CN114897527B - Authentication method for realizing commercial warranty claim value based on workload certification - Google Patents
Authentication method for realizing commercial warranty claim value based on workload certification Download PDFInfo
- Publication number
- CN114897527B CN114897527B CN202210551810.0A CN202210551810A CN114897527B CN 114897527 B CN114897527 B CN 114897527B CN 202210551810 A CN202210551810 A CN 202210551810A CN 114897527 B CN114897527 B CN 114897527B
- Authority
- CN
- China
- Prior art keywords
- workload
- seller
- buyer
- contract
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000008520 organization Effects 0.000 claims abstract description 16
- 230000005540 biological transmission Effects 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 6
- 230000035772 mutation Effects 0.000 abstract description 2
- 230000008092 positive effect Effects 0.000 abstract description 2
- 238000012800 visualization Methods 0.000 abstract description 2
- 238000012544 monitoring process Methods 0.000 abstract 1
- 238000012795 verification Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 238000012954 risk control Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Human Resources & Organizations (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an authentication method for realizing the value of the credit of commercial warranty based on workload certification, which comprises the following steps: each participant node registers a blockchain account as required, and a certificate authority provides a public key certificate for each participant node; the seller obtains a verifiable contract certification certificate through the target intelligent contract; the seller obtains the verified workload digital bill which is approved by the third party monitoring organization and the buyer by using the target intelligent contract. Compared with the prior art, the invention has the positive effects that: the invention innovatively utilizes the blockchain technology to provide the seller authentication method based on the workload financing, promotes the whole-chain information sharing of the workload, realizes the visualization of the workload financing, enables the digital bill creditor value of the workload of the seller project in a certain period by virtue of objective credit of a buyer and a third-party management organization, improves the efficiency of capital circulation, and realizes the mutation of enterprise scale.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to an authentication method for realizing commercial warranty claim value based on workload certification.
Background
Under the background that the country vigorously promotes receivable financing, emphasizes the economy of financial service entities and prevents and controls financial risks, the business guarantee has grown into the fastest-developing industry in supply chain finance, and plays an increasingly important role in promoting credit trade at home and abroad and meeting the financing and service entity economy of small and medium-sized enterprises. However, under the objective condition that short boards still exist in the domestic credit system construction at the present stage, the business warranty business expansion based on the workload certification is limited to a certain extent. On one hand, the insurance management company cannot fully judge the authenticity of conditions such as trade contracts, trade backgrounds, trade data, receivable accounts and the like of the buyer and the seller; on the other hand, the data of the whole trade link has no three-party public trust voucher, and an authentication method based on the creditor value proved by the workload is lacked in the trade process; therefore, the risk control of the insurance company cannot be standardized, and the seller often has difficulty in obtaining the credit of the insurance company based on the work amount insurance financing.
The blockchain is essentially a decentralized database, and as an underlying technology, is a string of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, which is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. In addition, the block chain technique has the following characteristics: firstly, transaction information is recorded by a network temporary node, and the network temporary node has no third party and is not controlled by individuals and organizations; secondly, the data of all nodes are synchronized in real time, and the whole system is not influenced by the failure of an individual node; third, all transactions are signed, and others cannot tamper with the transactions.
Therefore, the invention provides a set of complete authentication, encryption or signature mechanism by applying the technical innovation in the aspects of distributed accounts, asymmetric encryption and authorization technology, intelligent contract and the like in the block chain technology, helps the warranty organization verify the conditions of trade contracts, trade backgrounds, receivable accounts and the like, ensures that public key certificates, contract certification certificates and work amount digital bills on the chain acquire the consensus of all participants, and truly records the generation and circulation of debt so as to ensure the authenticity and reliability of transactions, reduce the operating risk and standardize transaction flows.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a method for realizing the authentication of the creditor value of the commercial insurance policy based on the workload certification, which takes the workload (future receivable accounts) in the time period after the contract is signed and before the invoicing and the posting as the object of the insurance policy financing, and realizes the financing of the transaction progress money item of the seller by the insurance policy based on the public chain, wherein the workload (future receivable accounts) comprises the working value and the asset value of the labor service.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for realizing the authentication of the creditor value of the commercial warranty based on the workload certification comprises the following steps:
step one, each participant node registers a blockchain account as required to obtain a private key and a public key of the participant node, and a certificate management mechanism provides a public key certificate for each participant node;
step two, the sender node and the receiver node obtain a shared session symmetric key through exchanging keys, and encrypt contract information, block chain addresses and identity information by using the session symmetric key, and the seller obtains a verifiable contract certificate through a target intelligent contract;
step three, the seller and the third party supervising agency obtain a shared session symmetric key through exchanging keys, the seller encrypts and signs the workload in a certain period and then sends the workload to the third party supervising agency, and then the third party supervising agency verifies and authenticates the workload of the seller in a certain period;
step four, the third party supervising organization and the buyer obtain a shared session symmetric key through exchanging keys, the third party supervising organization encrypts and signs the workload in a certain period and then sends the encrypted and signed workload to the buyer, and the buyer rechecks the related information sent by the third party supervising organization and finally achieves consensus;
step five, the seller obtains the digital bills of the workload which can be verified and are approved by the third party supervision institution and the buyer by using the target intelligent contract;
and step six, the seller negotiates with a warranty manager on line, signs a warranty agreement, and then writes an intelligent contract according to the warranty agreement and the workload digital bill with the help of the buyer.
Compared with the prior art, the invention has the positive effects that:
the invention innovatively utilizes a blockchain technology to provide a seller authentication method based on workload financing, promotes the full-chain information sharing of workload, realizes the visualization of workload financing, enables the seller project to have the digital bill debt value of the workload in a certain period by relying on the credit of a buyer and a third-party management organization, improves the efficiency of capital circulation, and realizes the mutation of enterprise scale.
All public key certificates, contract certification certificates and workload digital bills generated by the system are safely, completely and permanently recorded in all block chain nodes, so that the rapid confirmation and real-time sharing synchronization of all participants on a system platform are realized, the problem of creditor value of workload financing in a seller project period is solved, meanwhile, a real data source is provided for follow-up credit investigation, risk control and the like of a warranty manager, more accurate enterprise credit investigation can be acquired, and a good financial ecology is formed.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is a timing flow diagram of a method for implementing business warranty claim value authentication based on workload certification, in accordance with an embodiment of the present invention;
fig. 2 is a time stamp and deadline for a method of authenticating a value of a business warranty claim based on a workload certificate according to an embodiment of the present invention.
Detailed Description
An authentication method for realizing commercial warranty claim value based on workload certification comprises the following steps:
1. each participant node registers a blockchain account as required to obtain a private key and a public key of the participant node, and the certificate management mechanism provides a public key certificate for each participant node to prevent a counterfeiter from forging user information, wherein the participant nodes comprise a seller, a buyer, a third party supervision mechanism and a warranty manager; the public key certificate comprises public key information, enterprise identity information, a block chain address, a timestamp and the like;
2. by using the modern cryptography Diffie-Hellman algorithm, a sending party node and a receiving party node can exchange keys safely to obtain a shared session symmetric key, and contract information, block chain addresses, identity information and the like are encrypted by the session symmetric key, so that a seller can obtain a verifiable contract certificate safely through a target intelligent contract; the contract certification certificate comprises transaction main contract information, transaction supplementary contract information, contract term, contract amount, message authentication code and the like;
3. the seller and the third party supervising agency exchange keys safely to obtain a shared session symmetric key, the seller encrypts and signs the workload in a certain period and sends the encrypted and signed workload to the third party supervising agency, and then the third party supervising agency verifies and authenticates the workload in the certain period of the seller;
4. the third party supervising agency and the buyer exchange keys safely to obtain a shared session symmetric key, the third party supervising agency encrypts and signs the workload in a certain period and sends the encrypted and signed workload to the buyer, and the buyer rechecks the related information sent by the third party supervising agency to finally achieve consensus.
5. Through the information disclosed by the network and the message verification code and the calculation coding information returned to the seller, the seller obtains the workload digital bill which is approved and verifiable by the third party supervision institution and the buyer by using the target intelligent contract; the workload digital bill is used as a target object of the insurance financing and comprises workload information, a contract certification certificate, a workload period in the period, workload amount in the period, a message authentication code, contract information and the like;
6. the seller negotiates with a policy holder on line, signs a policy agreement, and then writes an intelligent contract according to information (such as loan amount, term and the like) in the policy agreement and related information of the workload digital bill with the help of the buyer, so that the programmed calculation of the creditor value of the workload digital bill can be completed.
Further, the obtaining of the public key certificate includes the following steps:
(1) The seller S, the buyer B, the insurance manager F and the third party supervision institution 3PS register accounts in the block system;
(2) Certificate authority CA uses its private key SK CA The public key PK, the real identity ID and the block chain address @aredigitally signed, and the public key certificates of a seller S, a buyer B, a policy holder F and a third party supervision institution 3PS are automatically generated by a target intelligent contract in the block chain system:
where T is the current timestamp, which may be taken as the expiration date, and the certificate is revoked if it is too old. Enterprises can send own public keys, identity information and block chain addresses to users in need through public key certificates, and receivers can verify the certificates by using the public keys of certificate authorities CA, namely
The public key certificate is digitally signed by a certificate authority by using a secret key, so that the whole content of the file is ensured to be correct, and the public key certificate has the characteristics of safety, uniqueness, convenience and the like; the public key certificate is equivalent to the user's identity card, and the public key certificate can prove the user's identity and inquire the encrypted transmission information when the user communicates over the network.
Further, the acquiring of the contract certification certificate comprises the following steps:
(1) The seller S and the buyer B set two same large prime numbers p and n, g is the primitive root of p, and p and g are disclosed to the network;
(3) Buyer B selects a large random number x 2 E (1, n), publicly transmitGive seller S and calculate session symmetric key
(4) Seller S passes P C Calculating a symmetric keyBuyer B calculates message authentication codeWhereinIs a public function controlled by a secret key, tx is a contract text, a tx Is the total amount of the contract, d tx Is contract term, and then buyer B publishes it through its own Web serviceP B ;
(5) Seller S utilizes a target intelligent contract to generate a contract proof certificateContract certificateMay be provided to interested parties and may verify their true identity with the aid of buyer B, wherein:
whereinIs the target intelligent contract blockchain address of the contract proof certificate. Here, only the disclosed multivariate array (P) is needed B ,x 1 ,C S ,tx,a tx ,d tx ) Can be recalculatedWith respect to the precedingMaking comparison, i.e. verifying contract certificateWhether it has been tampered with.
The contract certificate generated by the DH algorithm through the target intelligent contract is unique, transparent, non-tamper-proof and verifiable, and a verifiable and real digital evidence is provided for financing a series of workloads completed by subsequent sellers based on projects.
Further, the acquisition of the workload digital ticket comprises the following steps:
(1) Seller S selects a large random number k 1 E (1, n), workload information WP and public key certificate C S And a contract certificateAnd the like, and sends a signature request to the third party proctoring authority 3 PS:
(2) Public key PK of seller S for third party supervision agency 3PS S Verifying the digital signature based on the public key certificate C S Before verifying the workload information WPWhether to issue; the third party supervision authority 3PS selects a large random number k 2 E (1, n), and calculating K SP Andthen the third party supervision agency 3PS publishes the information through the Web service thereof
At the same time, the third party supervision authority 3PS selects a large random number l 1 E (1, n), sending a signature request to buyer B and issuing through the Web service
(3) Buyer B uses the public key PK of the third party supervision agency 3PS 3PS Verifying the digital signature based on the public key certificate C S And C 3PS It is verified whether the workload information WP has been issued before. Buyer B selects a large random number l 2 E (1, n), and calculating K PB Andthen the buyer B publishes the information through the Web service thereof
(4) Seller S obtains workload digital bills automatically generated according to target intelligent contractsThe digital ticket of the workload can be verified for authenticity with the help of the third party proctoring authority 3PS, buyer B:
wherein d is WP Is the start time, d 'of the duty cycle' WP Is the deadline for the workload period, which is the time for the seller S to complete the project portion of work; in addition, the first and second substrates are,for target intelligent contract block chain address of work quantity digital bill, total amount of work quantity made
Here, only the multi-element array is needed to be passedAndcan be recalculatedAndcomparing with message verification code in certificate, the workload digital bill can be verifiedWhether it has been tampered with; thus, the authentication of information such as contract text, workload text, amount, term, etc. can be completed.
The workload digital bill is signed and confirmed by a third party supervising organization and a buyer, namely the credit guarantee of the third party supervising organization and the buyer is obtained, and the digital bill has the characteristics of uniqueness, transparency, no tampering and verifiability; the work amount digital ticket is a future receivable of a seller (creditor) based on a certain period of time work amount, i.e., a buyer (creditor) is required to fulfill a payment obligation for a transaction part of money in the presence of a contracted and validated base contract, and the circulation of the work amount digital ticket means the transfer of a future receivable creditor based on a work amount. The creditor value of the workload digital bill is to be the total amount a of the workload WP Based on the data, the data are estimated by the maintainers from multiple dimensions, and the influence factors comprise the interest structure, borrowing time, amount, application, overdue age, the credit form identification report of the maintainers, credit condition of debtors, property condition of repairable debts, change coefficient and the like.
The cryptography Diffie-Hellman algorithm is used in the invention, but is not limited to the Diffie-Hellman algorithm, and also comprises an elliptic curve cryptography algorithm (EEB algorithm), an elliptic curve Diffie-Hellman algorithm (EBDH algorithm) and the like; in addition, the public DH value generated by the DH algorithm is transmitted by explicit signature or identity authentication so as to prevent a counterfeiter or a middleman from attacking the authentication method. The sender (e.g., seller) authenticates the Web service before sending the request, and the connection can be protected with HTTPS, thus enhancing the privacy and confidentiality of the sender's financial data.
The invention will be described in detail below with reference to the following drawings:
the embodiment provides an authentication method for realizing the creditor value of the business insurance policy based on the workload certification, and a project contractor (seller) authenticates the workload in a project period by using a block chain technology so as to finance the insurance policy and improve the liquidity of enterprise funds.
Fig. 1 is a timing flow chart of a method for implementing authentication of creditor value of a commercial warranty based on workload certification according to an embodiment of the present invention, as shown in fig. 1, the method includes the steps of:
s101, after the project contractor S (seller), the project company B (buyer), the insurance manager F and the supervisor 3PS register the account in the blockchain system, the certificate authority CA uses the private key SK CA Carrying out digital signature on a public key PK, a real identity ID and a block chain address @, and automatically generating public key certificates of a project contractor S, a project company B, a warranty F and a proctor 3PS by a target intelligent contract in a block chain system:
where T is the current timestamp, which may be taken as the expiration date, and the certificate is revoked if it is too old. The enterprise can send its own public key, identity information and block chain address to the required user by means of public key certificate, and the receiver can use the public key of certificate authority CA to verify the certificate, i.e. the enterprise can use the public key of certificate authority CA to make verification
S102, the project contractor S randomly generates a large random number x through the block chain system 1 E (1, n), sendTo project company B;
s103, item company B selects a large random number x 2 E (1, n), sendGiving the project contractor S and calculating the symmetric keyProject company B calculates message authentication codeWhereinIs a public function controlled by a secret key, tx is a contract text, a tx Is the total amount of the contract, d tx Is contract term, then project company B publishes through its own Web service
S104, the project contractor S passes through P B Calculating a symmetric keyThe project contractor S verifies the contract certificate generated by the intelligent contractProvided to interested parties and can verify their true identity with the aid of project company B, wherein
Here, only pass (P) B ,x 1 ,C S ,tx,a tx ,d tx ) Can be recalculatedWith respect to the precedingAnd comparing to verify whether the card is tampered.
S105, the project contractor S selects the large random number k 1 E (1, n), sends a signature request to the third party proctoring company 3 PS:
s106, the third party proctoring organization 3PS uses the public key PK of the project contractor S S Verifying the digital signature based on the public key certificate C S It is verified whether the workload information WP has been issued before. Proctorial 3PS selects a large random number k 2 E (1, n) and calculateK SP Andthen the proctor company 3PS publishes the information through the Web service thereof
At the same time, proctoring company 3PS selects a random number l 1 E (1, n), sending a signature request to a project company B and issuing the signature request through a Web service
S107, the project company B uses the public key PK of the project contractor S A Verifying the digital signature based on the public key certificate C S And C 3PS It is verified whether the workload information WP has been issued before. Project company B selects a large random number l 2 E.g. 1, n, andcalculate K PB Andthen the project company B publishes the information through the Web service thereof
S108, the project contractor S obtains the work quantity digital bill automatically generated according to the intelligent contractThe digital bill of work amount can be verified for authenticity with the help of proctoring company 3PS, project company B:
wherein d is WP Is the start time of a cycle, d' WP Is the deadline time for the period, which is the time for the project contractor S to complete the project part work; in addition, the workload proves the total amountHere, only the multi-element array is needed to be passedAndcan be recalculatedComparing with message verification code in certificate, the certificate of contract certification can be verifiedWhether it has been tampered with.
S109, the project contractor negotiates with the warranty manager on line and signs a warranty agreement.
S110, generating a target intelligent contract according to information (such as loan amount, term and the like) in the warranty agreement and related information of the work quantity digital bill, and finishing the programmed calculation of the creditor value of the work quantity digital bill.
The contract information includes a project contract, a project series supplement contract, and the like; the workload information comprises a finished project quantity table, a verified project pricing report, a project price settlement list and other related proving materials. The method for carrying out the work checking and pricing depends on the mode determined in the project contract, the work checking and pricing in quarter and the work checking and pricing in the last time are mainly carried out, the project with the construction period less than three months is carried out, and the work checking and pricing in one time after completion is carried out. Quarter employee identification and pricing are completed before ten days of the first month in the next quarter, and node employee identification and pricing are completed within ten days after the project contractor applies for the node employee identification and pricing; the last time of the test is completed after the first test and before the formal acceptance.
The work amount digital bill is signed and confirmed (i.e. credit guarantee) by a third party proctoring organization and a project company, has the characteristics of uniqueness, transparency, no tampering and verifiability, is future receivable of the project contractor (creditor) based on the work amount in a certain time period, namely, the project company (creditor) is required to fulfill the payment obligation of partial money of a transaction under the condition that a reserved and effective basic contract exists, and the circulation of the work amount digital bill means the transfer of the future receivable credit obligation based on the work amount, namely, if the project contractor and the warrant complete the transfer of the work amount digital bill, the creditor is changed from the project contractor to a warranty. Work byThe creditor value of the digital bill will be in the total amount of the workload a WP Based on the data, the data are estimated by the maintainers from multiple dimensions, and the influence factors comprise the interest structure, borrowing time, amount, application, overdue age, the credit form identification report of the maintainers, credit condition of debtors, property condition of repairable debts, change coefficient and the like.
FIG. 2 is a time stamp and a deadline of an authentication method for implementing a business warranty claim value based on a workload certification, the Δ d WP =d′ WP -d WP ,Δd=d tx -d′ WP . Since verifying the message authentication code MAC requires C S Therefore, the validity period of the public key certificate should be longer than the workload certification deadline, and the timestamp of the public key certificate of the participant node should satisfy T<d WP (ii) a Additionally, workload-based financing is financing after the start of a project and before the completion of the project, so the deadline for the proof of workload should be less than the contract deadline, i.e., d' WP <d tx 。
Claims (8)
1. An authentication method for realizing commercial warranty claim value based on workload certification is characterized in that: the method comprises the following steps:
step one, each participant node registers a blockchain account as required to obtain a private key and a public key of the participant node, and a certificate management mechanism provides a public key certificate for each participant node;
step two, the sender node and the receiver node obtain a shared session symmetric key through exchanging keys, and encrypt contract information, block chain addresses and identity information by using the session symmetric key, and the seller obtains a verifiable contract certificate through a target intelligent contract; wherein, the acquisition of the contract certification certificate comprises the following steps:
(1) The seller S and the buyer B set two same large prime numbers p and n, g is the primitive root of p, and the p and g are disclosed to the network;
(2) Seller S randomly generates a large random number x through the blockchain system 1 E (1, n), publicly transmitGiving the buyer B;
(3) Buyer B randomly generates a large random number x through the blockchain system 2 E (1, n), publicly transmitGive seller S and calculate session symmetric key
(5) Buyer B calculates message authentication codeWhereinIs a public function controlled by a secret key, tx is a contract text, a tx Is the total amount of the contract, d tx Is a contract term, and then the buyer B publishes the contract term through the self Web service
Wherein, C S Is a public key certificate of the seller S,a target intelligent contract blockchain address for a contract certification certificate;
step three, the seller and the third party supervising agency obtain a shared session symmetric key through exchanging keys, the seller encrypts and signs the workload in a certain period and then sends the workload to the third party supervising agency, and then the third party supervising agency verifies and authenticates the workload of the seller in a certain period;
step four, the third party supervising organization and the buyer obtain a shared session symmetric key through exchanging keys, the third party supervising organization encrypts and signs the workload in a certain period and then sends the encrypted and signed workload to the buyer, and the buyer rechecks the related information sent by the third party supervising organization and finally achieves consensus;
step five, the seller obtains the workload digital bill which is approved and verifiable by the third party supervision institution and the buyer by using the target intelligent contract; the acquisition of the workload digital ticket comprises the following steps:
(1) Seller S selects a large random number k 1 E (1, n), for workload information WP, public key certificate C S And certificate of contract certificationEncrypts and sends a signature request to the third party authority 3 PS:
(2) Public key PK of seller S for third party proctoring organization 3PS S Verifying digital signaturesAccording to public key certificate C S Verifying whether the workload information WP has been issued; the third party supervision authority 3PS selects a large random number k 2 E (1, n), and calculating K SP Andthen the third party supervision authority 3PS publishes the information through the Web service thereof
At the same time, the third party supervision authority 3PS selects a large random number l 1 E (1, n), sends signature request to buyer B and releases through Web service
(3) Buyer B uses the public key PK of the third party supervision agency 3PS 3PS Verifying the digital signature based on the public key certificate C S And C 3PS Verifying whether the workload information WP has been issued; buyer B selects a large random number l 2 E (1, n), and calculating K PB Andthen the buyer B publishes the information through the Web service thereof
(4) Seller S obtains a workload digital ticket automatically generated according to a target intelligent contract
Wherein, d WP Is the start time of the duty cycle, d' WP Is the cutoff time for the duty cycle,a target intelligent contract block chain address of a workload digital bill;
and step six, the seller negotiates with a warranty manager on line, signs a warranty agreement, and then writes an intelligent contract according to the warranty agreement and the workload digital bill with the help of the buyer.
2. The method of claim 1, wherein the method comprises the steps of: the public key certificate acquisition method comprises the following steps:
(1) Each participant node registers an account in the blockchain system;
(2) Certificate authority CA uses its private key SK CA The public key, the real identity and the block chain address of each participant node are digitally signed, and the public key certificate of each participant node is automatically generated by a target intelligent contract in a block chain system:
wherein, C S 、C B 、C F 、C 3PS Respectively representing public key certificates, T, of the seller S, the buyer B, the policy holder F and the third party proctoring authority 3PS S 、T B 、T F 、T 3PS Respectively represent the time stamps and IDs of the seller S, the buyer B, the insurance provider F and the third party supervision agency 3PS at the time of registration S 、ID B 、ID F 、ID 3PS Respectively representThe real identities of the seller S, the buyer B, the insurance manager F and the third party proctoring agency 3PS are respectively represented by @ S, @ B, @ F and @3PS, the block chain addresses of the seller S, the buyer B, the insurance manager F and the third party proctoring agency 3PS, and PK S 、PK B 、PK F 、PK 3PS Respectively, public keys of the seller S, the buyer B, the policy holder F, and the third party proctoring authority 3 PS.
3. The method of claim 2, wherein the method comprises the steps of: the receiver verifies the public key certificate provided by the sender by using the public key of the certificate authority CA to determine the identity of the sender and to query the encrypted transmission information.
4. The method of claim 1, wherein the method comprises the steps of: the receiver receives the contract certificate provided by the seller SThen, with the help of buyer B, through the published multivariate array (P) B ,x 1 ,C S ,tx,a tx ,d tx ) RecalculateThen prove the certificate with the contractInMaking comparison, i.e. verifying contract certificateWhether it has been tampered with.
5. The method of claim 1An authentication method for realizing commercial warranty claim value based on workload certification is characterized in that: the manager receives the work amount digital bill provided by the seller SThen, with the help of the third party proctoring organization 3PS, buyer B, through the multi-element arrayAndcan be recalculatedAndthen prove the certificate with the contractComparing the message authentication codes in (1) to verify the workload digital ticketWhether it has been tampered with; and further, the certification of contract texts, workload texts, money amounts and time limits is completed.
6. The method of claim 1, wherein the method comprises the steps of: the timestamp of the public key certificate of each participant node is less than the start time of the workload cycle.
7. The method of claim 1, wherein the method comprises the steps of: the deadline for the workload period is less than the contract period.
8. The method of claim 1, wherein the method comprises the steps of: the sender node and the receiver node can generate the key by using a Diffie-Hellman algorithm, an EEB algorithm or an EBDH algorithm, wherein the EEB algorithm is an elliptic curve cryptography algorithm, and the EBDH algorithm is an elliptic curve Diffie-Hellman algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210551810.0A CN114897527B (en) | 2022-05-20 | 2022-05-20 | Authentication method for realizing commercial warranty claim value based on workload certification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210551810.0A CN114897527B (en) | 2022-05-20 | 2022-05-20 | Authentication method for realizing commercial warranty claim value based on workload certification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114897527A CN114897527A (en) | 2022-08-12 |
CN114897527B true CN114897527B (en) | 2023-03-14 |
Family
ID=82724164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210551810.0A Active CN114897527B (en) | 2022-05-20 | 2022-05-20 | Authentication method for realizing commercial warranty claim value based on workload certification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114897527B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115879161B (en) * | 2023-02-23 | 2023-05-23 | 西南交通大学 | Data circulation method, device, equipment and readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960825A (en) * | 2018-06-26 | 2018-12-07 | 阿里巴巴集团控股有限公司 | Electric endorsement method and device, electronic equipment based on block chain |
CN109242636A (en) * | 2018-09-26 | 2019-01-18 | 盈盈(杭州)网络技术有限公司 | A kind of data transacting system and its implementation based on block chain |
CN111178880A (en) * | 2019-12-07 | 2020-05-19 | 江苏通付盾数字化技术有限公司 | Secure data circulation method for zero trust and protecting data privacy |
CN112884554A (en) * | 2021-03-18 | 2021-06-01 | 南通大学 | Auction method of Internet of things data auction system based on alliance chain |
CN113627901A (en) * | 2021-08-04 | 2021-11-09 | 湖南大学 | Guarantee pool financing method, system, equipment and storage medium based on block chain |
CN113850595A (en) * | 2021-09-09 | 2021-12-28 | 湖南大学 | Export back-to-back insurance financing method and device based on block chain and electronic equipment |
CN113869894A (en) * | 2021-09-07 | 2021-12-31 | 湖南大学 | Block chain-based domestic trade credit insurance financing method and device |
CN113919938A (en) * | 2021-09-24 | 2022-01-11 | 湖南大学 | Domestic buyer's warranty financing method, device, equipment and medium based on block chain |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106845960B (en) * | 2017-01-24 | 2018-03-20 | 上海壹账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN109767336A (en) * | 2018-12-27 | 2019-05-17 | 福建省农村信用社联合社 | It is a kind of based on block chain P2P financing platform fund bank deposit pipe management method |
US11366910B2 (en) * | 2018-12-27 | 2022-06-21 | Eli Talmor | Method and system for secure applications using blockchain |
CN114511398B (en) * | 2022-02-14 | 2023-04-07 | 西南交通大学 | Railway engineering insurance and financing platform based on block chain |
-
2022
- 2022-05-20 CN CN202210551810.0A patent/CN114897527B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960825A (en) * | 2018-06-26 | 2018-12-07 | 阿里巴巴集团控股有限公司 | Electric endorsement method and device, electronic equipment based on block chain |
CN109242636A (en) * | 2018-09-26 | 2019-01-18 | 盈盈(杭州)网络技术有限公司 | A kind of data transacting system and its implementation based on block chain |
CN111178880A (en) * | 2019-12-07 | 2020-05-19 | 江苏通付盾数字化技术有限公司 | Secure data circulation method for zero trust and protecting data privacy |
CN112884554A (en) * | 2021-03-18 | 2021-06-01 | 南通大学 | Auction method of Internet of things data auction system based on alliance chain |
CN113627901A (en) * | 2021-08-04 | 2021-11-09 | 湖南大学 | Guarantee pool financing method, system, equipment and storage medium based on block chain |
CN113869894A (en) * | 2021-09-07 | 2021-12-31 | 湖南大学 | Block chain-based domestic trade credit insurance financing method and device |
CN113850595A (en) * | 2021-09-09 | 2021-12-28 | 湖南大学 | Export back-to-back insurance financing method and device based on block chain and electronic equipment |
CN113919938A (en) * | 2021-09-24 | 2022-01-11 | 湖南大学 | Domestic buyer's warranty financing method, device, equipment and medium based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN114897527A (en) | 2022-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200193432A1 (en) | Method and system for settling a blockchain transaction | |
WO2020248603A1 (en) | Blockchain-based virtual resource allocation method and device | |
US20200127813A1 (en) | Method and system for creating a user identity | |
WO2019015474A1 (en) | Management method, apparatus and system for increasing security of commercial paper exchange | |
US8156029B2 (en) | Process for verifiably communicating risk characteristics of an investment portfolio | |
CN113728351A (en) | Trusted certification transactions in blockchain systems | |
US20150356523A1 (en) | Decentralized identity verification systems and methods | |
CN111461870A (en) | Supply chain financial credit increasing method based on block chain | |
CN105681301A (en) | Settlement method on block chain | |
CN110309634A (en) | A kind of credible advertisement data management system based on block chain | |
TW202009841A (en) | Least decentralized fund trading system and method thereof | |
CN115619404B (en) | Block chain-based enterprise associated transaction business cooperative processing method | |
CN112116462B (en) | Price inquiring and quoting transaction method and system based on blockchain | |
CN101510288A (en) | Electronic contract operation system based on digital property right certificate | |
CN110728494A (en) | Real estate service handling method, real estate property information system and real estate property information device | |
CN114511398B (en) | Railway engineering insurance and financing platform based on block chain | |
CN111915349A (en) | Cross-platform integral using system and method based on block chain | |
CN113570350A (en) | Bill digital interaction system and method based on block chain | |
Kalvenes et al. | Design of robust business-to-business electronic marketplaces with guaranteed privacy | |
CN114897527B (en) | Authentication method for realizing commercial warranty claim value based on workload certification | |
CN113919938A (en) | Domestic buyer's warranty financing method, device, equipment and medium based on block chain | |
CN112232828A (en) | Power grid data transaction method and system | |
CN112801778A (en) | Federated bad asset blockchain | |
CN111491024A (en) | Block chain-based bank letter method, system, terminal and storage medium | |
US20050076218A1 (en) | Cryptographic electronic gift certificate cross-reference to related applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240112 Address after: No. 18, 15th Floor, Building 8, No. 88 Shengbang Street, High tech Zone, Chengdu City, Sichuan Province, 610095 Patentee after: Chengdu Xijianwen Technology Consulting Co.,Ltd. Address before: 610031, No. two, section 111, North Ring Road, Jinniu District, Sichuan, Chengdu Patentee before: SOUTHWEST JIAOTONG University |
|
TR01 | Transfer of patent right |