the first member node data being generated and adding the data according to self-defining data template It is close, according to hash algorithm generate data encryption before cryptographic Hash and outline data, then by the first member node data, cryptographic Hash and Outline data is stored into alliance's chain;
Assessment module for the first time: for according to the assessment rules in data template, to the first one-tenth of encryption memory module storage Member's node data is graded for the first time and carries out reward on total mark to the first member node according to evaluation result;
Transaction modules, for needing to obtain the first one-tenth of encryption memory module storage when the second member node in alliance's chain It is that the second member node is possessed to exchange data for data equivalence integral when member's node data, after ciphertext data, according to Kazakhstan The integrality of uncommon proof of algorithm data, to realize data trade.
Further, data trade device further include:
Receiving module: for receiving the self-defining data template of third member node upload;
Release module: after approval for the member node when preset ratio to the received data template of receiving module, Data template is published.
Further, data trade device further include:
Assessment module again: after data trade module realizes data trade, receive the second member node to data into Row is evaluated again, calculates the data in real time in current Comprehensive Assessment as a result, for the member node on alliance's chain with reference to the number According to value.
Further, data trade module includes:
Receiving unit: for receiving the first member node data trade request of the second member node sending;
Decryption re-encrypts unit: for inciting somebody to action after the first member node knows the received data trade request of receiving unit The data are downloaded and are decrypted from alliance's chain, then send the data to the second member node using ECDH Encryption Algorithm;
Data trade unit: after the second member node, which gets encryption, re-encrypts the data of unit transmission, by the second one-tenth Member's node possess with the integral of data equivalence to exchange data for, and integral is given to the first member node, in the second member section After point carries out data deciphering, according to the integrality of hash algorithm verify data, to realize data trade.
One embodiment of the invention additionally provides a kind of computer readable storage medium for being stored with computer program, computer Data trade method of any of the above-described based on alliance's chain is realized when program executes computer.
A kind of data trade method based on alliance's chain that one embodiment of the invention provides, is advised by self-defining data template Model industry data rule, encrypts data by hash algorithm, it is ensured that and data safety can not distort, management assessment rules, Guarantee the quality of transaction data.It solves to be unable to equality exchange information between enterprise in the prior art, exchanges authenticity, the peace of information The problems such as full property cannot be guaranteed.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 2 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 3 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 4 is a kind of flow diagram for data trade method based on alliance's chain that one embodiment of the invention provides;
Fig. 5 is a kind of schematic diagram for data trade device based on alliance's chain that one embodiment of the invention provides;
Fig. 6 is a kind of schematic diagram for data trade device based on alliance's chain that one embodiment of the invention provides.
Specific embodiment
For technical problem to be solved of the embodiment of the present invention, technical solution and beneficial effect is more clearly understood, with Lower combination accompanying drawings and embodiments, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein It is only used to explain the present invention, be not intended to limit the present invention.
In being described below, for illustration and not for limitation, the tool of such as specific internal program, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate the technical solution of the embodiment of the present invention, the following is a description of specific embodiments.
The embodiment of the invention provides a kind of data trade method based on alliance's chain, Fig. 1 is that the embodiment of the present invention one mentions The flow diagram of the data trade method based on alliance's chain supplied.As shown in Figure 1, the method for the present embodiment may include:
Step 101, according to self-defining data template, generate the first member node data and by the data encryption, according to Kazakhstan Uncommon algorithm generates cryptographic Hash and outline data before data encryption, then by the first member node data, cryptographic Hash and outline data It stores into alliance's chain;
The first member node is the enterprise A for needing to upload data in the present embodiment, and the enterprise is according to making by oneself in alliance's chain Partial data in oneself system is generated report by adopted data template, and this report is the word for the reference format that template is specified Symbol string, report generation process is locally generated in enterprise, generating mode by oneself it is internal determines, as long as report Final Format with Data template is consistent.The data for uploading storage to alliance's chain include report, cryptographic Hash and outline data, and wherein cryptographic Hash is It is automatically what data report generated by data template, for ensuring the uniqueness reported;Outline data is data template from enterprise Data report in the keyword of the data report that extracts, mainly include the letter such as report generation time, place, enterprise name Breath, facilitates the retrieval of this report to consult.
Step 102, according to the assessment rules in data template, grading and basis for the first time are carried out to the first member node data Evaluation result carries out reward on total mark to the first member node;
According to the assessment rules in data template, the enterprise A data report uploaded is assessed, each project is compared Sophistication initial results are provided according to rule: to enterprise A reward points M, while giving data report initial score N.
Step 103, when the second member node in alliance's chain needs to obtain the first member node data, by the second member What node possessed exchanges data for the integral of data equivalence, after ciphertext data, according to the integrality of hash algorithm verify data, To realize data trade.
The second member node is to need to buy the enterprise B of data report in the present embodiment, and enterprise B passes through block chain browser The report for finding enterprise A publication judges whether it is report required for oneself by outline data, after determining purchase, initiates purchase Information is bought, payment enterprise A is the integral of this report setting;After enterprise A discovery has the purchase of other enterprises, corresponding encryption number is downloaded According to by Encryption Algorithm such as ecdh, passing data to enterprise B after decryption;After enterprise B obtains the data report, pass through Hash After the integrality of proof of algorithm data, data trade process is completed.
In the present embodiment, enterprise stores the data encryption of oneself into alliance's chain according to customized data template, and It is encrypted according to hash algorithm;Alliance's chain is evaluated according to data template assessment rules, to data report and gives reward Integral;When member in alliance's chain obtains data, pass through the authenticity of hash algorithm verify data.By aforesaid operations, by Alliance's chain realizes information trading between enterprise, solves to be unable to equality exchange information between enterprise in the prior art, exchanges the true of information The problems such as reality, safety cannot be guaranteed guarantees equality exchange and data trade amount safety between each enterprise;It borrows simultaneously Can not distorting, disclosing fair characteristic for block chain is helped, data exchange logic complicated between enterprise is simplified, while passing through connection The advantage of alliance's chain will exchange the scope limitation of information in the member of alliance's chain.
As shown in Fig. 2, in the present embodiment, according to self-defining data template, the first member node data of generation simultaneously will Before the step of data encryption, further includes:
Step 201, the self-defining data template that third member node uploads is received;
Step 202, after the member node of preset ratio approves data template, data template is subjected to open hair Cloth.
Member in alliance's chain belongs to same field, therefore, can be formulated by wherein member a data template and Then executing rule publishes in chain alliance, before publication, remaining member of alliance will assess data template, at After 2/3 member approves the data template in member, can successfully it be issued in alliance's chain.
Executing rule mainly includes quality of data grading rule, data code of points, reward on total mark rule.
The quality of data grading rule, for guaranteeing the quality of data, for example, be arranged it is excellent, good, in, poor four ranks;
Data code of points be used to ensure data grading can dynamic change, such as:
90-100 points are excellent in code of points;80-89 points are good;During 60-79 point is;60 points the following are differences.
The data are rated in member 1 excellent, corresponding record is 95 points;It is 80 points that member 2, which carries out scoring to it, at this time To the new scoring of the data in chain are as follows: (80+95)/2=87.5 points, therefore the data are recorded new grading in chain: it is good;Number The data that can guarantee, which are changed, according to scoring obtains higher grading.
Reward on total mark stock is then the data for motivating alliance chain member actively to upload high quality, is given according to grading to data Reward on total mark is given, the integral of acquisition can be used to exchange the data of other members publication.
In the present embodiment, by first defining data template, when data template by most of nodes approval after, be published to On alliance's chain, subsequent node is carried out when uploading data according to data template predetermined, to guarantee the uniformity of data format; It is graded by the setting quality of data, ensure that the quality of data;By the way that specific data code of points is arranged, data grading is realized The survival of the fittest, further node is motivated to provide more good data informations.
As shown in Fig. 3, when the second member node in alliance's chain needs to obtain the first member node data, by What two member nodes possessed exchanges data for the integral of data equivalence, after ciphertext data, according to hash algorithm verify data Integrality, thus after the step of realizing data trade, further includes:
Step 306, it receives the second member node to evaluate data again, calculates the data in real time current comprehensive Evaluation result is closed, the value of the data is referred to for the member node on alliance's chain.
After enterprise B buys data report, according to report content, judge whether the data information in report is accurate and reliable, The position for finding publisher's this report in chain gives this report new scoring T.After scoring, it can trigger in alliance's chain to publication The whole new scoring in side.Alliance's chain summarizes all scorings, generates an average mark, carries out ranking to report according to average mark, puts down Respectively high report, the quality of data and with a high credibility check to obtain better data information convenient for other enterprises.
In the present embodiment, after the second member node checks data report, the reliability of information is voluntarily judged, while to report Accepted opinion point is given again, this, which scores, generates a new scoring with the average mark to score before, so that data report generation is new Ranking guarantee that the report quality of enterprise's purchase is more reliable by evaluating again, promote the equality of information trading and true Property.
As shown in Fig. 4, when the second member node in alliance's chain needs to obtain data, the second member node is possessed Data are exchanged for the integral of data equivalence, after ciphertext data, according to the integrality of hash algorithm verify data, to realize number According to transaction, specifically include that
Step 401, the first member node data trade request that the second member node issues is received;
Step 402, after the first member node knows data trade request, which is downloaded and is solved from alliance's chain It is close, then the second member node is sent the data to using ECDH Encryption Algorithm.
Step 403, after the second member node obtains data, the integral with data equivalence that the second member node is possessed To exchange data for, and give integral to the first member node;
Step 404, the second member node carry out data deciphering after, can according to the integrality of hash algorithm verify data, To realize data trade.
When enterprise B needs to buy this report, purchaser provides the public key of oneself, and using integral V, (integral V is on enterprise A The value set when passing data report) it is exchanged, it is at this time lock state, waits publisher's response;Publisher has found that report has After enterprise's purchase, the key confirmation purchasing process is inputted, can trigger following behavior on chain at this time: publisher should using key decryption Report, using public key encryption this report of purchaser, the report after re-encrypted is stored in alliance's chain, and purchaser has found report The function that accomplishes purchase, data are fetched from chain, decrypt the data using the private key of oneself;Whole process is all the mechanism inside chain, It can ensure that data were not tampered with.
The data trade method based on alliance's chain in the present embodiment, from report publisher to report purchaser, Suo Youhang All be to be operated in chain, avoid centralization bring data unreliability, by scoring, when have a large amount of enterprises or When person individual participates in, the quality of report and publisher will select the superior and eliminate the inferior, in this way a decentralization mode, final energy Good report is found in chain, provides good service for enterprise.Fraction is exchanged by setting, integral transfer is realized, guarantees Information Equity reliably exchanges between enterprise.
The embodiment of the present invention provides a kind of data trade device based on alliance's chain, and Fig. 5 is provided in this embodiment is based on The data trade device of alliance's chain, the device in the present embodiment may include,
501 encryption memory modules: generating the first member node data and generates number by the data encryption, according to hash algorithm According to cryptographic Hash and outline data before encrypting, then the first member node data, cryptographic Hash and outline data are stored to alliance's chain In;
502 assessment modules for the first time: for according to the assessment rules in data template, to the first of encryption memory module storage Member node data are graded for the first time and carry out reward on total mark to the first member node according to evaluation result;
503 transaction modules need to obtain the of encryption memory module storage for the second member node in alliance's chain It is that the second member node is possessed to exchange data for data equivalence integral when one member node data, after ciphertext data, root According to the integrality of hash algorithm verify data, to realize data trade.
As shown in Fig. 6, can also include:
Receiving module 601: for receiving the self-defining data template of third member node upload;
Release module 602: the received data template of receiving module is approved for the member node when preset ratio Afterwards, data template is published;
Assessment module 606 again: after data trade module realizes data trade, the second member node is received to data It is evaluated again, calculates the data in real time in current Comprehensive Assessment as a result, should for the member node reference on alliance's chain The value of data.
Wherein transaction modules include:
Receiving unit 6051: the request of data and the integral for exchanging data equivalence for that the second member node issues, number are received According to containing the public key of the second member node in request;
Decryption re-encrypts unit 6052: after the first member node knows the received request of data of receiving unit, to data It is decrypted, and carries out re-encrypted using the public key of the second member node and store into alliance's chain;
Data redemption unit 6053:, will when the second member node, which obtains decryption, re-encrypts the data of unit re-encrypted What the second member node possessed exchanges data for the integral of data equivalence, after data deciphering, verifies number according to hash algorithm According to authenticity, to realize data trade.
The embodiment of the invention provides a kind of electronic equipment, including memory and processor storage for store one or A plurality of computer instruction, wherein one or more computer instruction is executed by processor the base to realize any of the above-described embodiment In the data trade method of alliance's chain.
The embodiment of the invention also provides a kind of computer readable storage medium, computer-readable recording medium storage has meter The data trade based on alliance's chain of any of the above-described embodiment may be implemented in calculation machine program when computer program executes computer Method.It is apparent to those skilled in the art that for convenience and simplicity of description, the tool of the device of foregoing description Body running process, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Illustratively, computer program can be divided into one or more module/units, and one or more module/ Unit is stored in memory, and is executed by processor, to complete the present invention.One or more module/units can be energy The series of computation machine program instruction section of specific function is enough completed, the instruction segment is for describing computer program in computer equipment In implementation procedure.
Computer equipment can be desktop PC, notebook, palm PC and cloud server etc. and calculate equipment.Meter Calculating machine equipment may include, but be not limited only to, processor, memory.It will be understood by those skilled in the art that the present embodiment is only The example of computer equipment does not constitute the restriction to computer equipment, may include components more more or fewer than diagram, or Person combines certain components or different components, such as computer equipment can also be set including input-output equipment, network insertion Standby, bus etc..
Processor can be central processing unit (Central Processing Unit, CPU), can also be that other are logical With processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
Memory can be the internal storage unit of computer equipment, such as the hard disk or memory of computer equipment.Storage Device is also possible to the External memory equipment of computer equipment, such as the plug-in type hard disk being equipped in computer equipment, intelligent storage Block (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc.. Further, memory can also both including computer equipment internal storage unit and also including External memory equipment.Memory For storing other programs and data needed for computer program and computer equipment.Memory can be also used for temporarily depositing Store up the data that has exported or will export.
The embodiment of the invention also provides a kind of computer readable storage medium for being stored with computer program, computer journeys The data trade method based on alliance's chain of any of the above-described is realized when sequence executes computer.
Specific embodiments of the present invention are described in detail above.It should be appreciated that those skilled in the art are without wound The property made labour, which according to the present invention can conceive, makes many modifications and variations.Therefore, all technician in the art Pass through the available technology of logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea Scheme, all should be within the scope of protection determined by the claims.

Claims (10)

1. a kind of data trade method based on alliance's chain, alliance's chain includes member's section of multiple access alliance's chain networks Point, which is characterized in that the described method includes:
According to self-defining data template, generates the first member node data and generate number by the data encryption, according to hash algorithm According to cryptographic Hash and outline data before encrypting, then the first member node data, cryptographic Hash and outline data are stored to connection In alliance's chain;
According to the assessment rules in the data template, graded and the first member node data according to evaluation for the first time As a result reward on total mark is carried out to first member node;
When the second member node in alliance's chain needs to obtain the first member node data, by second member What node possessed exchanges the data for the integral of the data equivalence, after ciphertext data, verified according to hash algorithm described in The integrality of data, to realize data trade.
2. data trade method according to claim 1, which is characterized in that raw described according to self-defining data template At the first member node data and will be before the step of the data encryption, further includes:
Receive the self-defining data template that third member node uploads;
After the member node of preset ratio approves the data template, the data template is published.
3. data trade method according to claim 1, which is characterized in that in the second one-tenth when in alliance's chain Member's node is when needing to obtain the first member node data, and what second member node was possessed is equivalent with the data Integral exchanges the data for, after ciphertext data, the integrality of the data is verified according to hash algorithm, to realize that data are handed over After easy step, further includes:
It receives second member node to evaluate the data again, calculates the data in real time and commented in current synthesis Determine as a result, referring to the value of the data for the member node on alliance's chain.
4. the method according to claim 1, wherein second member node when in alliance's chain needs It is that second member node is possessed to exchange for the data equivalence integral when obtaining the first member node data The data after ciphertext data, the integrality of the data are verified according to hash algorithm, thus the step of realizing data trade tool Body includes:
Receive the first member node data trade request of the second member node sending;
After the first member node knows the data trade request, which is downloaded and decrypted from alliance's chain, is then made The second member node is sent the data to ECDH Encryption Algorithm;
When second member node obtains the data after, what second member node was possessed is equivalent with the data Integral gives the integral to first member node to exchange the data for;
After the second member node carries out data deciphering, the integrality of the data can be verified according to hash algorithm, to realize Data trade.
5. data trade method according to any one of claims 1 to 4, which is characterized in that in the data template Assessment rules include quality of data grading rule, data code of points and reward on total mark rule.
6. a kind of data trade device based on alliance's chain, alliance's chain includes the member of multiple access alliance's chain networks Node, which is characterized in that described device includes:
Encrypt memory module: for according to self-defining data template, generating the first member node data and by the data encryption, root According to hash algorithm generate data encryption before cryptographic Hash and outline data, then by the first member node data, cryptographic Hash and Outline data is stored into alliance's chain;
Assessment module for the first time: for according to the assessment rules in data template, to the first one-tenth of the encryption memory module storage Member's node data is graded for the first time and carries out reward on total mark to first member node according to evaluation result;
Transaction modules need to obtain the of the encryption memory module storage for the second member node in alliance's chain It is that second member node is possessed to exchange the data for the data equivalence integral when one member node data, After ciphertext data, the integrality of the data is verified according to hash algorithm, to realize data trade.
7. device according to claim 6, which is characterized in that described device further include:
Receiving module: for receiving the self-defining data template of third member node upload;
Release module: after approval for the member node when preset ratio to the received data template of the receiving module, The data template is published.
8. device according to claim 6, which is characterized in that described device further include:
Assessment module again: after the data trade module realizes data trade, second member node is received to institute It states data to be evaluated again, calculates the data in real time in current Comprehensive Assessment as a result, for the member node on alliance's chain With reference to the value of the data.
9. device according to claim 6, which is characterized in that the data trade module includes:
Receiving unit: for receiving the first member node data trade request of the second member node sending;
Decryption re-encrypts unit: for inciting somebody to action after the first member node knows the received data trade request of the receiving unit The data are downloaded and are decrypted from alliance's chain, then send the data to the second member node using ECDH Encryption Algorithm;
Data trade unit: after second member node, which gets the encryption, re-encrypts the data of unit transmission, by institute State it is that the second member node possesses exchange the data for data equivalence integral, and give described for the integral One member node, after the second member node carries out data deciphering, the integrality of the data is verified according to hash algorithm, from And realize data trade.
10. a kind of computer readable storage medium for being stored with computer program, which is characterized in that the computer program is counted The data trade method based on alliance's chain stated such as any one of Claims 1-4 is realized when calculation machine executes.
CN201910383586.7A 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment Active CN110287254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910383586.7A CN110287254B (en) 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910383586.7A CN110287254B (en) 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment

Publications (2)

Publication Number Publication Date
CN110287254A true CN110287254A (en) 2019-09-27
CN110287254B CN110287254B (en) 2021-08-20

Family

ID=68001654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910383586.7A Active CN110287254B (en) 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment

Country Status (1)

Country Link
CN (1) CN110287254B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475580A (en) * 2020-04-21 2020-07-31 吴海娟 Data sharing method and system in alliance chain
CN113496762A (en) * 2021-05-20 2021-10-12 山东大学 Biological gene sequence summary data generation method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180276668A1 (en) * 2017-03-24 2018-09-27 Alibaba Group Holding Limited Method and apparatus for consensus verification
CN108650270A (en) * 2018-05-16 2018-10-12 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and incentive mechanism and system
CN109472596A (en) * 2018-10-16 2019-03-15 中国传媒大学 Alliance's chain common recognition method and system based on transaction assessment
CN109509092A (en) * 2018-10-16 2019-03-22 中国传媒大学 Data trade motivational techniques and system based on alliance's chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180276668A1 (en) * 2017-03-24 2018-09-27 Alibaba Group Holding Limited Method and apparatus for consensus verification
CN108650270A (en) * 2018-05-16 2018-10-12 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and incentive mechanism and system
CN109472596A (en) * 2018-10-16 2019-03-15 中国传媒大学 Alliance's chain common recognition method and system based on transaction assessment
CN109509092A (en) * 2018-10-16 2019-03-22 中国传媒大学 Data trade motivational techniques and system based on alliance's chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
樊涛 等: "" 基于区块链技术的积分通兑平台"", 《2017电力行业信息化年会论文集 》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475580A (en) * 2020-04-21 2020-07-31 吴海娟 Data sharing method and system in alliance chain
CN113496762A (en) * 2021-05-20 2021-10-12 山东大学 Biological gene sequence summary data generation method and system
CN113496762B (en) * 2021-05-20 2022-09-27 山东大学 Biological gene sequence summary data generation method and system

Also Published As

Publication number Publication date
CN110287254B (en) 2021-08-20

Similar Documents

Publication Publication Date Title
CN109889504B (en) Decentralized data access right transaction method and system
CN112132198B (en) Data processing method, device and system and server
CN108197891B (en) Electronic signing device and method based on block chain
EP3449451B1 (en) Implementing logic gate functionality using a blockchain
CN113159327B (en) Model training method and device based on federal learning system and electronic equipment
ES2957843T3 (en) Verification of data processes in a network of computing resources
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN109410076A (en) Agricultural product based on block chain technology, which are traced to the source, insures public service platform
CN109155036A (en) System and method for controlling asset-related actions via blockchain
CN109191003A (en) Fruits and vegetables agricultural product quality safety traceability system based on block chain
CN106650495B (en) File verification method and device
CN107292181A (en) Database Systems based on block chain and the application method using the system
CN109299943A (en) A kind of method and device of the intellectual property transaction based on block chain
CN106971302A (en) A kind of threedimensional model based on block chain technology is really weighed and method of commerce
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
US11133936B1 (en) Methods and systems for introducing self-contained intent functionality into decentralized computer networks
CN108932410A (en) A kind of digital resource copyright method for authenticating, device, system and storage medium
Cook et al. Blockchain: Transforming the seafood supply chain
CN112613956B (en) Bidding processing method and device
JP2019175417A (en) Power transaction system
CN110148003A (en) A kind of carbon emissions trading method and system
CN109905360A (en) Data verification method and terminal device
CN109815289A (en) Block generation method, calculating equipment, storage medium for block chain network
CN107743065A (en) Battery uses verification method, battery system and automobile
US20240137280A1 (en) Methods and systems for introducing self-contained intent functionality into decentralized computer networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant