CN106096443A - A kind of Contract Enforcement method and system based on Biont information - Google Patents

A kind of Contract Enforcement method and system based on Biont information Download PDF

Info

Publication number
CN106096443A
CN106096443A CN201610407333.5A CN201610407333A CN106096443A CN 106096443 A CN106096443 A CN 106096443A CN 201610407333 A CN201610407333 A CN 201610407333A CN 106096443 A CN106096443 A CN 106096443A
Authority
CN
China
Prior art keywords
contract
code
information
secure
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610407333.5A
Other languages
Chinese (zh)
Other versions
CN106096443B (en
Inventor
杨鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610407333.5A priority Critical patent/CN106096443B/en
Publication of CN106096443A publication Critical patent/CN106096443A/en
Application granted granted Critical
Publication of CN106096443B publication Critical patent/CN106096443B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a kind of Contract Enforcement method and system based on Biont information, wherein, described method includes: use the bio information of the predetermined cryptographic algorithm organism to gathering and default safety code to calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes;The contract content being associated with described preset security identification code and contract trigger condition being stored to described contract data base, wherein, described contract content includes multiple contract terms;The monitoring information that RX monitor sends, when judging that described monitoring information meets described contract trigger condition, performs the contract terms corresponding with described contract trigger condition.Whether the present invention can meet the contract trigger condition preset according to monitoring information automatic decision, automatically performs, if met, the contract terms that described contract trigger condition is corresponding, it is ensured that the just execution of contract, and the content of contract will not be compromised, safe ready.

Description

A kind of Contract Enforcement method and system based on Biont information
Technical field
The present invention relates to field of computer technology, be specifically related to a kind of Contract Enforcement method based on Biont information and be System.
Background technology
In prior art, in many ways between sign a contract, and according to contract carry out perform content time, typically all sign papery Contract, but papery contract exists is torn to pieces, is tampered or compromised risk, and it is stored in the electronics in general data storehouse Contract, then exist and be hacked data base and be tampered or compromised risk, and the execution of contract is also required to artificial Implementation and supervision, it is impossible to it is just objective to accomplish, also cannot the safety of guarantee deed content.
Summary of the invention
The technical problem to be solved is to provide a kind of Contract Enforcement method and system based on Biont information, Whether can meeting the contract trigger condition preset according to monitoring information automatic decision, automatically performing described contract if met The contract terms that about trigger condition is corresponding, it is ensured that the just execution of contract, and the content of contract will not be compromised, safe ready.
The technical scheme is that
According to one aspect of the present invention, it is provided that a kind of Contract Enforcement method based on Biont information, described method Including:
S101, the bio information of the employing predetermined cryptographic algorithm organism to gathering and default safety code are counted Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes;
S102, the contract content and the contract trigger condition that are associated with described preset security identification code are stored to described In contract data base, wherein, described contract content includes multiple contract terms;
The monitoring information that S103, RX monitor send, is judging that described monitoring information meets described contract trigger condition Time, perform the contract terms corresponding with described contract trigger condition.
Beneficial effects of the present invention: a kind of based on Biont information the Contract Enforcement method that the present invention provides, it is possible to use Bio information and the safety code preset of the AES contracting parties to gathering are calculated exclusive secure ID code, institute Stating secure ID code is that organism is exclusive, it is impossible to forge, it is possible to ensure the safety of organism identification, and only by institute State secure ID code to carry out storing and not storing the bio information of organism, it is to avoid the leakage of bio information;And contract is worked as thing Contract content and the contract trigger condition of people's agreement are associated together with described preset security identification code, and judge watch-dog Whether monitoring information meets contract trigger condition, if meeting the contract terms that can automatically perform in contract content, safety is public The most convenient, do not have the situation that contract content is tampered and cannot be performed, practicality is stronger.
Further, described bio information specifically include DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, One in dermatoglyph, decorative pattern, attitude, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, footprint and cicatrix information Information or the combination of much information;Described safety code includes word, voice, attitude, image, hardware key and action message In the combination of one or more information.
Use the beneficial effect of above-mentioned further scheme: gather contracting parties secret and exclusive life according to practical situation Thing information and the safety code of setting, it is ensured that the exclusive property of the preset security identification code of generation and privacy.
Further, use predetermined cryptographic algorithm that the described bio information combined is added with described safety code Close calculating, obtains the preset security identification code that described organism is corresponding.
Use the beneficial effect of above-mentioned further scheme: after described bio information and described safety code being combined It is encrypted again, further increases safety and the uniqueness of preset security identification code, it is to avoid preset security identification code is broken Solve.
Further, described monitoring information specifically includes secure ID code and the monitoring being associated with described contract content Data;Described contract trigger condition specifically includes the information that is verified of secure ID code and default Contract Enforcement condition.
Use the beneficial effect of above-mentioned further scheme: be easy to trigger corresponding contract by corresponding monitoring information and trigger Condition.
Further, if described monitoring information is secure ID code, then verify whether described secure ID code is described pre- If secure ID code, the most then perform the contract terms of correspondence, if it is not, then store described secure ID code to not clear mark Code data base;If described monitoring information is the monitoring data that described contract content is associated, judging that described monitoring data meet During described default Contract Enforcement condition, perform corresponding contract terms.
Use the beneficial effect of above-mentioned further scheme: whether the monitoring information of automatic decision watch-dog meets contract is triggered Condition, if meeting the contract terms that can automatically perform in contract content, the just convenience of safety.
Further, described database of identifier codes, contract data base and not clear database of identifier codes are all by distributed Block chain data base forms, and each block chain data base in o f chain data base backups each other.
Use the beneficial effect of above-mentioned further scheme: identification database, contract data base and not clear identification code data Storehouse is made up of o f chain data base, and each block chain data base all stores the preset security mark of correspondence Code, contract content and contract trigger condition and not clear identification code, and each block chain data base backup each other, and use distribution Formula block chain data base, even if hacker attacks destruction has distorted an o f chain data base, as other backups The existence of o f chain data base, and whole o f chain Database Systems cannot be destroyed, backup distributed Chain data base is the most for block, and the data in o f chain data base are the safest.
Further, described contract content is specially testament content, transference of title of property content or transfering use right content.
Use the beneficial effect of above-mentioned further scheme: testament content, transference of title of property content or transfering use right content Can store safely, and automatically perform according to agreement according to trigger condition.
According to another aspect of the present invention, it is provided that a kind of Contract Enforcement system based on Biont information, described system System includes:
Calculating storaging unit, for using the bio information of the predetermined cryptographic algorithm organism to gathering and default peace All-key calculates, and obtains the preset security identification code that described organism is corresponding, and is stored to database of identifier codes;
Contract memory element, for triggering bar by the contract content being associated with described preset security identification code and contract Part stores to described contract data base, and wherein, described contract content includes multiple contract terms;
Contract Enforcement unit, the monitoring information that RX monitor sends, judging that described monitoring information meets described contract During trigger condition, perform the contract terms corresponding with described contract trigger condition.
Beneficial effects of the present invention: a kind of based on Biont information the Contract Enforcement method that the present invention provides, it is possible to use Bio information and the safety code preset of the AES contracting parties to gathering are calculated exclusive secure ID code, institute Stating secure ID code is that organism is exclusive, it is impossible to forge, it is possible to ensure the safety of organism identification, and only by institute State secure ID code to carry out storing and not storing the bio information of organism, it is to avoid the leakage of bio information;And contract is worked as thing Contract content and the contract trigger condition of people's agreement are associated together with described preset security identification code, and judge watch-dog Whether monitoring information meets contract trigger condition, if meeting the contract terms that can automatically perform in contract content, safety is public The most convenient, do not have the situation that contract content is tampered and cannot be performed, practicality is stronger.
Further, described calculating storaging unit specifically includes: use predetermined cryptographic algorithm to described in combining Bio information and described safety code are encrypted calculating, obtain the preset security identification code that described organism is corresponding.
Use the beneficial effect of above-mentioned further scheme: after described bio information and described safety code being combined It is encrypted again, further increases safety and the uniqueness of preset security identification code, it is to avoid preset security identification code is broken Solve.
Further, described in described contract memory element monitor information specifically include secure ID code and with described contract The monitoring data that about content is associated;Described contract trigger condition specifically includes the information that is verified of secure ID code and pre- If Contract Enforcement condition.
Use the beneficial effect of above-mentioned further scheme: be easy to trigger corresponding contract by corresponding monitoring information and trigger Condition.
Further, described Contract Enforcement unit specifically includes;If described monitoring information is secure ID code, then verify institute State whether secure ID code is described preset security identification code, the most then perform the contract terms of correspondence, if it is not, then by described Secure ID code stores to not clear database of identifier codes;If described monitoring information is the monitoring number that described contract content is associated According to, when judging that described monitoring data meet described default Contract Enforcement condition, perform corresponding contract terms.
Use the beneficial effect of above-mentioned further scheme: whether the monitoring information of automatic decision watch-dog meets contract is triggered Condition, if meeting the contract terms that can automatically perform in contract content, the just convenience of safety.
Accompanying drawing explanation
Fig. 1 is a kind of based on Biont information the Contract Enforcement method flow diagram of the embodiment of the present invention one;
Fig. 2 is a kind of based on Biont information the Contract Enforcement system schematic of the embodiment of the present invention two.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, example is served only for explaining the present invention, and Non-for limiting the scope of the present invention.
Embodiment one, a kind of Contract Enforcement method based on Biont information.Below in conjunction with Fig. 1, the present embodiment is provided Method is described in detail.
See Fig. 1, S101, the bio information using the predetermined cryptographic algorithm organism to gathering and default safety code Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes.
Concrete, use the bio information of the predetermined cryptographic algorithm organism to gathering and default safety code to count Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes.Described bio information It is specially DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, attitude, gait, decorative pattern, infrared temperature spectrum A kind of information in the information such as figure, dental impression, denture, ear shape, body odour, footprint and cicatrix or the combination of much information.Described Safety code includes the group of one or more information in the information such as word, voice, attitude, image, hardware key and action Close.Described predetermined cryptographic algorithm can use the permutation and combination of a kind of AES or multiple encryption algorithms, with specific reference to reality Need to set.Gathering the bio information of organism when, according to the different bio information of the different acquisition of safe class and Different safety codes, and different bio informations and safety code are combined, use the AES set to be calculated Secure ID code, described secure ID code is exclusive secure ID code, it is impossible to forge.By by different bio informations and peace After all-key carries out different combinations and encrypts, generating different grades of secure ID code, such as, fingerprint uses algorithm A to encrypt To inferior grade secure ID code 1;Iris uses algorithm A encryption to obtain inferior grade secure ID code 2;Fingerprint uses algorithm B encryption Obtain inferior grade secure ID code 3;After fingerprint and secret safety code Ω combination, algorithm A encryption is used to obtain the middle and low grade safety Identification code 4;After gait, iris, vocal print and secret safety code β combination, algorithm C encryption is used to obtain middle grade secure ID code 5;Algorithm C encryption is used to obtain high-grade after DNA, fingerprint, iris, gait, secret safety code α and secret safety code γ combination Secure ID code 6;It addition, multiple different secure ID codes can be combined according to the requirement using environment, carry out The identification of organism, such as, can choose from above-mentioned 6 different grades of secure ID codes according to the requirement of use environment Multiple combine, be used for identifying organism, such as, use inferior grade secure ID code 2 plus the middle and low grade secure ID Code 4 confirms organism;Or inferior grade secure ID code 3 confirms organism plus middle grade secure ID code 5.
Such as, if organism is identical twins or multiple birth, identical twins or multiple birth because being from one Individual germ cell division grow, its DNA is completely the same, but by the nuance of growth and development environment, its fingerprint, iris, The living body features such as vein will not be identical, can by the information such as fingerprint, iris, vein come differentiation identical twins or Person multiple birth.Assume that identical twins or multiple birth are because of certain reason, it is impossible to collect the biologies such as fingerprint, iris, vein Body characteristics, then can be made a distinction by the safety code that organism is preset.If all bio informations of organism are compromised, As long as the safety code preset is the most compromised, this organism still can confirm identity by described preset security identification code.
Described organism both can be that the mankind can also be for animals and plants.Such as, the right of attribution of certain animal belongs to possessor, The secure ID code of animal so can be generated according to biological characteristics such as the iris of animal and decorative patterns, and according to possessor's bio information Calculate with preset security code encryption and generate possessor's secure ID code, and the secure ID code of the two is associated together and stores To database of identifier codes, the right of attribution of animal in the case of occurring unexpectedly, can be confirmed according to the secure ID code of animal. When organism is plant, can with the DNA of herborization, kind, annual ring, micronutrient levels or attitude integration together, The corresponding secure ID code that plant is exclusive is generated with AES encryption.
It addition, when gathering the bio information of organism, it is necessary in the environment of safety, it is ensured that bio information is not by The third party authorized intercepts and captures, and uses the AESs such as digital signature to process, it is ensured that described secure ID code stored in transmission Journey is not modified, when storing described secure ID code, first has to the secure ID code to transmitting and be analyzed, determine After being the real secure ID code not being modified, then store it in described database of identifier codes.
Described database of identifier codes only stores the bio information that secure ID code does not store the organism of collection, it is to avoid The leakage of the bio information of organism, and then avoid the bio information puppet according to organism to produce identical organism.Described mark Knowing code data base to be made up of o f chain data base, in each block chain data base, storage has described secure ID Code, and each block chain data base backups each other, it is possible to avoid the Missing data in database of identifier codes and avoid black Visitor distorts database of identifier codes.
S102, the contract content and the contract trigger condition that associate with described secure ID code-phase are stored to described contract In data base, wherein, described contract content includes multiple contract terms.
Concrete, the contract content and the contract trigger condition that associate with described secure ID code-phase are stored to described contract About in data base, wherein, described contract content includes multiple contract terms.In described secure ID code and described contract data base Contract content and contract trigger condition be associated, only could be to contract content and contract after secure ID code is verified About trigger condition is modified, the described contract content being stored in described contract data base, can be set to according to practical situation Disclosed in allow other people see;Or carry out kept secure after Jia Mi, i.e. will not be seen by other people in addition to client;Or It is confidential state before person, after arriving the condition set, carries out disclosure.
Described contract data base is made up of o f chain data base, and storing in each block chain data base has Described contract content and contract trigger condition, and each block chain data base backups each other, it is possible to avoid contract data Missing data in storehouse and avoid hacker to distort database of identifier codes, ensure that in contract data base, contract content and contract are touched The confidentiality of clockwork spring part and safety.
The monitoring information that S103, RX monitor send, is judging that described monitoring information meets described contract trigger condition Time, perform the contract terms corresponding with described contract trigger condition.
Concrete, the monitoring information of RX monitor transmission, judging that described monitoring information meets described contract and triggers bar During part, perform the contract terms corresponding with described contract trigger condition.Concrete, described monitoring information specifically includes safety post Know code and the monitoring data being associated with described contract content;Described contract trigger condition specifically includes testing of secure ID code Card is by information and default Contract Enforcement condition.If described monitoring information is secure ID code, then verify described secure ID Whether code is described preset security identification code, the most then perform the contract terms of correspondence, if it is not, then by described secure ID code Store to not clear database of identifier codes, give over to evidence, in order to the personnel being intended to invade database of identifier codes for day " Invest, Then Investigate " provide Help.If described monitoring information is the monitoring data that described contract content is associated, described judging that described monitoring data meet When presetting Contract Enforcement condition, perform corresponding contract terms.
Contract terms in the contract content that contract trigger condition is corresponding are consulted to decide by client according to practical situation.Institute Stating not clear database of identifier codes uses o f chain to form equally, improves the safety of not clear secure ID code storage.
It addition, described contract content is specially testament content, transference of title of property content or transfering use right content.
If described contract content is specially testament content, then gather the bio information of testator and the safety code of setting, And use AES to carry out being calculated exclusive secure ID code, and store to database of identifier codes, and by testament Hold and store to contract data base after the encryption of testament trigger condition, and will not be seen by other people in addition to testator Arriving, wherein, described testament trigger condition includes that secure ID code does not receives secure ID in being verified information, Preset Time The information that is verified of code and the dead information of testator.
Concrete, if in Preset Time, described watch-dog is not received by the secure ID code of testator, such as, it is necessary to The bio information gathering a testator in every 3 years and preset security code, generate described secure ID code and verify, if three Year, then acquiescence testator was dead, automatically deciphering testament content to being not received by the secure ID code of testator, And automatically begin to perform testament content;Or receive the proof information that testator is dead, automatically deciphering testament content, and from Moving and start to perform testament content, wherein, described proof information is gathered the relevant of organism by special bio body activity checking equipment Information, confirms identity and whether be existing state, the definition of life and death by life and death checking equipment according to forensic medicine regulation before death Assert;All receiving the secure ID code of testator in Preset Time, described testament content just will not be performed only every time, And testament content can be modified after secure ID code is proved to be successful by testator.
If described contract content is specially transference of title of property content, gather the most respectively the bio information of owner and creditor with And preset security code, then use AES that bio information and the preset security code of owner are calculated owner Secure ID code, and use AES that bio information and the preset security code of creditor are calculated creditor Secure ID code, and the secure ID code of owner is stored to secure ID yardage together with the secure ID code of creditor According in storehouse, then by the transference of title of property content associated with the secure ID code-phase of the secure ID code and creditor of owner with turn Allowing trigger condition store to contract data base, wherein, described transfer trigger condition includes that secure ID code is verified information And owner does not carry out certain activity according to agreement in advance on schedule.
It is concrete, if described watch-dog is not received by owner according to must carrying out of making an appointment in Preset Time The information of certain activity, then perform, according to agreement, the clause that some in transference of title of property content sets, and such as owner does not press Time periodically refund, then automatically according to agreement, the property right of owner is transferred to creditor under one's name, concrete transference of title of property content root Arrange by client according to practical situation;Or monitor monitors owner and completes the refund of debt, then contract is lost automatically Effect, associating between creditor with property right ceases to be in force automatically;Or owner and creditor are simultaneously to respective secure ID code Verify, and according to agreement together change transference of title of property content, the property right that contract data base is stored after being verified Information and the owner's information associated with property right and creditor's information, disclosed according to legal provisions and inquired about.
It addition, the property right of oneself property and corresponding right of disposal part can also be transferred to other people, specifically by owner Other people secure ID code is associated with the property right percentage ratio of owner's property and corresponding right of disposal percentage ratio, translates into After merit, the property right of the property of owner and corresponding right of disposal are owned together with other people according to the contract content of agreement.Example As, first has property right and 100% right of disposal of the 100% of A real estate, and present first is by the property right of A real estate and right of disposal Part is transferred to second, becomes first and occupies the property right of 60% and the right of disposal of 60%, and second occupies property right and 40% right of disposal of 40%, I.e. according to contract content, 60% property right of A real estate is associated with the secure ID code-phase of first with 60% right of disposal, by A room 40% property right of real estate associates with the secure ID code-phase of second with 40% right of disposal.
If described contract content is specially transfering use right content, gather the biological letter of owner and right to use people the most respectively Breath and preset security code, then use AES that bio information and the preset security code of owner are calculated product The secure ID code of power people, and use AES that bio information and the preset security code of right to use people are calculated The secure ID code of right to use people, and the secure ID code of owner is stored to peace together with the secure ID code of right to use people In full database of identifier codes, the property right that then will associate with the secure ID code-phase of the secure ID code and right to use people of owner Transferring the possession of content and transfer trigger condition stores to contract data base, wherein, described transfer trigger condition includes secure ID code It is verified information and right to use people during the use to certain article, occurs violating the content of agreement.
Concrete, right to use people held property right the right to use of certain article of people within the time set, such as car or House, if if watch-dog detects that right to use people occurs violating during the use to certain article within the described scheduled time The content of agreement, then terminate the right to use people right to use to article in advance according to agreement, such as, if article are car, at prison In the case of control finds that violating the traffic regulations occurs in right to use people, terminate the right to use people right to use to car, if article are House, in the case of monitoring finds that right to use people occurs damaging house, terminates the right to use people right to use to house, specifically makes Transfer the possession of content by power to arrange by client according to practical situation;Or monitor monitors right to use people and uses the phase of certain article Being limited to, contract ceases to be in force automatically, and right to use people ceases to be in force automatically with associating of article;Or owner and right to use people are the most right Respective secure ID code is verified, and according to agreement together change transference of title of property content, contract number after being verified The right to use information stored according to storehouse and the owner's information associated with the right to use and right to use people's information, according to legal provisions Disclosed and inquired about.
Embodiment two, a kind of Contract Enforcement system based on Biont information.Below in conjunction with Fig. 2, the present embodiment is provided System is described in detail.
Seeing Fig. 2, the system that the present embodiment provides includes calculating storaging unit 201, contract memory element 202 and contract Performance element 203.
Described calculating storaging unit 201, for use predetermined cryptographic algorithm to gather organism bio information and The safety code preset calculates, and obtains the preset security identification code that described organism is corresponding, and is stored to mark yardage According in storehouse.
Concrete, described calculating storaging unit 201 use the bio information of the predetermined cryptographic algorithm organism to gathering with And the safety code preset calculates, obtain the preset security identification code that described organism is corresponding, and stored to identification code In data base.Described bio information be specially DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, attitude, A kind of information in the information such as gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, decorative pattern, footprint or cicatrix and The combination of much information.Described safety code includes in the information such as word, voice, attitude, image, hardware key and action Plant or the combination of much information.Described predetermined cryptographic algorithm can use the arrangement of a kind of AES or multiple encryption algorithms Combination, with specific reference to being actually needed setting.Gathering the bio information of organism when, according to the different acquisition of safe class Different bio informations and different safety codes, and different bio informations and safety code are combined, use setting AES is calculated secure ID code, and described secure ID code is exclusive secure ID code, it is impossible to forge.Described biology Body both can be that the mankind can also be for animals and plants.In described database of identifier codes, only storage secure ID code does not store collection The bio information of organism, it is to avoid the leakage of the bio information of organism, and then avoid the bio information according to organism to forge Go out identical organism.Described database of identifier codes is made up of o f chain data base, each block chain data base In all stored described secure ID code, and each block chain data base backups each other, it is possible to avoid database of identifier codes In Missing data and avoid hacker to distort database of identifier codes.
Described contract memory element 202, for touching the contract content and the contract that associate with described secure ID code-phase Clockwork spring part stores to described contract data base, and wherein, described contract content includes multiple contract terms.
Concrete, described contract memory element 202 is by the contract content associated with described secure ID code-phase and contract Trigger condition stores to described contract data base, and wherein, described contract content includes multiple contract terms.Described secure ID Code is associated with the contract content in described contract data base and contract trigger condition, is only verified it at secure ID code After contract content and contract trigger condition could be modified.Described contract data base is by o f chain data base's group Becoming, in each block chain data base, storage has described contract content and contract trigger condition, and each block chain Data base backups each other, it is possible to avoids the Missing data in contract data base and avoids hacker to distort database of identifier codes, protects Contract content and the confidentiality of contract trigger condition and safety in contract data base are demonstrate,proved.
Described Contract Enforcement unit 203, the monitoring information that RX monitor sends, judging that described monitoring information meets institute When stating contract trigger condition, perform the contract terms corresponding with described contract trigger condition.
Concrete, the information that monitors described in described contract memory element specifically include secure ID code and with described contract The monitoring data that content is associated;Described contract trigger condition specifically includes the information that is verified of secure ID code and presets Contract Enforcement condition.Described Contract Enforcement unit 203, when described monitoring information is secure ID code, verifies described secure ID Whether code is described preset security identification code, the most then perform the contract terms of correspondence, if it is not, then by described secure ID code Store to not clear database of identifier codes;When described monitoring information is the monitoring data that described contract content is associated, judging When described monitoring data meet described default Contract Enforcement condition, perform corresponding contract terms.
A kind of based on Biont information the Contract Enforcement method and system that the present invention provides, use AES to collection The bio information of contracting parties and the safety code preset be calculated exclusive secure ID code, and only by described safety Identification code carries out storing and not storing the bio information of organism, it is to avoid the leakage of bio information, and secure ID code is biological Body is exclusive, it is impossible to forge, it is possible to ensure the safety of organism identification;Also described secure ID code is stored to mark Code data base, identification database is made up of o f chain data base, and each block chain data base all stored State secure ID code, and each block chain data base backups each other, in the contract that also will associate with described secure ID code-phase Holding and contract trigger condition stores to contract data base, contract data base is made up of, often o f chain data base One block chain data base has all stored described contract content and contract trigger condition, and each block chain data base is each other Backup, even if using o f chain data base hacker to attack destruction distorted an o f chain data base, also can Because the existence of the o f chain data base of other backups, and whole o f chain Database Systems cannot be destroyed, The o f chain data base of backup is the most, and the data in o f chain data base are the safest;It addition, judge monitoring Whether the monitoring information of device meets contract trigger condition, if meeting the contract terms that can automatically perform in contract content, and peace Complete just convenience, does not haves the situation that contract content is tampered and cannot be performed, and practicality is stronger.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (11)

1. a Contract Enforcement method based on Biont information, it is characterised in that described method includes:
S101, the bio information of the employing predetermined cryptographic algorithm organism to gathering and default safety code calculate, To the preset security identification code that described organism is corresponding, and stored to database of identifier codes;
S102, the contract content and the contract trigger condition that are associated with described preset security identification code are stored to described contract In data base, wherein, described contract content includes multiple contract terms;
The monitoring information that S103, RX monitor send, when judging that described monitoring information meets described contract trigger condition, holds The contract terms that row is corresponding with described contract trigger condition.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described biological letter Breath specifically includes DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, decorative pattern, attitude, gait, infrared temperature A kind of information in spectrogram, dental impression, denture, ear shape, body odour, footprint and cicatrix information or the combination of much information;
Described safety code includes one or more letters in word, voice, attitude, image, hardware key and action message The combination of breath.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described S101 has Body includes:
Use the AES described bio information to combining and described safety code to be encrypted calculating, obtain described life The preset security identification code that object is corresponding.
A kind of Contract Enforcement method based on Biont information, it is characterised in that in described S103 Described monitoring information specifically includes secure ID code and the monitoring data being associated with described contract content;
Described contract trigger condition specifically includes the information that is verified of secure ID code and default Contract Enforcement condition.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described S103 has Body includes:
If described monitoring information is secure ID code, then verify whether described secure ID code is described preset security identification code, The most then perform the contract terms of correspondence, if it is not, then store described secure ID code to not clear database of identifier codes;
If described monitoring information is the monitoring data that described contract content is associated, described pre-judging that described monitoring data meet If during Contract Enforcement condition, perform corresponding contract terms.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described identification code Data base, contract data base and not clear database of identifier codes are all made up of o f chain data base, and distributed Each block chain data base in block chain data base backups each other.
A kind of Contract Enforcement method based on Biont information, it is characterised in that in described contract Hold and be specially testament content, transference of title of property content or transfering use right content.
8. a Contract Enforcement system based on Biont information, it is characterised in that described system includes:
Calculating storaging unit, for using the bio information of the predetermined cryptographic algorithm organism to gathering and default safety code Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes;
Contract memory element, for depositing the contract content and the contract trigger condition that are associated with described preset security identification code In storage extremely described contract data base, wherein, described contract content includes multiple contract terms;
Contract Enforcement unit, the monitoring information that RX monitor sends, judging that described monitoring information meets described contract and triggers During condition, perform the contract terms corresponding with described contract trigger condition.
A kind of Contract Enforcement system based on Biont information, it is characterised in that described calculating is deposited Storage unit specifically includes:
Use the predetermined cryptographic algorithm described bio information to combining and described safety code to be encrypted calculating, obtain institute State the preset security identification code that organism is corresponding.
A kind of Contract Enforcement system based on Biont information, it is characterised in that described contract The information that monitors described in memory element specifically includes secure ID code and the monitoring data being associated with described contract content;
Described contract trigger condition specifically includes the information that is verified of secure ID code and default Contract Enforcement condition.
11. a kind of Contract Enforcement systems based on Biont information, it is characterised in that described contract Performance element specifically includes;
If described monitoring information is secure ID code, then verify whether described secure ID code is described preset security identification code, The most then perform the contract terms of correspondence, if it is not, then store described secure ID code to not clear database of identifier codes;
If described monitoring information is the monitoring data that described contract content is associated, described pre-judging that described monitoring data meet If during Contract Enforcement condition, perform corresponding contract terms.
CN201610407333.5A 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information Active CN106096443B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610407333.5A CN106096443B (en) 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610407333.5A CN106096443B (en) 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information

Publications (2)

Publication Number Publication Date
CN106096443A true CN106096443A (en) 2016-11-09
CN106096443B CN106096443B (en) 2018-12-21

Family

ID=57228829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610407333.5A Active CN106096443B (en) 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information

Country Status (1)

Country Link
CN (1) CN106096443B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547477A (en) * 2018-12-27 2019-03-29 石更箭数据科技(上海)有限公司 A kind of data processing method and its device, medium, terminal
CN110019206A (en) * 2017-11-01 2019-07-16 杭州沃朴物联科技有限公司 A kind of cultivated animals tracking anti-counterfeiting system and method based on block chain
CN110598063A (en) * 2019-09-29 2019-12-20 腾讯科技(深圳)有限公司 Biological identity query method, device and storage medium
WO2021105797A1 (en) * 2019-11-25 2021-06-03 International Business Machines Corpofiation Managing physical objects using crypto-anchors
US11397760B2 (en) 2019-11-25 2022-07-26 International Business Machines Corporation Managing relationships between persons and physical objects based on physical fingerprints of the physical objects

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN105225155A (en) * 2015-09-25 2016-01-06 中国人民财产保险股份有限公司 A kind of insurance risk management-control method based on biological identification technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN105225155A (en) * 2015-09-25 2016-01-06 中国人民财产保险股份有限公司 A kind of insurance risk management-control method based on biological identification technology

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110019206A (en) * 2017-11-01 2019-07-16 杭州沃朴物联科技有限公司 A kind of cultivated animals tracking anti-counterfeiting system and method based on block chain
CN109547477A (en) * 2018-12-27 2019-03-29 石更箭数据科技(上海)有限公司 A kind of data processing method and its device, medium, terminal
CN110598063A (en) * 2019-09-29 2019-12-20 腾讯科技(深圳)有限公司 Biological identity query method, device and storage medium
CN110598063B (en) * 2019-09-29 2023-08-11 腾讯科技(深圳)有限公司 Biological identity query method, device and storage medium
WO2021105797A1 (en) * 2019-11-25 2021-06-03 International Business Machines Corpofiation Managing physical objects using crypto-anchors
US11397760B2 (en) 2019-11-25 2022-07-26 International Business Machines Corporation Managing relationships between persons and physical objects based on physical fingerprints of the physical objects
GB2604565A (en) * 2019-11-25 2022-09-07 Ibm Managing physical objects using crypto-anchors
US11798342B2 (en) 2019-11-25 2023-10-24 International Business Machines Corporation Managing physical objects using crypto-anchors

Also Published As

Publication number Publication date
CN106096443B (en) 2018-12-21

Similar Documents

Publication Publication Date Title
CN106096444B (en) A kind of identification based on biological information and social information's recording method and system
CN106096443A (en) A kind of Contract Enforcement method and system based on Biont information
CN102077545B (en) Personal security manager for ubiquitous patient monitoring
CN112217807B (en) Cone block chain key generation method, authentication method and system
CN108665275A (en) The system and method for block chain project management
CN107947922A (en) A kind of digital archives management method and system based on block chain technology
CN109243553A (en) Medical data processing method, system, computer equipment and readable storage medium storing program for executing
Li et al. Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic?
CN109496403A (en) For having the preceding dynamic to privacy and commission verifiability to can search for the method and system of symmetric cryptography
CN109961826A (en) A kind of health information management system and method based on medical block chain
CN107871081A (en) A kind of computer information safe system
CN105989297A (en) Encryption and decryption method and device of electronic prescription
CN109741819A (en) A kind of clinical care system, method and data ciphering method based on block chain
CN116318617B (en) Medical rescue material charity donation method based on RFID and blockchain
Xu et al. A secure mutual authentication scheme of blockchain-based in WBANs
CN108063754A (en) Towards the attribute base encryption method of wearable health monitoring equipment anonymization data
CN106921489B (en) Data encryption method and device
Kasat et al. A novel security framework for healthcare data through IOT sensors
Al-Saeed et al. Efficient key agreement algorithm for wireless body area networks using reusable ECG-based features
CN109522694A (en) A kind of identification system based on computer network
CN112487461A (en) Data encryption method
Zhang et al. A biometrics based security solution for encryption and authentication in tele-healthcare systems
CN114491631A (en) Nursing sensitive index information interaction method and monitoring device
DE102020130815B3 (en) Decentralized provision of user data
DE102006021347B4 (en) Procedure for the court-enforceable execution of transactions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant