CN110474908A - Transaction monitoring and managing method and device, storage medium and computer equipment - Google Patents

Transaction monitoring and managing method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN110474908A
CN110474908A CN201910759903.0A CN201910759903A CN110474908A CN 110474908 A CN110474908 A CN 110474908A CN 201910759903 A CN201910759903 A CN 201910759903A CN 110474908 A CN110474908 A CN 110474908A
Authority
CN
China
Prior art keywords
key
data
public key
ciphertext
result data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910759903.0A
Other languages
Chinese (zh)
Other versions
CN110474908B (en
Inventor
李子阳
梁滢峰
邱盛涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Weiwei digital identity Technology Co.,Ltd.
Original Assignee
Micro (shenzhen) Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Micro (shenzhen) Network Technology Co Ltd filed Critical Micro (shenzhen) Network Technology Co Ltd
Priority to CN201910759903.0A priority Critical patent/CN110474908B/en
Publication of CN110474908A publication Critical patent/CN110474908A/en
Application granted granted Critical
Publication of CN110474908B publication Critical patent/CN110474908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of transaction monitoring and managing methods and device, storage medium and computer equipment, and wherein the transaction monitoring and managing method includes: target clear data, data encryption request, client public key and the monitoring party public key for obtaining user;According to client public key and monitoring party public key, target clear data is encrypted, generates encrypted result data;Judge whether to receive the data deciphering request and corresponding decoding request person's information for requiring that encrypted result data are decrypted, decoding request person's information includes requestor's identity information and corresponding requestor's private key;If so, being decrypted according to requestor's private key pair encryption result data, decrypted result data are obtained.The present invention solves following problems in the prior art: some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, a large amount of illegal transactions continuously carry out on these platforms, cause adverse effect to world and financial order.

Description

Transaction monitoring and managing method and device, storage medium and computer equipment
Technical field
The present invention relates to data safety applied technical fields, more particularly to a kind of transaction monitoring and managing method and device, storage Medium and computer equipment.
Background technique
With the development of internet technology, the covering scene of Internet service is also more and more, and more and more people can enjoy By Internet service.At the same time, more and more individual privacy data carry out transimission and storage by internet.In addition, Due to the development of big data technology, more and more individual privacy data are deliberately collected and are abused, individual privacy safety by Increasingly severe threat.User data is largely collected for interests by many companies, then using big data technology to number of users According to being analyzed, then will analysis result be used for advertisement launch and it is automatic recommend etc., and the individual privacy number that these are collected According to itself may not protected well or be abused by intra-company personnel.In recent years, multiple user has occurred both at home and abroad Private data reveals event on a large scale, has beaten alarm bell safely for privacy of user.
On the other hand, with the development of decentralization network technology, personal network behavior is increasingly difficult to be supervised, very More criminals utilize decentralization network technology, carry out illegal activity, impact to civil order.For example, latest developments Rapid block chain technology, some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, greatly Amount illegal transaction continuously carries out on these platforms, causes adverse effect to world and financial order.To sum up It is described, while protecting individual privacy, necessary supervision is carried out to personal network behavior, be one urgently to be resolved very Important problem.
Summary of the invention
The embodiment of the present invention provides a kind of transaction monitoring and managing method and device, storage medium and computer equipment, existing to solve Have the following problems in technology: some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, A large amount of illegal transactions continuously carry out on these platforms, cause adverse effect to world and financial order.
In order to solve the above technical problems, the first technical solution used in the embodiment of the present invention is as follows:
A kind of transaction monitoring and managing method, for supervising the transaction of block chain comprising: obtain the target plaintext number of user According to, data encryption request, the corresponding client public key of user and the corresponding monitoring party public key of monitoring party;According to the client public key and The target clear data is encrypted in the monitoring party public key, generates encrypted result data;Judge whether to receive It is required that requesting to ask with corresponding decoding request person's information, the decryption to the data deciphering that the encrypted result data are decrypted The person's of asking information includes requestor's identity information and corresponding requestor's private key;If so, according to requestor's private key pair The encrypted result data are decrypted, and obtain decrypted result data;Wherein, the client public key and the private key for user For symmetric key, the monitoring party public key and the monitoring party private key are symmetric key, and decoding request person's information is corresponding Requestor is the user or the regulator, and requestor's private key is private key for user or monitoring party private key.
Optionally, described according to the client public key and the monitoring party public key, the target clear data is added Close processing generates encrypted result data, comprising: obtains the data ciphertext for forming the encrypted result data, ciphertext certification respectively Code and key ciphertext group;According to preset rules, the data ciphertext, the ciphertext authentication code and the key ciphertext group are carried out Permutation and combination obtains the encrypted result data.
Optionally, the acquisition forms the data ciphertext of the encrypted result data, comprising: random generation one is symmetrical to be added Key;According to symmetric encipherment algorithm, the clear data is encrypted using the symmetric cryptographic key, obtains the number According to ciphertext.
Optionally, described to obtain the ciphertext authentication code for forming the encrypted result data, comprising: to generate a message at random Authentication code key;According to message authentication code algorithm, calculated described in the data ciphertext using the authentication code key Ciphertext authentication code.
Optionally, described to obtain the key ciphertext group for forming the encrypted result data, comprising: according to the integrated encryption of public key Scheme uses the client public key and the monitoring party public key respectively, encrypts the symmetric cryptographic key and the message authentication Code key, obtains the key ciphertext group.
Optionally, described that the encrypted result data are decrypted according to requestor's private key, it is decrypted Result data, comprising: encipherment scheme is integrated according to public key, it is corresponding to decrypt requestor's public key using requestor's private key The key ciphertext, obtains symmetric cryptographic key and authentication code key;According to Message Digest 5, recognized using the message Card code cipher key calculation obtains the target message authentication code of the data ciphertext;Judge the target message authentication code and the ciphertext Whether authentication code is identical;If the target message authentication code and the ciphertext authentication code be not identical, stop decryption oprerations, and show Show the information for stopping decryption oprerations.
Optionally, if the message authentication code is identical with the ciphertext authentication code, according to symmetric encipherment algorithm, institute is used It states symmetric cryptographic key and decrypts the data ciphertext, obtain the data clear text.
In order to solve the above technical problems, the second technical solution used in the embodiment of the present invention is as follows:
A kind of transaction maintenance device, for supervising the transaction of block chain comprising: module is obtained, for obtaining Target clear data, data encryption request, the corresponding client public key of user and the corresponding monitoring party public key of monitoring party of user;Add Close module, it is raw for according to the client public key and the monitoring party public key, the target clear data to be encrypted At encrypted result data;Judgment module receives the number for requiring that the encrypted result data are decrypted for judging whether According to decoding request and corresponding decoding request person's information, decoding request person's information includes requestor's identity information and right with it The requestor's private key answered;Processing module, for working as the data deciphering for receiving and requiring that the encrypted result data are decrypted When request and corresponding decoding request person's information, place is decrypted to the encrypted result data according to requestor's private key Reason, obtains decrypted result data;Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key It is symmetric key with the monitoring party private key, the corresponding requestor of decoding request person's information is the user or the supervision Person, requestor's private key are private key for user or monitoring party private key.
In order to solve the above technical problems, third technical solution used in the embodiment of the present invention is as follows:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is performed reality Now such as above-mentioned transaction monitoring and managing method.
In order to solve the above technical problems, the 4th technical solution used in the embodiment of the present invention is as follows:
A kind of computer equipment comprising processor, memory and be stored on the memory and can be in the processing The computer program run on device, the processor realize such as above-mentioned transaction monitoring and managing method when executing the computer program.
The beneficial effect of the embodiment of the present invention is: being in contrast to the prior art, the embodiment of the present invention passes through user's public affairs Key and monitoring party public key, are encrypted target clear data, generate encrypted result data, and require to institute receiving It is private according to the requestor when stating the data deciphering request and corresponding decoding request person's information that encrypted result data are decrypted The encrypted result data are decrypted in key, obtain decrypted result data, solve following problems in the prior art: Some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, and a large amount of illegal transactions are flat at these It is continuously carried out on platform, adverse effect is caused to world and financial order.
Detailed description of the invention
Fig. 1 is the implementation flow chart of transaction one embodiment of monitoring and managing method of the embodiment of the present invention one;
Fig. 2 is the part-structure frame diagram of transaction one embodiment of maintenance device of the embodiment of the present invention two;
Fig. 3 is the part-structure frame diagram of one embodiment of computer readable storage medium of the embodiment of the present invention three;
Fig. 4 is the part-structure frame diagram of one embodiment of computer equipment of the embodiment of the present invention four.
Specific embodiment
Embodiment one
Referring to Fig. 1, Fig. 1 is the implementation flow chart of the transaction monitoring and managing method of the embodiment of the present invention, can be obtained in conjunction with Fig. 1 It arrives, a kind of transaction monitoring and managing method of the invention comprising once step:
Step S101: target clear data, data encryption request, the corresponding client public key of user and the supervision of user are obtained The corresponding monitoring party public key in side.
Step S102: according to the client public key and the monitoring party public key, the target clear data is encrypted Processing generates encrypted result data;
Step S103: judge whether to receive the data deciphering request for requiring that the encrypted result data are decrypted and Corresponding decoding request person's information, decoding request person's information include that requestor's identity information and corresponding requestor are private Key;
Step S104: if receiving the data deciphering request for requiring that the encrypted result data are decrypted and corresponding Decoding request person's information is then decrypted the encrypted result data according to requestor's private key, obtains decryption knot Fruit data.
Step S105: if being not received by the data deciphering request for requiring that the encrypted result data are decrypted and right The decoding request person's information answered is not decrypted the encrypted result data then.
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party Private key is symmetric key, and the corresponding requestor of decoding request person's information is the user or the regulator, the request Person's private key is private key for user or monitoring party private key.
In the present embodiment, key is generated by user and monitoring party oneself, and encrypting and deciphering system only needs public key, private key It is properly saved by holder oneself, the Core Generator of key is then that the tool that any support public private key pair generates can be with.Adding When close, combining encryption directly is carried out using two or more public keys, one of public key is user, remaining is monitoring party 's.In simple terms, it is assumed that have data abc, obtain 080f after being encrypted with user key, obtained after being encrypted with monitoring party key 7df2, then final result is exactly that the two spellings get up to obtain 080f7df2, user and monitoring party either side can be decrypted Oneself corresponding part.
In the present embodiment, optionally, described according to the client public key and the monitoring party public key, it is bright to the target Literary data are encrypted, and generate encrypted result data, comprising:
First, data ciphertext, ciphertext authentication code and the key ciphertext group for forming the encrypted result data are obtained respectively.
Second, according to preset rules, the data ciphertext, the ciphertext authentication code and the key ciphertext group are arranged Column combination, obtains the encrypted result data.
It is in the present embodiment, optionally, described to obtain the data ciphertext for forming the encrypted result data, comprising:
First, a symmetric cryptographic key is generated at random.
Second, according to symmetric encipherment algorithm, the clear data is encrypted using the symmetric cryptographic key, is obtained The data ciphertext.
It is in the present embodiment, optionally, described to obtain the ciphertext authentication code for forming the encrypted result data, comprising:
First, an authentication code key is generated at random.
Second, according to message authentication code algorithm, the institute of the data ciphertext is calculated using the authentication code key State ciphertext authentication code.
It is in the present embodiment, optionally, described to obtain the key ciphertext group for forming the encrypted result data, comprising:
Encipherment scheme is integrated according to public key, uses the client public key and the monitoring party public key respectively, it is described right to encrypt Claim encryption key and the authentication code key, obtain the key ciphertext group, specifically: the integrated encryption of public key is applied multiple times Scheme uses client public key and monitoring party public key, cryptographic symmetrical encryption key and authentication code key respectively, it is close to obtain key Literary group, including the following steps:
1) temporary public key, private key pair, are generated at random.
2), shared key is calculated using decryption side public key and temporary private using cipher key agreement algorithm.
3), using key exported algorithm, temporary symmetric encryption key and interim message authentication code are exported using shared key Key.
4), using symmetric encipherment algorithm, using temporary symmetric encryption key, cryptographic symmetrical encryption key and message authentication code Key obtains temporary key ciphertext.
5), application message digest algorithm calculates decryption side public key abstract.
6) temporary public key, temporary key ciphertext and decryption side public key abstract, are combined, then application message authentication code algorithm, Using interim message authentication code key, the interim message authentication code of the combination is calculated.
Wherein, the combination of temporary public key, temporary key ciphertext, decryption side public key abstract and interim message authentication code is as close Key ciphertext, resulting data ciphertext, ciphertext authentication code and key ciphertext group are encrypted result data.
In the present embodiment, optionally, described that the encrypted result data are decrypted according to requestor's private key Processing, obtains decrypted result data, comprising:
First, encipherment scheme is integrated according to public key, it is corresponding to decrypt requestor's public key using requestor's private key The key ciphertext, obtains symmetric cryptographic key and authentication code key.
In this step, the obtaining step of symmetric cryptographic key and authentication code key specifically:
1), application message digest algorithm calculates one's own side's public key abstract.
2) key ciphertext group, is traversed, decryption side public key abstract and the identical key ciphertext of one's own side's public key abstract are found.
3), using cipher key agreement algorithm, using the temporary public key in one's own side's private key and key ciphertext, calculate share it is close Key.
4), using key exported algorithm, temporary symmetric encryption key and interim message authentication code are exported using shared key Key.
5), application message authentication code algorithm calculates the interim public affairs in key ciphertext using interim message authentication code key The combined interim message authentication code that key, temporary key ciphertext, decryption side public key are made a summary.
6) the interim message authentication code in interim message authentication code obtained in the previous step and key ciphertext, is compared, if not It is identical, then temporary public key, temporary key ciphertext, decryption side public key abstract, interim message authentication code in key ciphertext are wherein One or more be tampered, stop decrypting process.
7) it, is obtained using symmetric encipherment algorithm using temporary key ciphertext in temporary symmetric encryption key decryption key ciphertext To symmetric cryptographic key and authentication code key.
Second, according to Message Digest 5, the mesh of the data ciphertext is calculated using the authentication code key Mark message authentication code.
Third judges whether the target message authentication code and the ciphertext authentication code are identical.
4th, if the target message authentication code and the ciphertext authentication code be not identical, stop decryption oprerations, and show Stop the information of decryption oprerations.Because the target message authentication code and the ciphertext authentication code be not identical, illustrate data ciphertext, Ciphertext authentication code one or more have been tampered with, it is necessary to stop decryption oprerations.
In the present embodiment, optionally, if the message authentication code is identical with the ciphertext authentication code, added according to symmetrical Close algorithm decrypts the data ciphertext using the symmetric cryptographic key, obtains the data clear text, i.e. decrypted result data.
In the present embodiment, in the application of encryption and decryption, by recognizing symmetric encipherment algorithm, Message Digest 5, message Demonstrate,prove code algorithm, cipher key agreement algorithm and key exported algorithm these types algorithm integrated application, realize to individual privacy Data are encrypted, the encrypted result purpose that only data owner and monitoring party can decrypt.
Wherein, symmetric encipherment algorithm, Message Digest 5, message authentication code algorithm, key are used in the present invention program Negotiation algorithm and key exported algorithm, these algorithms are limited to certain specific algorithm, but can be in this kind of algorithm It arbitrarily selects as needed a kind of as specific implementation.
The embodiment of the present invention is encrypted target clear data by client public key and monitoring party public key, generates Encrypted result data, and receiving the data deciphering request and corresponding solution for requiring that the encrypted result data are decrypted When close applicant information, the encrypted result data are decrypted according to requestor's private key, obtain decrypted result Data solve following problems in the prior art: some applications be used to construct encryption number that is borderless and not supervised Moneytary operations platform, a large amount of illegal transactions are continuously carried out on these platforms, are caused to world and financial order Adverse effect.In the present invention, individual privacy data are after using the present invention program encryption, only data owner or supervision Side can be decrypted encrypted data.Therefore, before being transmitted or being stored by internet, using the present invention program May achieve following effect to individual privacy data encryption: individual privacy data will not be obtained by the third party except monitoring party, prison Pipe side can obtain specified individual privacy data if necessary, if encrypted data are tampered, the energy in decrypting process It is detected, and clear data will not be encrypted repeatedly, avoids with the increase of monitoring party, and causing when data volume is larger Ciphertext is excessive.Wherein, various types of algorithms involved in the present invention program do not limit specific algorithm, can according to need selection Any one specific algorithm of such algorithm.One aspect of the present invention realizes individual privacy data and rests in a manpower, another Aspect if necessary, so that regulatory agency is available to arrive specified data, and is supervised and is audited to these data.
Embodiment two
Referring to Fig. 2, Fig. 2 is the part-structure frame diagram of the transaction maintenance device of the embodiment of the present invention, it can be in conjunction with Fig. 2 It obtains, a kind of transaction maintenance device 100 of the invention, for supervising the transaction of block chain comprising:
Module 110 is obtained, for obtaining target clear data, the data encryption request, the corresponding user's public affairs of user of user Key and the corresponding monitoring party public key of monitoring party.
Encrypting module 120, for according to the client public key and the monitoring party public key, to the target clear data into Row encryption generates encrypted result data.
Judgment module 130 receives the data solution for requiring that the encrypted result data are decrypted for judging whether Close request and corresponding decoding request person's information, decoding request person's information include requestor's identity information and corresponding Requestor's private key.
Processing module 140 is requested for working as the data deciphering for receiving and requiring that the encrypted result data are decrypted When with corresponding decoding request person's information, the encrypted result data are decrypted according to requestor's private key, are obtained To decrypted result data.
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party Private key is symmetric key, and the corresponding requestor of decoding request person's information is the user or the regulator, the request Person's private key is private key for user or monitoring party private key.
The embodiment of the present invention is encrypted target clear data by client public key and monitoring party public key, generates Encrypted result data, and receiving the data deciphering request and corresponding solution for requiring that the encrypted result data are decrypted When close applicant information, the encrypted result data are decrypted according to requestor's private key, obtain decrypted result Data solve following problems in the prior art: some applications be used to construct encryption number that is borderless and not supervised Moneytary operations platform, a large amount of illegal transactions are continuously carried out on these platforms, are caused to world and financial order Adverse effect.
Embodiment three
Referring to Fig. 3, can see with reference to Fig. 3, a kind of computer readable storage medium 10 of the embodiment of the present invention is described Computer readable storage medium 10, such as: ROM/RAM, magnetic disk, CD are stored thereon with computer program 11, the calculating Machine program 11 is performed the transaction monitoring and managing method realized as described in embodiment one.Since the transaction monitoring and managing method has been implemented Example one is described in detail, and this will not be repeated here.
The transaction monitoring and managing method that the embodiment of the present invention is realized, by client public key and monitoring party public key, to target plaintext number According to being encrypted, encrypted result data are generated, and receiving the number for requiring that the encrypted result data are decrypted When according to decoding request and corresponding decoding request person's information, the encrypted result data are solved according to requestor's private key Close processing obtains decrypted result data, solves following problems in the prior art: some applications be used to construct it is borderless and The encryption digital cash transaction platform that do not supervised, a large amount of illegal transactions continuously carry out on these platforms, to the whole world Society and financial order cause adverse effect.In the present invention, individual privacy data are after using the present invention program encryption, only There are data owner or monitoring party encrypted data can be decrypted.Therefore, it is being transmitted or is being deposited by internet Chu Qian, may achieve following effect to individual privacy data encryption using the present invention program: individual privacy data will not be by monitoring party Except third party obtain, monitoring party can obtain specified individual privacy data if necessary, if encrypted data by It distorts, can be detected in decrypting process, and clear data will not be encrypted repeatedly, avoid when data volume is larger, with The increase of monitoring party, and cause ciphertext excessive.Wherein, various types of algorithms involved in the present invention program do not limit specific calculation Method can according to need any one specific algorithm for selecting such algorithm.One aspect of the present invention realizes individual privacy data It rests in a manpower, on the other hand if necessary, so that regulatory agency is available to arrive specified data, and to these data It is supervised and is audited.
Example IV
Referring to Fig. 4, can see with reference to Fig. 4, a kind of computer equipment 20 of the embodiment of the present invention comprising processor 21, memory 22 and it is stored in the computer program 221 that can be run on the memory 22 and on the processor 21, it is described Processor 21 realizes the transaction monitoring and managing method as described in embodiment one when executing the computer program 221.Since the transaction is supervised Pipe method is described in detail in embodiment one, and this will not be repeated here.
The transaction monitoring and managing method that the embodiment of the present invention is realized, by client public key and monitoring party public key, to target plaintext number According to being encrypted, encrypted result data are generated, and receiving the number for requiring that the encrypted result data are decrypted When according to decoding request and corresponding decoding request person's information, the encrypted result data are solved according to requestor's private key Close processing obtains decrypted result data, solves following problems in the prior art: some applications be used to construct it is borderless and The encryption digital cash transaction platform that do not supervised, a large amount of illegal transactions continuously carry out on these platforms, to the whole world Society and financial order cause adverse effect.In the present invention, individual privacy data are after using the present invention program encryption, only There are data owner or monitoring party encrypted data can be decrypted.Therefore, it is being transmitted or is being deposited by internet Chu Qian, may achieve following effect to individual privacy data encryption using the present invention program: individual privacy data will not be by monitoring party Except third party obtain, monitoring party can obtain specified individual privacy data if necessary, if encrypted data by It distorts, can be detected in decrypting process, and clear data will not be encrypted repeatedly, avoid when data volume is larger, with The increase of monitoring party, and cause ciphertext excessive.Wherein, various types of algorithms involved in the present invention program do not limit specific calculation Method can according to need any one specific algorithm for selecting such algorithm.One aspect of the present invention realizes individual privacy data It rests in a manpower, on the other hand if necessary, so that regulatory agency is available to arrive specified data, and to these data It is supervised and is audited.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (10)

1. a kind of transaction monitoring and managing method, for supervising the transaction of block chain, which is characterized in that the transaction monitoring and managing method packet It includes:
Obtain target clear data, data encryption request, the corresponding client public key of user and the corresponding supervision of monitoring party of user Square public key;
According to the client public key and the monitoring party public key, the target clear data is encrypted, generates encryption Result data;
Judge whether to receive and the data deciphering that the encrypted result data are decrypted request and corresponding decryption is required to ask The person's of asking information, decoding request person's information include requestor's identity information and corresponding requestor's private key;
If so, the encrypted result data are decrypted according to requestor's private key, decrypted result data are obtained;
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party private key For symmetric key, the corresponding requestor of decoding request person's information is the user or the regulator, and the requestor is private Key is private key for user or monitoring party private key.
2. transaction monitoring and managing method according to claim 1, which is characterized in that described according to the client public key and the prison The target clear data is encrypted in pipe side's public key, generates encrypted result data, comprising:
Data ciphertext, ciphertext authentication code and the key ciphertext group for forming the encrypted result data are obtained respectively;
According to preset rules, the data ciphertext, the ciphertext authentication code and the key ciphertext group are subjected to permutation and combination, obtained To the encrypted result data.
3. transaction monitoring and managing method according to claim 2, which is characterized in that the acquisition forms the encrypted result data Data ciphertext, comprising:
A symmetric cryptographic key is generated at random;
According to symmetric encipherment algorithm, the clear data is encrypted using the symmetric cryptographic key, obtains the data Ciphertext.
4. transaction monitoring and managing method according to claim 2, which is characterized in that the acquisition forms the encrypted result data Ciphertext authentication code, comprising:
An authentication code key is generated at random;
According to message authentication code algorithm, authenticated using the ciphertext that the authentication code key calculates the data ciphertext Code.
5. transaction monitoring and managing method according to claim 2, which is characterized in that the acquisition forms the encrypted result data Key ciphertext group, comprising:
Encipherment scheme is integrated according to public key, uses the client public key and the monitoring party public key respectively, encryption is described symmetrically to be added Key and the authentication code key obtain the key ciphertext group.
6. transaction monitoring and managing method according to claim 1, which is characterized in that it is described according to requestor's private key to described Encrypted result data are decrypted, and obtain decrypted result data, comprising:
Encipherment scheme is integrated according to public key, it is close to decrypt the corresponding key of requestor's public key using requestor's private key Text obtains symmetric cryptographic key and authentication code key;
According to Message Digest 5, authenticated using the target message that the data ciphertext is calculated in the authentication code key Code;
Judge whether the target message authentication code and the ciphertext authentication code are identical;
If it is not, then stopping decryption oprerations, and show the information for stopping decryption oprerations.
7. transaction monitoring and managing method according to claim 6 characterized by comprising
If the message authentication code is identical with the ciphertext authentication code, according to symmetric encipherment algorithm, the symmetric cryptography is used Key decrypts the data ciphertext, obtains the data clear text.
8. a kind of transaction maintenance device, for supervising the transaction of block chain characterized by comprising
Module is obtained, for obtaining target clear data, data encryption request, the corresponding client public key of user and the supervision of user The corresponding monitoring party public key in side;
Encrypting module, for being encrypted to the target clear data according to the client public key and the monitoring party public key Processing generates encrypted result data;
Judgment module, for judge whether to receive the data deciphering for requiring that the encrypted result data are decrypted request and Corresponding decoding request person's information, decoding request person's information include that requestor's identity information and corresponding requestor are private Key;
Processing module, for when receiving the data deciphering for requiring that the encrypted result data are decrypted request and corresponding When decoding request person's information, the encrypted result data are decrypted according to requestor's private key, obtain decryption knot Fruit data;
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party private key For symmetric key, the corresponding requestor of decoding request person's information is the user or the regulator, and the requestor is private Key is private key for user or monitoring party private key.
9. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, the computer program quilt Claim 1~7 described in any item transaction monitoring and managing methods are realized when execution.
10. a kind of computer equipment, which is characterized in that it includes processor, memory and is stored on the memory and can The computer program run on the processor, the processor realize claim 1~7 when executing the computer program Described in any item transaction monitoring and managing methods.
CN201910759903.0A 2019-08-16 2019-08-16 Transaction supervision method and device, storage medium and computer equipment Active CN110474908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910759903.0A CN110474908B (en) 2019-08-16 2019-08-16 Transaction supervision method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910759903.0A CN110474908B (en) 2019-08-16 2019-08-16 Transaction supervision method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN110474908A true CN110474908A (en) 2019-11-19
CN110474908B CN110474908B (en) 2022-04-05

Family

ID=68510954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910759903.0A Active CN110474908B (en) 2019-08-16 2019-08-16 Transaction supervision method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN110474908B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111415155A (en) * 2020-03-20 2020-07-14 中国建设银行股份有限公司 Encryption method, device, equipment and storage medium for chain-dropping transaction data
CN112131615A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Data storage mechanism supporting supervision
CN112532656A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN113378209A (en) * 2020-02-25 2021-09-10 百度在线网络技术(北京)有限公司 Prescription data processing method, device, equipment and medium based on block chain
CN114928756A (en) * 2022-05-27 2022-08-19 浙江大华技术股份有限公司 Video data protection, encryption and verification method, system and equipment
CN115118751A (en) * 2022-07-15 2022-09-27 广东浪潮智慧计算技术有限公司 Block chain-based supervision system, method, equipment and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123501A (en) * 2006-08-08 2008-02-13 西安电子科技大学 A WAPI authentication and secret key negotiation method and system
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN103825733A (en) * 2014-02-28 2014-05-28 华为技术有限公司 Communication method, device and system based on combined public key cryptography system
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN108765240A (en) * 2018-07-16 2018-11-06 阿里巴巴集团控股有限公司 Inter-agency customer authentication method, transaction monitoring and managing method based on block chain and device
CN109034796A (en) * 2018-06-15 2018-12-18 重庆金融资产交易所有限责任公司 Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN109462472A (en) * 2017-09-06 2019-03-12 阿里巴巴集团控股有限公司 The methods, devices and systems of data encryption and decryption
CN109660485A (en) * 2017-10-10 2019-04-19 中兴通讯股份有限公司 A kind of authority control method and system based on the transaction of block chain
CN109727031A (en) * 2018-12-27 2019-05-07 数据通信科学技术研究所 A kind of anonymous digital cash transaction monitoring and managing method of center concealment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123501A (en) * 2006-08-08 2008-02-13 西安电子科技大学 A WAPI authentication and secret key negotiation method and system
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN103825733A (en) * 2014-02-28 2014-05-28 华为技术有限公司 Communication method, device and system based on combined public key cryptography system
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN109462472A (en) * 2017-09-06 2019-03-12 阿里巴巴集团控股有限公司 The methods, devices and systems of data encryption and decryption
CN109660485A (en) * 2017-10-10 2019-04-19 中兴通讯股份有限公司 A kind of authority control method and system based on the transaction of block chain
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN109034796A (en) * 2018-06-15 2018-12-18 重庆金融资产交易所有限责任公司 Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN108765240A (en) * 2018-07-16 2018-11-06 阿里巴巴集团控股有限公司 Inter-agency customer authentication method, transaction monitoring and managing method based on block chain and device
CN109727031A (en) * 2018-12-27 2019-05-07 数据通信科学技术研究所 A kind of anonymous digital cash transaction monitoring and managing method of center concealment

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112131615A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Data storage mechanism supporting supervision
CN113378209A (en) * 2020-02-25 2021-09-10 百度在线网络技术(北京)有限公司 Prescription data processing method, device, equipment and medium based on block chain
CN113378209B (en) * 2020-02-25 2023-10-31 百度在线网络技术(北京)有限公司 Prescription data processing method, device, equipment and medium based on block chain
CN111415155A (en) * 2020-03-20 2020-07-14 中国建设银行股份有限公司 Encryption method, device, equipment and storage medium for chain-dropping transaction data
CN111415155B (en) * 2020-03-20 2024-02-09 中国建设银行股份有限公司 Encryption method, device, equipment and storage medium for falling-chain transaction data
CN112532656A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN112532656B (en) * 2021-02-07 2021-05-11 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN114928756A (en) * 2022-05-27 2022-08-19 浙江大华技术股份有限公司 Video data protection, encryption and verification method, system and equipment
CN115118751A (en) * 2022-07-15 2022-09-27 广东浪潮智慧计算技术有限公司 Block chain-based supervision system, method, equipment and medium
CN115118751B (en) * 2022-07-15 2024-04-19 广东浪潮智慧计算技术有限公司 Blockchain-based supervision system, method, equipment and medium

Also Published As

Publication number Publication date
CN110474908B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN110474908A (en) Transaction monitoring and managing method and device, storage medium and computer equipment
CN102170357B (en) Combined secret key dynamic security management system
CA2747891C (en) Method for generating an encryption/decryption key
CN104322003B (en) Cryptographic authentication and identification method using real-time encryption
CN107347058A (en) Data ciphering method, data decryption method, apparatus and system
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN104579680B (en) A kind of method of secure distribution seed
CN110061957A (en) Data encryption, decryption method, user terminal, server and data management system
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
CN107154916A (en) A kind of authentication information acquisition methods, offer method and device
Njorbuenwu et al. A survey on the impacts of quantum computers on information security
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
CN112380404B (en) Data filtering method, device and system
CN102882687A (en) Intelligent household safe access method and system based on searchable cipher text
CN107733936A (en) A kind of encryption method of mobile data
CN100561913C (en) A kind of method of access code equipment
CN106992865A (en) Data signature method and system, data sign test method and device
Prabha et al. A review of cyber security in cryptography: Services, attacks, and key approach
CN104468535B (en) It is adapted to ciphertext storage and connection query system and the method for cloud environment
KR20120069387A (en) A method for searching keyword based on public key
JP5799635B2 (en) ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM
CN108134799A (en) Novel encipher-decipher method and its device
CN109660490A (en) Data processing method, device, system and storage medium
KR102308248B1 (en) Encryption Gateway equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service between IoT device using the same
CN1224925C (en) Method of digit identity authentication based on features of non-biophysics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220315

Address after: 510700 building 301, 302, 303, 304 and 305, No. 2, 233 Kezhu Road, Huangpu District, Guangzhou, Guangdong (office only)

Applicant after: Guangdong Weiwei digital identity Technology Co.,Ltd.

Address before: 518054 802, 8th floor, building 2, Xunmei science and Technology Plaza, Keyuan Road, science and Technology Park, Yuehai street, Shenzhen, Guangdong

Applicant before: WEWAY (SHENZHEN) NETWORK TECHNOLOGY CO.,LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant