CN110474908A - Transaction monitoring and managing method and device, storage medium and computer equipment - Google Patents
Transaction monitoring and managing method and device, storage medium and computer equipment Download PDFInfo
- Publication number
- CN110474908A CN110474908A CN201910759903.0A CN201910759903A CN110474908A CN 110474908 A CN110474908 A CN 110474908A CN 201910759903 A CN201910759903 A CN 201910759903A CN 110474908 A CN110474908 A CN 110474908A
- Authority
- CN
- China
- Prior art keywords
- key
- data
- public key
- ciphertext
- result data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of transaction monitoring and managing methods and device, storage medium and computer equipment, and wherein the transaction monitoring and managing method includes: target clear data, data encryption request, client public key and the monitoring party public key for obtaining user;According to client public key and monitoring party public key, target clear data is encrypted, generates encrypted result data;Judge whether to receive the data deciphering request and corresponding decoding request person's information for requiring that encrypted result data are decrypted, decoding request person's information includes requestor's identity information and corresponding requestor's private key;If so, being decrypted according to requestor's private key pair encryption result data, decrypted result data are obtained.The present invention solves following problems in the prior art: some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, a large amount of illegal transactions continuously carry out on these platforms, cause adverse effect to world and financial order.
Description
Technical field
The present invention relates to data safety applied technical fields, more particularly to a kind of transaction monitoring and managing method and device, storage
Medium and computer equipment.
Background technique
With the development of internet technology, the covering scene of Internet service is also more and more, and more and more people can enjoy
By Internet service.At the same time, more and more individual privacy data carry out transimission and storage by internet.In addition,
Due to the development of big data technology, more and more individual privacy data are deliberately collected and are abused, individual privacy safety by
Increasingly severe threat.User data is largely collected for interests by many companies, then using big data technology to number of users
According to being analyzed, then will analysis result be used for advertisement launch and it is automatic recommend etc., and the individual privacy number that these are collected
According to itself may not protected well or be abused by intra-company personnel.In recent years, multiple user has occurred both at home and abroad
Private data reveals event on a large scale, has beaten alarm bell safely for privacy of user.
On the other hand, with the development of decentralization network technology, personal network behavior is increasingly difficult to be supervised, very
More criminals utilize decentralization network technology, carry out illegal activity, impact to civil order.For example, latest developments
Rapid block chain technology, some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, greatly
Amount illegal transaction continuously carries out on these platforms, causes adverse effect to world and financial order.To sum up
It is described, while protecting individual privacy, necessary supervision is carried out to personal network behavior, be one urgently to be resolved very
Important problem.
Summary of the invention
The embodiment of the present invention provides a kind of transaction monitoring and managing method and device, storage medium and computer equipment, existing to solve
Have the following problems in technology: some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised,
A large amount of illegal transactions continuously carry out on these platforms, cause adverse effect to world and financial order.
In order to solve the above technical problems, the first technical solution used in the embodiment of the present invention is as follows:
A kind of transaction monitoring and managing method, for supervising the transaction of block chain comprising: obtain the target plaintext number of user
According to, data encryption request, the corresponding client public key of user and the corresponding monitoring party public key of monitoring party;According to the client public key and
The target clear data is encrypted in the monitoring party public key, generates encrypted result data;Judge whether to receive
It is required that requesting to ask with corresponding decoding request person's information, the decryption to the data deciphering that the encrypted result data are decrypted
The person's of asking information includes requestor's identity information and corresponding requestor's private key;If so, according to requestor's private key pair
The encrypted result data are decrypted, and obtain decrypted result data;Wherein, the client public key and the private key for user
For symmetric key, the monitoring party public key and the monitoring party private key are symmetric key, and decoding request person's information is corresponding
Requestor is the user or the regulator, and requestor's private key is private key for user or monitoring party private key.
Optionally, described according to the client public key and the monitoring party public key, the target clear data is added
Close processing generates encrypted result data, comprising: obtains the data ciphertext for forming the encrypted result data, ciphertext certification respectively
Code and key ciphertext group;According to preset rules, the data ciphertext, the ciphertext authentication code and the key ciphertext group are carried out
Permutation and combination obtains the encrypted result data.
Optionally, the acquisition forms the data ciphertext of the encrypted result data, comprising: random generation one is symmetrical to be added
Key;According to symmetric encipherment algorithm, the clear data is encrypted using the symmetric cryptographic key, obtains the number
According to ciphertext.
Optionally, described to obtain the ciphertext authentication code for forming the encrypted result data, comprising: to generate a message at random
Authentication code key;According to message authentication code algorithm, calculated described in the data ciphertext using the authentication code key
Ciphertext authentication code.
Optionally, described to obtain the key ciphertext group for forming the encrypted result data, comprising: according to the integrated encryption of public key
Scheme uses the client public key and the monitoring party public key respectively, encrypts the symmetric cryptographic key and the message authentication
Code key, obtains the key ciphertext group.
Optionally, described that the encrypted result data are decrypted according to requestor's private key, it is decrypted
Result data, comprising: encipherment scheme is integrated according to public key, it is corresponding to decrypt requestor's public key using requestor's private key
The key ciphertext, obtains symmetric cryptographic key and authentication code key;According to Message Digest 5, recognized using the message
Card code cipher key calculation obtains the target message authentication code of the data ciphertext;Judge the target message authentication code and the ciphertext
Whether authentication code is identical;If the target message authentication code and the ciphertext authentication code be not identical, stop decryption oprerations, and show
Show the information for stopping decryption oprerations.
Optionally, if the message authentication code is identical with the ciphertext authentication code, according to symmetric encipherment algorithm, institute is used
It states symmetric cryptographic key and decrypts the data ciphertext, obtain the data clear text.
In order to solve the above technical problems, the second technical solution used in the embodiment of the present invention is as follows:
A kind of transaction maintenance device, for supervising the transaction of block chain comprising: module is obtained, for obtaining
Target clear data, data encryption request, the corresponding client public key of user and the corresponding monitoring party public key of monitoring party of user;Add
Close module, it is raw for according to the client public key and the monitoring party public key, the target clear data to be encrypted
At encrypted result data;Judgment module receives the number for requiring that the encrypted result data are decrypted for judging whether
According to decoding request and corresponding decoding request person's information, decoding request person's information includes requestor's identity information and right with it
The requestor's private key answered;Processing module, for working as the data deciphering for receiving and requiring that the encrypted result data are decrypted
When request and corresponding decoding request person's information, place is decrypted to the encrypted result data according to requestor's private key
Reason, obtains decrypted result data;Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key
It is symmetric key with the monitoring party private key, the corresponding requestor of decoding request person's information is the user or the supervision
Person, requestor's private key are private key for user or monitoring party private key.
In order to solve the above technical problems, third technical solution used in the embodiment of the present invention is as follows:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is performed reality
Now such as above-mentioned transaction monitoring and managing method.
In order to solve the above technical problems, the 4th technical solution used in the embodiment of the present invention is as follows:
A kind of computer equipment comprising processor, memory and be stored on the memory and can be in the processing
The computer program run on device, the processor realize such as above-mentioned transaction monitoring and managing method when executing the computer program.
The beneficial effect of the embodiment of the present invention is: being in contrast to the prior art, the embodiment of the present invention passes through user's public affairs
Key and monitoring party public key, are encrypted target clear data, generate encrypted result data, and require to institute receiving
It is private according to the requestor when stating the data deciphering request and corresponding decoding request person's information that encrypted result data are decrypted
The encrypted result data are decrypted in key, obtain decrypted result data, solve following problems in the prior art:
Some applications be used to construct encryption digital cash transaction platform that is borderless and not supervised, and a large amount of illegal transactions are flat at these
It is continuously carried out on platform, adverse effect is caused to world and financial order.
Detailed description of the invention
Fig. 1 is the implementation flow chart of transaction one embodiment of monitoring and managing method of the embodiment of the present invention one;
Fig. 2 is the part-structure frame diagram of transaction one embodiment of maintenance device of the embodiment of the present invention two;
Fig. 3 is the part-structure frame diagram of one embodiment of computer readable storage medium of the embodiment of the present invention three;
Fig. 4 is the part-structure frame diagram of one embodiment of computer equipment of the embodiment of the present invention four.
Specific embodiment
Embodiment one
Referring to Fig. 1, Fig. 1 is the implementation flow chart of the transaction monitoring and managing method of the embodiment of the present invention, can be obtained in conjunction with Fig. 1
It arrives, a kind of transaction monitoring and managing method of the invention comprising once step:
Step S101: target clear data, data encryption request, the corresponding client public key of user and the supervision of user are obtained
The corresponding monitoring party public key in side.
Step S102: according to the client public key and the monitoring party public key, the target clear data is encrypted
Processing generates encrypted result data;
Step S103: judge whether to receive the data deciphering request for requiring that the encrypted result data are decrypted and
Corresponding decoding request person's information, decoding request person's information include that requestor's identity information and corresponding requestor are private
Key;
Step S104: if receiving the data deciphering request for requiring that the encrypted result data are decrypted and corresponding
Decoding request person's information is then decrypted the encrypted result data according to requestor's private key, obtains decryption knot
Fruit data.
Step S105: if being not received by the data deciphering request for requiring that the encrypted result data are decrypted and right
The decoding request person's information answered is not decrypted the encrypted result data then.
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party
Private key is symmetric key, and the corresponding requestor of decoding request person's information is the user or the regulator, the request
Person's private key is private key for user or monitoring party private key.
In the present embodiment, key is generated by user and monitoring party oneself, and encrypting and deciphering system only needs public key, private key
It is properly saved by holder oneself, the Core Generator of key is then that the tool that any support public private key pair generates can be with.Adding
When close, combining encryption directly is carried out using two or more public keys, one of public key is user, remaining is monitoring party
's.In simple terms, it is assumed that have data abc, obtain 080f after being encrypted with user key, obtained after being encrypted with monitoring party key
7df2, then final result is exactly that the two spellings get up to obtain 080f7df2, user and monitoring party either side can be decrypted
Oneself corresponding part.
In the present embodiment, optionally, described according to the client public key and the monitoring party public key, it is bright to the target
Literary data are encrypted, and generate encrypted result data, comprising:
First, data ciphertext, ciphertext authentication code and the key ciphertext group for forming the encrypted result data are obtained respectively.
Second, according to preset rules, the data ciphertext, the ciphertext authentication code and the key ciphertext group are arranged
Column combination, obtains the encrypted result data.
It is in the present embodiment, optionally, described to obtain the data ciphertext for forming the encrypted result data, comprising:
First, a symmetric cryptographic key is generated at random.
Second, according to symmetric encipherment algorithm, the clear data is encrypted using the symmetric cryptographic key, is obtained
The data ciphertext.
It is in the present embodiment, optionally, described to obtain the ciphertext authentication code for forming the encrypted result data, comprising:
First, an authentication code key is generated at random.
Second, according to message authentication code algorithm, the institute of the data ciphertext is calculated using the authentication code key
State ciphertext authentication code.
It is in the present embodiment, optionally, described to obtain the key ciphertext group for forming the encrypted result data, comprising:
Encipherment scheme is integrated according to public key, uses the client public key and the monitoring party public key respectively, it is described right to encrypt
Claim encryption key and the authentication code key, obtain the key ciphertext group, specifically: the integrated encryption of public key is applied multiple times
Scheme uses client public key and monitoring party public key, cryptographic symmetrical encryption key and authentication code key respectively, it is close to obtain key
Literary group, including the following steps:
1) temporary public key, private key pair, are generated at random.
2), shared key is calculated using decryption side public key and temporary private using cipher key agreement algorithm.
3), using key exported algorithm, temporary symmetric encryption key and interim message authentication code are exported using shared key
Key.
4), using symmetric encipherment algorithm, using temporary symmetric encryption key, cryptographic symmetrical encryption key and message authentication code
Key obtains temporary key ciphertext.
5), application message digest algorithm calculates decryption side public key abstract.
6) temporary public key, temporary key ciphertext and decryption side public key abstract, are combined, then application message authentication code algorithm,
Using interim message authentication code key, the interim message authentication code of the combination is calculated.
Wherein, the combination of temporary public key, temporary key ciphertext, decryption side public key abstract and interim message authentication code is as close
Key ciphertext, resulting data ciphertext, ciphertext authentication code and key ciphertext group are encrypted result data.
In the present embodiment, optionally, described that the encrypted result data are decrypted according to requestor's private key
Processing, obtains decrypted result data, comprising:
First, encipherment scheme is integrated according to public key, it is corresponding to decrypt requestor's public key using requestor's private key
The key ciphertext, obtains symmetric cryptographic key and authentication code key.
In this step, the obtaining step of symmetric cryptographic key and authentication code key specifically:
1), application message digest algorithm calculates one's own side's public key abstract.
2) key ciphertext group, is traversed, decryption side public key abstract and the identical key ciphertext of one's own side's public key abstract are found.
3), using cipher key agreement algorithm, using the temporary public key in one's own side's private key and key ciphertext, calculate share it is close
Key.
4), using key exported algorithm, temporary symmetric encryption key and interim message authentication code are exported using shared key
Key.
5), application message authentication code algorithm calculates the interim public affairs in key ciphertext using interim message authentication code key
The combined interim message authentication code that key, temporary key ciphertext, decryption side public key are made a summary.
6) the interim message authentication code in interim message authentication code obtained in the previous step and key ciphertext, is compared, if not
It is identical, then temporary public key, temporary key ciphertext, decryption side public key abstract, interim message authentication code in key ciphertext are wherein
One or more be tampered, stop decrypting process.
7) it, is obtained using symmetric encipherment algorithm using temporary key ciphertext in temporary symmetric encryption key decryption key ciphertext
To symmetric cryptographic key and authentication code key.
Second, according to Message Digest 5, the mesh of the data ciphertext is calculated using the authentication code key
Mark message authentication code.
Third judges whether the target message authentication code and the ciphertext authentication code are identical.
4th, if the target message authentication code and the ciphertext authentication code be not identical, stop decryption oprerations, and show
Stop the information of decryption oprerations.Because the target message authentication code and the ciphertext authentication code be not identical, illustrate data ciphertext,
Ciphertext authentication code one or more have been tampered with, it is necessary to stop decryption oprerations.
In the present embodiment, optionally, if the message authentication code is identical with the ciphertext authentication code, added according to symmetrical
Close algorithm decrypts the data ciphertext using the symmetric cryptographic key, obtains the data clear text, i.e. decrypted result data.
In the present embodiment, in the application of encryption and decryption, by recognizing symmetric encipherment algorithm, Message Digest 5, message
Demonstrate,prove code algorithm, cipher key agreement algorithm and key exported algorithm these types algorithm integrated application, realize to individual privacy
Data are encrypted, the encrypted result purpose that only data owner and monitoring party can decrypt.
Wherein, symmetric encipherment algorithm, Message Digest 5, message authentication code algorithm, key are used in the present invention program
Negotiation algorithm and key exported algorithm, these algorithms are limited to certain specific algorithm, but can be in this kind of algorithm
It arbitrarily selects as needed a kind of as specific implementation.
The embodiment of the present invention is encrypted target clear data by client public key and monitoring party public key, generates
Encrypted result data, and receiving the data deciphering request and corresponding solution for requiring that the encrypted result data are decrypted
When close applicant information, the encrypted result data are decrypted according to requestor's private key, obtain decrypted result
Data solve following problems in the prior art: some applications be used to construct encryption number that is borderless and not supervised
Moneytary operations platform, a large amount of illegal transactions are continuously carried out on these platforms, are caused to world and financial order
Adverse effect.In the present invention, individual privacy data are after using the present invention program encryption, only data owner or supervision
Side can be decrypted encrypted data.Therefore, before being transmitted or being stored by internet, using the present invention program
May achieve following effect to individual privacy data encryption: individual privacy data will not be obtained by the third party except monitoring party, prison
Pipe side can obtain specified individual privacy data if necessary, if encrypted data are tampered, the energy in decrypting process
It is detected, and clear data will not be encrypted repeatedly, avoids with the increase of monitoring party, and causing when data volume is larger
Ciphertext is excessive.Wherein, various types of algorithms involved in the present invention program do not limit specific algorithm, can according to need selection
Any one specific algorithm of such algorithm.One aspect of the present invention realizes individual privacy data and rests in a manpower, another
Aspect if necessary, so that regulatory agency is available to arrive specified data, and is supervised and is audited to these data.
Embodiment two
Referring to Fig. 2, Fig. 2 is the part-structure frame diagram of the transaction maintenance device of the embodiment of the present invention, it can be in conjunction with Fig. 2
It obtains, a kind of transaction maintenance device 100 of the invention, for supervising the transaction of block chain comprising:
Module 110 is obtained, for obtaining target clear data, the data encryption request, the corresponding user's public affairs of user of user
Key and the corresponding monitoring party public key of monitoring party.
Encrypting module 120, for according to the client public key and the monitoring party public key, to the target clear data into
Row encryption generates encrypted result data.
Judgment module 130 receives the data solution for requiring that the encrypted result data are decrypted for judging whether
Close request and corresponding decoding request person's information, decoding request person's information include requestor's identity information and corresponding
Requestor's private key.
Processing module 140 is requested for working as the data deciphering for receiving and requiring that the encrypted result data are decrypted
When with corresponding decoding request person's information, the encrypted result data are decrypted according to requestor's private key, are obtained
To decrypted result data.
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party
Private key is symmetric key, and the corresponding requestor of decoding request person's information is the user or the regulator, the request
Person's private key is private key for user or monitoring party private key.
The embodiment of the present invention is encrypted target clear data by client public key and monitoring party public key, generates
Encrypted result data, and receiving the data deciphering request and corresponding solution for requiring that the encrypted result data are decrypted
When close applicant information, the encrypted result data are decrypted according to requestor's private key, obtain decrypted result
Data solve following problems in the prior art: some applications be used to construct encryption number that is borderless and not supervised
Moneytary operations platform, a large amount of illegal transactions are continuously carried out on these platforms, are caused to world and financial order
Adverse effect.
Embodiment three
Referring to Fig. 3, can see with reference to Fig. 3, a kind of computer readable storage medium 10 of the embodiment of the present invention is described
Computer readable storage medium 10, such as: ROM/RAM, magnetic disk, CD are stored thereon with computer program 11, the calculating
Machine program 11 is performed the transaction monitoring and managing method realized as described in embodiment one.Since the transaction monitoring and managing method has been implemented
Example one is described in detail, and this will not be repeated here.
The transaction monitoring and managing method that the embodiment of the present invention is realized, by client public key and monitoring party public key, to target plaintext number
According to being encrypted, encrypted result data are generated, and receiving the number for requiring that the encrypted result data are decrypted
When according to decoding request and corresponding decoding request person's information, the encrypted result data are solved according to requestor's private key
Close processing obtains decrypted result data, solves following problems in the prior art: some applications be used to construct it is borderless and
The encryption digital cash transaction platform that do not supervised, a large amount of illegal transactions continuously carry out on these platforms, to the whole world
Society and financial order cause adverse effect.In the present invention, individual privacy data are after using the present invention program encryption, only
There are data owner or monitoring party encrypted data can be decrypted.Therefore, it is being transmitted or is being deposited by internet
Chu Qian, may achieve following effect to individual privacy data encryption using the present invention program: individual privacy data will not be by monitoring party
Except third party obtain, monitoring party can obtain specified individual privacy data if necessary, if encrypted data by
It distorts, can be detected in decrypting process, and clear data will not be encrypted repeatedly, avoid when data volume is larger, with
The increase of monitoring party, and cause ciphertext excessive.Wherein, various types of algorithms involved in the present invention program do not limit specific calculation
Method can according to need any one specific algorithm for selecting such algorithm.One aspect of the present invention realizes individual privacy data
It rests in a manpower, on the other hand if necessary, so that regulatory agency is available to arrive specified data, and to these data
It is supervised and is audited.
Example IV
Referring to Fig. 4, can see with reference to Fig. 4, a kind of computer equipment 20 of the embodiment of the present invention comprising processor
21, memory 22 and it is stored in the computer program 221 that can be run on the memory 22 and on the processor 21, it is described
Processor 21 realizes the transaction monitoring and managing method as described in embodiment one when executing the computer program 221.Since the transaction is supervised
Pipe method is described in detail in embodiment one, and this will not be repeated here.
The transaction monitoring and managing method that the embodiment of the present invention is realized, by client public key and monitoring party public key, to target plaintext number
According to being encrypted, encrypted result data are generated, and receiving the number for requiring that the encrypted result data are decrypted
When according to decoding request and corresponding decoding request person's information, the encrypted result data are solved according to requestor's private key
Close processing obtains decrypted result data, solves following problems in the prior art: some applications be used to construct it is borderless and
The encryption digital cash transaction platform that do not supervised, a large amount of illegal transactions continuously carry out on these platforms, to the whole world
Society and financial order cause adverse effect.In the present invention, individual privacy data are after using the present invention program encryption, only
There are data owner or monitoring party encrypted data can be decrypted.Therefore, it is being transmitted or is being deposited by internet
Chu Qian, may achieve following effect to individual privacy data encryption using the present invention program: individual privacy data will not be by monitoring party
Except third party obtain, monitoring party can obtain specified individual privacy data if necessary, if encrypted data by
It distorts, can be detected in decrypting process, and clear data will not be encrypted repeatedly, avoid when data volume is larger, with
The increase of monitoring party, and cause ciphertext excessive.Wherein, various types of algorithms involved in the present invention program do not limit specific calculation
Method can according to need any one specific algorithm for selecting such algorithm.One aspect of the present invention realizes individual privacy data
It rests in a manpower, on the other hand if necessary, so that regulatory agency is available to arrive specified data, and to these data
It is supervised and is audited.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (10)
1. a kind of transaction monitoring and managing method, for supervising the transaction of block chain, which is characterized in that the transaction monitoring and managing method packet
It includes:
Obtain target clear data, data encryption request, the corresponding client public key of user and the corresponding supervision of monitoring party of user
Square public key;
According to the client public key and the monitoring party public key, the target clear data is encrypted, generates encryption
Result data;
Judge whether to receive and the data deciphering that the encrypted result data are decrypted request and corresponding decryption is required to ask
The person's of asking information, decoding request person's information include requestor's identity information and corresponding requestor's private key;
If so, the encrypted result data are decrypted according to requestor's private key, decrypted result data are obtained;
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party private key
For symmetric key, the corresponding requestor of decoding request person's information is the user or the regulator, and the requestor is private
Key is private key for user or monitoring party private key.
2. transaction monitoring and managing method according to claim 1, which is characterized in that described according to the client public key and the prison
The target clear data is encrypted in pipe side's public key, generates encrypted result data, comprising:
Data ciphertext, ciphertext authentication code and the key ciphertext group for forming the encrypted result data are obtained respectively;
According to preset rules, the data ciphertext, the ciphertext authentication code and the key ciphertext group are subjected to permutation and combination, obtained
To the encrypted result data.
3. transaction monitoring and managing method according to claim 2, which is characterized in that the acquisition forms the encrypted result data
Data ciphertext, comprising:
A symmetric cryptographic key is generated at random;
According to symmetric encipherment algorithm, the clear data is encrypted using the symmetric cryptographic key, obtains the data
Ciphertext.
4. transaction monitoring and managing method according to claim 2, which is characterized in that the acquisition forms the encrypted result data
Ciphertext authentication code, comprising:
An authentication code key is generated at random;
According to message authentication code algorithm, authenticated using the ciphertext that the authentication code key calculates the data ciphertext
Code.
5. transaction monitoring and managing method according to claim 2, which is characterized in that the acquisition forms the encrypted result data
Key ciphertext group, comprising:
Encipherment scheme is integrated according to public key, uses the client public key and the monitoring party public key respectively, encryption is described symmetrically to be added
Key and the authentication code key obtain the key ciphertext group.
6. transaction monitoring and managing method according to claim 1, which is characterized in that it is described according to requestor's private key to described
Encrypted result data are decrypted, and obtain decrypted result data, comprising:
Encipherment scheme is integrated according to public key, it is close to decrypt the corresponding key of requestor's public key using requestor's private key
Text obtains symmetric cryptographic key and authentication code key;
According to Message Digest 5, authenticated using the target message that the data ciphertext is calculated in the authentication code key
Code;
Judge whether the target message authentication code and the ciphertext authentication code are identical;
If it is not, then stopping decryption oprerations, and show the information for stopping decryption oprerations.
7. transaction monitoring and managing method according to claim 6 characterized by comprising
If the message authentication code is identical with the ciphertext authentication code, according to symmetric encipherment algorithm, the symmetric cryptography is used
Key decrypts the data ciphertext, obtains the data clear text.
8. a kind of transaction maintenance device, for supervising the transaction of block chain characterized by comprising
Module is obtained, for obtaining target clear data, data encryption request, the corresponding client public key of user and the supervision of user
The corresponding monitoring party public key in side;
Encrypting module, for being encrypted to the target clear data according to the client public key and the monitoring party public key
Processing generates encrypted result data;
Judgment module, for judge whether to receive the data deciphering for requiring that the encrypted result data are decrypted request and
Corresponding decoding request person's information, decoding request person's information include that requestor's identity information and corresponding requestor are private
Key;
Processing module, for when receiving the data deciphering for requiring that the encrypted result data are decrypted request and corresponding
When decoding request person's information, the encrypted result data are decrypted according to requestor's private key, obtain decryption knot
Fruit data;
Wherein, the client public key and the private key for user are symmetric key, the monitoring party public key and the monitoring party private key
For symmetric key, the corresponding requestor of decoding request person's information is the user or the regulator, and the requestor is private
Key is private key for user or monitoring party private key.
9. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, the computer program quilt
Claim 1~7 described in any item transaction monitoring and managing methods are realized when execution.
10. a kind of computer equipment, which is characterized in that it includes processor, memory and is stored on the memory and can
The computer program run on the processor, the processor realize claim 1~7 when executing the computer program
Described in any item transaction monitoring and managing methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910759903.0A CN110474908B (en) | 2019-08-16 | 2019-08-16 | Transaction supervision method and device, storage medium and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910759903.0A CN110474908B (en) | 2019-08-16 | 2019-08-16 | Transaction supervision method and device, storage medium and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110474908A true CN110474908A (en) | 2019-11-19 |
CN110474908B CN110474908B (en) | 2022-04-05 |
Family
ID=68510954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910759903.0A Active CN110474908B (en) | 2019-08-16 | 2019-08-16 | Transaction supervision method and device, storage medium and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110474908B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111415155A (en) * | 2020-03-20 | 2020-07-14 | 中国建设银行股份有限公司 | Encryption method, device, equipment and storage medium for chain-dropping transaction data |
CN112131615A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Data storage mechanism supporting supervision |
CN112532656A (en) * | 2021-02-07 | 2021-03-19 | 腾讯科技(深圳)有限公司 | Block chain-based data encryption and decryption method and device and related equipment |
CN113378209A (en) * | 2020-02-25 | 2021-09-10 | 百度在线网络技术(北京)有限公司 | Prescription data processing method, device, equipment and medium based on block chain |
CN114928756A (en) * | 2022-05-27 | 2022-08-19 | 浙江大华技术股份有限公司 | Video data protection, encryption and verification method, system and equipment |
CN115118751A (en) * | 2022-07-15 | 2022-09-27 | 广东浪潮智慧计算技术有限公司 | Block chain-based supervision system, method, equipment and medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101123501A (en) * | 2006-08-08 | 2008-02-13 | 西安电子科技大学 | A WAPI authentication and secret key negotiation method and system |
CN101183938A (en) * | 2007-10-22 | 2008-05-21 | 华中科技大学 | Wireless network security transmission method, system and equipment |
CN103825733A (en) * | 2014-02-28 | 2014-05-28 | 华为技术有限公司 | Communication method, device and system based on combined public key cryptography system |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN108647968A (en) * | 2018-05-10 | 2018-10-12 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
CN108765240A (en) * | 2018-07-16 | 2018-11-06 | 阿里巴巴集团控股有限公司 | Inter-agency customer authentication method, transaction monitoring and managing method based on block chain and device |
CN109034796A (en) * | 2018-06-15 | 2018-12-18 | 重庆金融资产交易所有限责任公司 | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN109462472A (en) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | The methods, devices and systems of data encryption and decryption |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
CN109727031A (en) * | 2018-12-27 | 2019-05-07 | 数据通信科学技术研究所 | A kind of anonymous digital cash transaction monitoring and managing method of center concealment |
-
2019
- 2019-08-16 CN CN201910759903.0A patent/CN110474908B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101123501A (en) * | 2006-08-08 | 2008-02-13 | 西安电子科技大学 | A WAPI authentication and secret key negotiation method and system |
CN101183938A (en) * | 2007-10-22 | 2008-05-21 | 华中科技大学 | Wireless network security transmission method, system and equipment |
CN103825733A (en) * | 2014-02-28 | 2014-05-28 | 华为技术有限公司 | Communication method, device and system based on combined public key cryptography system |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN109462472A (en) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | The methods, devices and systems of data encryption and decryption |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
CN108647968A (en) * | 2018-05-10 | 2018-10-12 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
CN109034796A (en) * | 2018-06-15 | 2018-12-18 | 重庆金融资产交易所有限责任公司 | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN108765240A (en) * | 2018-07-16 | 2018-11-06 | 阿里巴巴集团控股有限公司 | Inter-agency customer authentication method, transaction monitoring and managing method based on block chain and device |
CN109727031A (en) * | 2018-12-27 | 2019-05-07 | 数据通信科学技术研究所 | A kind of anonymous digital cash transaction monitoring and managing method of center concealment |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112131615A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Data storage mechanism supporting supervision |
CN113378209A (en) * | 2020-02-25 | 2021-09-10 | 百度在线网络技术(北京)有限公司 | Prescription data processing method, device, equipment and medium based on block chain |
CN113378209B (en) * | 2020-02-25 | 2023-10-31 | 百度在线网络技术(北京)有限公司 | Prescription data processing method, device, equipment and medium based on block chain |
CN111415155A (en) * | 2020-03-20 | 2020-07-14 | 中国建设银行股份有限公司 | Encryption method, device, equipment and storage medium for chain-dropping transaction data |
CN111415155B (en) * | 2020-03-20 | 2024-02-09 | 中国建设银行股份有限公司 | Encryption method, device, equipment and storage medium for falling-chain transaction data |
CN112532656A (en) * | 2021-02-07 | 2021-03-19 | 腾讯科技(深圳)有限公司 | Block chain-based data encryption and decryption method and device and related equipment |
CN112532656B (en) * | 2021-02-07 | 2021-05-11 | 腾讯科技(深圳)有限公司 | Block chain-based data encryption and decryption method and device and related equipment |
CN114928756A (en) * | 2022-05-27 | 2022-08-19 | 浙江大华技术股份有限公司 | Video data protection, encryption and verification method, system and equipment |
CN115118751A (en) * | 2022-07-15 | 2022-09-27 | 广东浪潮智慧计算技术有限公司 | Block chain-based supervision system, method, equipment and medium |
CN115118751B (en) * | 2022-07-15 | 2024-04-19 | 广东浪潮智慧计算技术有限公司 | Blockchain-based supervision system, method, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN110474908B (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110474908A (en) | Transaction monitoring and managing method and device, storage medium and computer equipment | |
CN102170357B (en) | Combined secret key dynamic security management system | |
CA2747891C (en) | Method for generating an encryption/decryption key | |
CN104322003B (en) | Cryptographic authentication and identification method using real-time encryption | |
CN107347058A (en) | Data ciphering method, data decryption method, apparatus and system | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
CN104579680B (en) | A kind of method of secure distribution seed | |
CN110061957A (en) | Data encryption, decryption method, user terminal, server and data management system | |
CN107707562A (en) | A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm | |
CN107154916A (en) | A kind of authentication information acquisition methods, offer method and device | |
Njorbuenwu et al. | A survey on the impacts of quantum computers on information security | |
CN106657002A (en) | Novel crash-proof base correlation time multi-password identity authentication method | |
CN112380404B (en) | Data filtering method, device and system | |
CN102882687A (en) | Intelligent household safe access method and system based on searchable cipher text | |
CN107733936A (en) | A kind of encryption method of mobile data | |
CN100561913C (en) | A kind of method of access code equipment | |
CN106992865A (en) | Data signature method and system, data sign test method and device | |
Prabha et al. | A review of cyber security in cryptography: Services, attacks, and key approach | |
CN104468535B (en) | It is adapted to ciphertext storage and connection query system and the method for cloud environment | |
KR20120069387A (en) | A method for searching keyword based on public key | |
JP5799635B2 (en) | ENCRYPTED DATA SEARCH SYSTEM, DEVICE, METHOD, AND PROGRAM | |
CN108134799A (en) | Novel encipher-decipher method and its device | |
CN109660490A (en) | Data processing method, device, system and storage medium | |
KR102308248B1 (en) | Encryption Gateway equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service between IoT device using the same | |
CN1224925C (en) | Method of digit identity authentication based on features of non-biophysics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220315 Address after: 510700 building 301, 302, 303, 304 and 305, No. 2, 233 Kezhu Road, Huangpu District, Guangzhou, Guangdong (office only) Applicant after: Guangdong Weiwei digital identity Technology Co.,Ltd. Address before: 518054 802, 8th floor, building 2, Xunmei science and Technology Plaza, Keyuan Road, science and Technology Park, Yuehai street, Shenzhen, Guangdong Applicant before: WEWAY (SHENZHEN) NETWORK TECHNOLOGY CO.,LTD. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |