CN106096443A - A kind of Contract Enforcement method and system based on Biont information - Google Patents
A kind of Contract Enforcement method and system based on Biont information Download PDFInfo
- Publication number
- CN106096443A CN106096443A CN201610407333.5A CN201610407333A CN106096443A CN 106096443 A CN106096443 A CN 106096443A CN 201610407333 A CN201610407333 A CN 201610407333A CN 106096443 A CN106096443 A CN 106096443A
- Authority
- CN
- China
- Prior art keywords
- contract
- code
- information
- secure
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The invention discloses a kind of Contract Enforcement method and system based on Biont information, wherein, described method includes: use the bio information of the predetermined cryptographic algorithm organism to gathering and default safety code to calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes;The contract content being associated with described preset security identification code and contract trigger condition being stored to described contract data base, wherein, described contract content includes multiple contract terms;The monitoring information that RX monitor sends, when judging that described monitoring information meets described contract trigger condition, performs the contract terms corresponding with described contract trigger condition.Whether the present invention can meet the contract trigger condition preset according to monitoring information automatic decision, automatically performs, if met, the contract terms that described contract trigger condition is corresponding, it is ensured that the just execution of contract, and the content of contract will not be compromised, safe ready.
Description
Technical field
The present invention relates to field of computer technology, be specifically related to a kind of Contract Enforcement method based on Biont information and be
System.
Background technology
In prior art, in many ways between sign a contract, and according to contract carry out perform content time, typically all sign papery
Contract, but papery contract exists is torn to pieces, is tampered or compromised risk, and it is stored in the electronics in general data storehouse
Contract, then exist and be hacked data base and be tampered or compromised risk, and the execution of contract is also required to artificial
Implementation and supervision, it is impossible to it is just objective to accomplish, also cannot the safety of guarantee deed content.
Summary of the invention
The technical problem to be solved is to provide a kind of Contract Enforcement method and system based on Biont information,
Whether can meeting the contract trigger condition preset according to monitoring information automatic decision, automatically performing described contract if met
The contract terms that about trigger condition is corresponding, it is ensured that the just execution of contract, and the content of contract will not be compromised, safe ready.
The technical scheme is that
According to one aspect of the present invention, it is provided that a kind of Contract Enforcement method based on Biont information, described method
Including:
S101, the bio information of the employing predetermined cryptographic algorithm organism to gathering and default safety code are counted
Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes;
S102, the contract content and the contract trigger condition that are associated with described preset security identification code are stored to described
In contract data base, wherein, described contract content includes multiple contract terms;
The monitoring information that S103, RX monitor send, is judging that described monitoring information meets described contract trigger condition
Time, perform the contract terms corresponding with described contract trigger condition.
Beneficial effects of the present invention: a kind of based on Biont information the Contract Enforcement method that the present invention provides, it is possible to use
Bio information and the safety code preset of the AES contracting parties to gathering are calculated exclusive secure ID code, institute
Stating secure ID code is that organism is exclusive, it is impossible to forge, it is possible to ensure the safety of organism identification, and only by institute
State secure ID code to carry out storing and not storing the bio information of organism, it is to avoid the leakage of bio information;And contract is worked as thing
Contract content and the contract trigger condition of people's agreement are associated together with described preset security identification code, and judge watch-dog
Whether monitoring information meets contract trigger condition, if meeting the contract terms that can automatically perform in contract content, safety is public
The most convenient, do not have the situation that contract content is tampered and cannot be performed, practicality is stronger.
Further, described bio information specifically include DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave,
One in dermatoglyph, decorative pattern, attitude, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, footprint and cicatrix information
Information or the combination of much information;Described safety code includes word, voice, attitude, image, hardware key and action message
In the combination of one or more information.
Use the beneficial effect of above-mentioned further scheme: gather contracting parties secret and exclusive life according to practical situation
Thing information and the safety code of setting, it is ensured that the exclusive property of the preset security identification code of generation and privacy.
Further, use predetermined cryptographic algorithm that the described bio information combined is added with described safety code
Close calculating, obtains the preset security identification code that described organism is corresponding.
Use the beneficial effect of above-mentioned further scheme: after described bio information and described safety code being combined
It is encrypted again, further increases safety and the uniqueness of preset security identification code, it is to avoid preset security identification code is broken
Solve.
Further, described monitoring information specifically includes secure ID code and the monitoring being associated with described contract content
Data;Described contract trigger condition specifically includes the information that is verified of secure ID code and default Contract Enforcement condition.
Use the beneficial effect of above-mentioned further scheme: be easy to trigger corresponding contract by corresponding monitoring information and trigger
Condition.
Further, if described monitoring information is secure ID code, then verify whether described secure ID code is described pre-
If secure ID code, the most then perform the contract terms of correspondence, if it is not, then store described secure ID code to not clear mark
Code data base;If described monitoring information is the monitoring data that described contract content is associated, judging that described monitoring data meet
During described default Contract Enforcement condition, perform corresponding contract terms.
Use the beneficial effect of above-mentioned further scheme: whether the monitoring information of automatic decision watch-dog meets contract is triggered
Condition, if meeting the contract terms that can automatically perform in contract content, the just convenience of safety.
Further, described database of identifier codes, contract data base and not clear database of identifier codes are all by distributed
Block chain data base forms, and each block chain data base in o f chain data base backups each other.
Use the beneficial effect of above-mentioned further scheme: identification database, contract data base and not clear identification code data
Storehouse is made up of o f chain data base, and each block chain data base all stores the preset security mark of correspondence
Code, contract content and contract trigger condition and not clear identification code, and each block chain data base backup each other, and use distribution
Formula block chain data base, even if hacker attacks destruction has distorted an o f chain data base, as other backups
The existence of o f chain data base, and whole o f chain Database Systems cannot be destroyed, backup distributed
Chain data base is the most for block, and the data in o f chain data base are the safest.
Further, described contract content is specially testament content, transference of title of property content or transfering use right content.
Use the beneficial effect of above-mentioned further scheme: testament content, transference of title of property content or transfering use right content
Can store safely, and automatically perform according to agreement according to trigger condition.
According to another aspect of the present invention, it is provided that a kind of Contract Enforcement system based on Biont information, described system
System includes:
Calculating storaging unit, for using the bio information of the predetermined cryptographic algorithm organism to gathering and default peace
All-key calculates, and obtains the preset security identification code that described organism is corresponding, and is stored to database of identifier codes;
Contract memory element, for triggering bar by the contract content being associated with described preset security identification code and contract
Part stores to described contract data base, and wherein, described contract content includes multiple contract terms;
Contract Enforcement unit, the monitoring information that RX monitor sends, judging that described monitoring information meets described contract
During trigger condition, perform the contract terms corresponding with described contract trigger condition.
Beneficial effects of the present invention: a kind of based on Biont information the Contract Enforcement method that the present invention provides, it is possible to use
Bio information and the safety code preset of the AES contracting parties to gathering are calculated exclusive secure ID code, institute
Stating secure ID code is that organism is exclusive, it is impossible to forge, it is possible to ensure the safety of organism identification, and only by institute
State secure ID code to carry out storing and not storing the bio information of organism, it is to avoid the leakage of bio information;And contract is worked as thing
Contract content and the contract trigger condition of people's agreement are associated together with described preset security identification code, and judge watch-dog
Whether monitoring information meets contract trigger condition, if meeting the contract terms that can automatically perform in contract content, safety is public
The most convenient, do not have the situation that contract content is tampered and cannot be performed, practicality is stronger.
Further, described calculating storaging unit specifically includes: use predetermined cryptographic algorithm to described in combining
Bio information and described safety code are encrypted calculating, obtain the preset security identification code that described organism is corresponding.
Use the beneficial effect of above-mentioned further scheme: after described bio information and described safety code being combined
It is encrypted again, further increases safety and the uniqueness of preset security identification code, it is to avoid preset security identification code is broken
Solve.
Further, described in described contract memory element monitor information specifically include secure ID code and with described contract
The monitoring data that about content is associated;Described contract trigger condition specifically includes the information that is verified of secure ID code and pre-
If Contract Enforcement condition.
Use the beneficial effect of above-mentioned further scheme: be easy to trigger corresponding contract by corresponding monitoring information and trigger
Condition.
Further, described Contract Enforcement unit specifically includes;If described monitoring information is secure ID code, then verify institute
State whether secure ID code is described preset security identification code, the most then perform the contract terms of correspondence, if it is not, then by described
Secure ID code stores to not clear database of identifier codes;If described monitoring information is the monitoring number that described contract content is associated
According to, when judging that described monitoring data meet described default Contract Enforcement condition, perform corresponding contract terms.
Use the beneficial effect of above-mentioned further scheme: whether the monitoring information of automatic decision watch-dog meets contract is triggered
Condition, if meeting the contract terms that can automatically perform in contract content, the just convenience of safety.
Accompanying drawing explanation
Fig. 1 is a kind of based on Biont information the Contract Enforcement method flow diagram of the embodiment of the present invention one;
Fig. 2 is a kind of based on Biont information the Contract Enforcement system schematic of the embodiment of the present invention two.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, example is served only for explaining the present invention, and
Non-for limiting the scope of the present invention.
Embodiment one, a kind of Contract Enforcement method based on Biont information.Below in conjunction with Fig. 1, the present embodiment is provided
Method is described in detail.
See Fig. 1, S101, the bio information using the predetermined cryptographic algorithm organism to gathering and default safety code
Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes.
Concrete, use the bio information of the predetermined cryptographic algorithm organism to gathering and default safety code to count
Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes.Described bio information
It is specially DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, attitude, gait, decorative pattern, infrared temperature spectrum
A kind of information in the information such as figure, dental impression, denture, ear shape, body odour, footprint and cicatrix or the combination of much information.Described
Safety code includes the group of one or more information in the information such as word, voice, attitude, image, hardware key and action
Close.Described predetermined cryptographic algorithm can use the permutation and combination of a kind of AES or multiple encryption algorithms, with specific reference to reality
Need to set.Gathering the bio information of organism when, according to the different bio information of the different acquisition of safe class and
Different safety codes, and different bio informations and safety code are combined, use the AES set to be calculated
Secure ID code, described secure ID code is exclusive secure ID code, it is impossible to forge.By by different bio informations and peace
After all-key carries out different combinations and encrypts, generating different grades of secure ID code, such as, fingerprint uses algorithm A to encrypt
To inferior grade secure ID code 1;Iris uses algorithm A encryption to obtain inferior grade secure ID code 2;Fingerprint uses algorithm B encryption
Obtain inferior grade secure ID code 3;After fingerprint and secret safety code Ω combination, algorithm A encryption is used to obtain the middle and low grade safety
Identification code 4;After gait, iris, vocal print and secret safety code β combination, algorithm C encryption is used to obtain middle grade secure ID code
5;Algorithm C encryption is used to obtain high-grade after DNA, fingerprint, iris, gait, secret safety code α and secret safety code γ combination
Secure ID code 6;It addition, multiple different secure ID codes can be combined according to the requirement using environment, carry out
The identification of organism, such as, can choose from above-mentioned 6 different grades of secure ID codes according to the requirement of use environment
Multiple combine, be used for identifying organism, such as, use inferior grade secure ID code 2 plus the middle and low grade secure ID
Code 4 confirms organism;Or inferior grade secure ID code 3 confirms organism plus middle grade secure ID code 5.
Such as, if organism is identical twins or multiple birth, identical twins or multiple birth because being from one
Individual germ cell division grow, its DNA is completely the same, but by the nuance of growth and development environment, its fingerprint, iris,
The living body features such as vein will not be identical, can by the information such as fingerprint, iris, vein come differentiation identical twins or
Person multiple birth.Assume that identical twins or multiple birth are because of certain reason, it is impossible to collect the biologies such as fingerprint, iris, vein
Body characteristics, then can be made a distinction by the safety code that organism is preset.If all bio informations of organism are compromised,
As long as the safety code preset is the most compromised, this organism still can confirm identity by described preset security identification code.
Described organism both can be that the mankind can also be for animals and plants.Such as, the right of attribution of certain animal belongs to possessor,
The secure ID code of animal so can be generated according to biological characteristics such as the iris of animal and decorative patterns, and according to possessor's bio information
Calculate with preset security code encryption and generate possessor's secure ID code, and the secure ID code of the two is associated together and stores
To database of identifier codes, the right of attribution of animal in the case of occurring unexpectedly, can be confirmed according to the secure ID code of animal.
When organism is plant, can with the DNA of herborization, kind, annual ring, micronutrient levels or attitude integration together,
The corresponding secure ID code that plant is exclusive is generated with AES encryption.
It addition, when gathering the bio information of organism, it is necessary in the environment of safety, it is ensured that bio information is not by
The third party authorized intercepts and captures, and uses the AESs such as digital signature to process, it is ensured that described secure ID code stored in transmission
Journey is not modified, when storing described secure ID code, first has to the secure ID code to transmitting and be analyzed, determine
After being the real secure ID code not being modified, then store it in described database of identifier codes.
Described database of identifier codes only stores the bio information that secure ID code does not store the organism of collection, it is to avoid
The leakage of the bio information of organism, and then avoid the bio information puppet according to organism to produce identical organism.Described mark
Knowing code data base to be made up of o f chain data base, in each block chain data base, storage has described secure ID
Code, and each block chain data base backups each other, it is possible to avoid the Missing data in database of identifier codes and avoid black
Visitor distorts database of identifier codes.
S102, the contract content and the contract trigger condition that associate with described secure ID code-phase are stored to described contract
In data base, wherein, described contract content includes multiple contract terms.
Concrete, the contract content and the contract trigger condition that associate with described secure ID code-phase are stored to described contract
About in data base, wherein, described contract content includes multiple contract terms.In described secure ID code and described contract data base
Contract content and contract trigger condition be associated, only could be to contract content and contract after secure ID code is verified
About trigger condition is modified, the described contract content being stored in described contract data base, can be set to according to practical situation
Disclosed in allow other people see;Or carry out kept secure after Jia Mi, i.e. will not be seen by other people in addition to client;Or
It is confidential state before person, after arriving the condition set, carries out disclosure.
Described contract data base is made up of o f chain data base, and storing in each block chain data base has
Described contract content and contract trigger condition, and each block chain data base backups each other, it is possible to avoid contract data
Missing data in storehouse and avoid hacker to distort database of identifier codes, ensure that in contract data base, contract content and contract are touched
The confidentiality of clockwork spring part and safety.
The monitoring information that S103, RX monitor send, is judging that described monitoring information meets described contract trigger condition
Time, perform the contract terms corresponding with described contract trigger condition.
Concrete, the monitoring information of RX monitor transmission, judging that described monitoring information meets described contract and triggers bar
During part, perform the contract terms corresponding with described contract trigger condition.Concrete, described monitoring information specifically includes safety post
Know code and the monitoring data being associated with described contract content;Described contract trigger condition specifically includes testing of secure ID code
Card is by information and default Contract Enforcement condition.If described monitoring information is secure ID code, then verify described secure ID
Whether code is described preset security identification code, the most then perform the contract terms of correspondence, if it is not, then by described secure ID code
Store to not clear database of identifier codes, give over to evidence, in order to the personnel being intended to invade database of identifier codes for day " Invest, Then Investigate " provide
Help.If described monitoring information is the monitoring data that described contract content is associated, described judging that described monitoring data meet
When presetting Contract Enforcement condition, perform corresponding contract terms.
Contract terms in the contract content that contract trigger condition is corresponding are consulted to decide by client according to practical situation.Institute
Stating not clear database of identifier codes uses o f chain to form equally, improves the safety of not clear secure ID code storage.
It addition, described contract content is specially testament content, transference of title of property content or transfering use right content.
If described contract content is specially testament content, then gather the bio information of testator and the safety code of setting,
And use AES to carry out being calculated exclusive secure ID code, and store to database of identifier codes, and by testament
Hold and store to contract data base after the encryption of testament trigger condition, and will not be seen by other people in addition to testator
Arriving, wherein, described testament trigger condition includes that secure ID code does not receives secure ID in being verified information, Preset Time
The information that is verified of code and the dead information of testator.
Concrete, if in Preset Time, described watch-dog is not received by the secure ID code of testator, such as, it is necessary to
The bio information gathering a testator in every 3 years and preset security code, generate described secure ID code and verify, if three
Year, then acquiescence testator was dead, automatically deciphering testament content to being not received by the secure ID code of testator,
And automatically begin to perform testament content;Or receive the proof information that testator is dead, automatically deciphering testament content, and from
Moving and start to perform testament content, wherein, described proof information is gathered the relevant of organism by special bio body activity checking equipment
Information, confirms identity and whether be existing state, the definition of life and death by life and death checking equipment according to forensic medicine regulation before death
Assert;All receiving the secure ID code of testator in Preset Time, described testament content just will not be performed only every time,
And testament content can be modified after secure ID code is proved to be successful by testator.
If described contract content is specially transference of title of property content, gather the most respectively the bio information of owner and creditor with
And preset security code, then use AES that bio information and the preset security code of owner are calculated owner
Secure ID code, and use AES that bio information and the preset security code of creditor are calculated creditor
Secure ID code, and the secure ID code of owner is stored to secure ID yardage together with the secure ID code of creditor
According in storehouse, then by the transference of title of property content associated with the secure ID code-phase of the secure ID code and creditor of owner with turn
Allowing trigger condition store to contract data base, wherein, described transfer trigger condition includes that secure ID code is verified information
And owner does not carry out certain activity according to agreement in advance on schedule.
It is concrete, if described watch-dog is not received by owner according to must carrying out of making an appointment in Preset Time
The information of certain activity, then perform, according to agreement, the clause that some in transference of title of property content sets, and such as owner does not press
Time periodically refund, then automatically according to agreement, the property right of owner is transferred to creditor under one's name, concrete transference of title of property content root
Arrange by client according to practical situation;Or monitor monitors owner and completes the refund of debt, then contract is lost automatically
Effect, associating between creditor with property right ceases to be in force automatically;Or owner and creditor are simultaneously to respective secure ID code
Verify, and according to agreement together change transference of title of property content, the property right that contract data base is stored after being verified
Information and the owner's information associated with property right and creditor's information, disclosed according to legal provisions and inquired about.
It addition, the property right of oneself property and corresponding right of disposal part can also be transferred to other people, specifically by owner
Other people secure ID code is associated with the property right percentage ratio of owner's property and corresponding right of disposal percentage ratio, translates into
After merit, the property right of the property of owner and corresponding right of disposal are owned together with other people according to the contract content of agreement.Example
As, first has property right and 100% right of disposal of the 100% of A real estate, and present first is by the property right of A real estate and right of disposal
Part is transferred to second, becomes first and occupies the property right of 60% and the right of disposal of 60%, and second occupies property right and 40% right of disposal of 40%,
I.e. according to contract content, 60% property right of A real estate is associated with the secure ID code-phase of first with 60% right of disposal, by A room
40% property right of real estate associates with the secure ID code-phase of second with 40% right of disposal.
If described contract content is specially transfering use right content, gather the biological letter of owner and right to use people the most respectively
Breath and preset security code, then use AES that bio information and the preset security code of owner are calculated product
The secure ID code of power people, and use AES that bio information and the preset security code of right to use people are calculated
The secure ID code of right to use people, and the secure ID code of owner is stored to peace together with the secure ID code of right to use people
In full database of identifier codes, the property right that then will associate with the secure ID code-phase of the secure ID code and right to use people of owner
Transferring the possession of content and transfer trigger condition stores to contract data base, wherein, described transfer trigger condition includes secure ID code
It is verified information and right to use people during the use to certain article, occurs violating the content of agreement.
Concrete, right to use people held property right the right to use of certain article of people within the time set, such as car or
House, if if watch-dog detects that right to use people occurs violating during the use to certain article within the described scheduled time
The content of agreement, then terminate the right to use people right to use to article in advance according to agreement, such as, if article are car, at prison
In the case of control finds that violating the traffic regulations occurs in right to use people, terminate the right to use people right to use to car, if article are
House, in the case of monitoring finds that right to use people occurs damaging house, terminates the right to use people right to use to house, specifically makes
Transfer the possession of content by power to arrange by client according to practical situation;Or monitor monitors right to use people and uses the phase of certain article
Being limited to, contract ceases to be in force automatically, and right to use people ceases to be in force automatically with associating of article;Or owner and right to use people are the most right
Respective secure ID code is verified, and according to agreement together change transference of title of property content, contract number after being verified
The right to use information stored according to storehouse and the owner's information associated with the right to use and right to use people's information, according to legal provisions
Disclosed and inquired about.
Embodiment two, a kind of Contract Enforcement system based on Biont information.Below in conjunction with Fig. 2, the present embodiment is provided
System is described in detail.
Seeing Fig. 2, the system that the present embodiment provides includes calculating storaging unit 201, contract memory element 202 and contract
Performance element 203.
Described calculating storaging unit 201, for use predetermined cryptographic algorithm to gather organism bio information and
The safety code preset calculates, and obtains the preset security identification code that described organism is corresponding, and is stored to mark yardage
According in storehouse.
Concrete, described calculating storaging unit 201 use the bio information of the predetermined cryptographic algorithm organism to gathering with
And the safety code preset calculates, obtain the preset security identification code that described organism is corresponding, and stored to identification code
In data base.Described bio information be specially DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, attitude,
A kind of information in the information such as gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, decorative pattern, footprint or cicatrix and
The combination of much information.Described safety code includes in the information such as word, voice, attitude, image, hardware key and action
Plant or the combination of much information.Described predetermined cryptographic algorithm can use the arrangement of a kind of AES or multiple encryption algorithms
Combination, with specific reference to being actually needed setting.Gathering the bio information of organism when, according to the different acquisition of safe class
Different bio informations and different safety codes, and different bio informations and safety code are combined, use setting
AES is calculated secure ID code, and described secure ID code is exclusive secure ID code, it is impossible to forge.Described biology
Body both can be that the mankind can also be for animals and plants.In described database of identifier codes, only storage secure ID code does not store collection
The bio information of organism, it is to avoid the leakage of the bio information of organism, and then avoid the bio information according to organism to forge
Go out identical organism.Described database of identifier codes is made up of o f chain data base, each block chain data base
In all stored described secure ID code, and each block chain data base backups each other, it is possible to avoid database of identifier codes
In Missing data and avoid hacker to distort database of identifier codes.
Described contract memory element 202, for touching the contract content and the contract that associate with described secure ID code-phase
Clockwork spring part stores to described contract data base, and wherein, described contract content includes multiple contract terms.
Concrete, described contract memory element 202 is by the contract content associated with described secure ID code-phase and contract
Trigger condition stores to described contract data base, and wherein, described contract content includes multiple contract terms.Described secure ID
Code is associated with the contract content in described contract data base and contract trigger condition, is only verified it at secure ID code
After contract content and contract trigger condition could be modified.Described contract data base is by o f chain data base's group
Becoming, in each block chain data base, storage has described contract content and contract trigger condition, and each block chain
Data base backups each other, it is possible to avoids the Missing data in contract data base and avoids hacker to distort database of identifier codes, protects
Contract content and the confidentiality of contract trigger condition and safety in contract data base are demonstrate,proved.
Described Contract Enforcement unit 203, the monitoring information that RX monitor sends, judging that described monitoring information meets institute
When stating contract trigger condition, perform the contract terms corresponding with described contract trigger condition.
Concrete, the information that monitors described in described contract memory element specifically include secure ID code and with described contract
The monitoring data that content is associated;Described contract trigger condition specifically includes the information that is verified of secure ID code and presets
Contract Enforcement condition.Described Contract Enforcement unit 203, when described monitoring information is secure ID code, verifies described secure ID
Whether code is described preset security identification code, the most then perform the contract terms of correspondence, if it is not, then by described secure ID code
Store to not clear database of identifier codes;When described monitoring information is the monitoring data that described contract content is associated, judging
When described monitoring data meet described default Contract Enforcement condition, perform corresponding contract terms.
A kind of based on Biont information the Contract Enforcement method and system that the present invention provides, use AES to collection
The bio information of contracting parties and the safety code preset be calculated exclusive secure ID code, and only by described safety
Identification code carries out storing and not storing the bio information of organism, it is to avoid the leakage of bio information, and secure ID code is biological
Body is exclusive, it is impossible to forge, it is possible to ensure the safety of organism identification;Also described secure ID code is stored to mark
Code data base, identification database is made up of o f chain data base, and each block chain data base all stored
State secure ID code, and each block chain data base backups each other, in the contract that also will associate with described secure ID code-phase
Holding and contract trigger condition stores to contract data base, contract data base is made up of, often o f chain data base
One block chain data base has all stored described contract content and contract trigger condition, and each block chain data base is each other
Backup, even if using o f chain data base hacker to attack destruction distorted an o f chain data base, also can
Because the existence of the o f chain data base of other backups, and whole o f chain Database Systems cannot be destroyed,
The o f chain data base of backup is the most, and the data in o f chain data base are the safest;It addition, judge monitoring
Whether the monitoring information of device meets contract trigger condition, if meeting the contract terms that can automatically perform in contract content, and peace
Complete just convenience, does not haves the situation that contract content is tampered and cannot be performed, and practicality is stronger.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (11)
1. a Contract Enforcement method based on Biont information, it is characterised in that described method includes:
S101, the bio information of the employing predetermined cryptographic algorithm organism to gathering and default safety code calculate,
To the preset security identification code that described organism is corresponding, and stored to database of identifier codes;
S102, the contract content and the contract trigger condition that are associated with described preset security identification code are stored to described contract
In data base, wherein, described contract content includes multiple contract terms;
The monitoring information that S103, RX monitor send, when judging that described monitoring information meets described contract trigger condition, holds
The contract terms that row is corresponding with described contract trigger condition.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described biological letter
Breath specifically includes DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, decorative pattern, attitude, gait, infrared temperature
A kind of information in spectrogram, dental impression, denture, ear shape, body odour, footprint and cicatrix information or the combination of much information;
Described safety code includes one or more letters in word, voice, attitude, image, hardware key and action message
The combination of breath.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described S101 has
Body includes:
Use the AES described bio information to combining and described safety code to be encrypted calculating, obtain described life
The preset security identification code that object is corresponding.
A kind of Contract Enforcement method based on Biont information, it is characterised in that in described S103
Described monitoring information specifically includes secure ID code and the monitoring data being associated with described contract content;
Described contract trigger condition specifically includes the information that is verified of secure ID code and default Contract Enforcement condition.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described S103 has
Body includes:
If described monitoring information is secure ID code, then verify whether described secure ID code is described preset security identification code,
The most then perform the contract terms of correspondence, if it is not, then store described secure ID code to not clear database of identifier codes;
If described monitoring information is the monitoring data that described contract content is associated, described pre-judging that described monitoring data meet
If during Contract Enforcement condition, perform corresponding contract terms.
A kind of Contract Enforcement method based on Biont information, it is characterised in that described identification code
Data base, contract data base and not clear database of identifier codes are all made up of o f chain data base, and distributed
Each block chain data base in block chain data base backups each other.
A kind of Contract Enforcement method based on Biont information, it is characterised in that in described contract
Hold and be specially testament content, transference of title of property content or transfering use right content.
8. a Contract Enforcement system based on Biont information, it is characterised in that described system includes:
Calculating storaging unit, for using the bio information of the predetermined cryptographic algorithm organism to gathering and default safety code
Calculate, obtain the preset security identification code that described organism is corresponding, and stored to database of identifier codes;
Contract memory element, for depositing the contract content and the contract trigger condition that are associated with described preset security identification code
In storage extremely described contract data base, wherein, described contract content includes multiple contract terms;
Contract Enforcement unit, the monitoring information that RX monitor sends, judging that described monitoring information meets described contract and triggers
During condition, perform the contract terms corresponding with described contract trigger condition.
A kind of Contract Enforcement system based on Biont information, it is characterised in that described calculating is deposited
Storage unit specifically includes:
Use the predetermined cryptographic algorithm described bio information to combining and described safety code to be encrypted calculating, obtain institute
State the preset security identification code that organism is corresponding.
A kind of Contract Enforcement system based on Biont information, it is characterised in that described contract
The information that monitors described in memory element specifically includes secure ID code and the monitoring data being associated with described contract content;
Described contract trigger condition specifically includes the information that is verified of secure ID code and default Contract Enforcement condition.
11. a kind of Contract Enforcement systems based on Biont information, it is characterised in that described contract
Performance element specifically includes;
If described monitoring information is secure ID code, then verify whether described secure ID code is described preset security identification code,
The most then perform the contract terms of correspondence, if it is not, then store described secure ID code to not clear database of identifier codes;
If described monitoring information is the monitoring data that described contract content is associated, described pre-judging that described monitoring data meet
If during Contract Enforcement condition, perform corresponding contract terms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610407333.5A CN106096443B (en) | 2016-06-12 | 2016-06-12 | A kind of Contract Enforcement method and system based on Biont information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610407333.5A CN106096443B (en) | 2016-06-12 | 2016-06-12 | A kind of Contract Enforcement method and system based on Biont information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106096443A true CN106096443A (en) | 2016-11-09 |
CN106096443B CN106096443B (en) | 2018-12-21 |
Family
ID=57228829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610407333.5A Active CN106096443B (en) | 2016-06-12 | 2016-06-12 | A kind of Contract Enforcement method and system based on Biont information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096443B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547477A (en) * | 2018-12-27 | 2019-03-29 | 石更箭数据科技(上海)有限公司 | A kind of data processing method and its device, medium, terminal |
CN110019206A (en) * | 2017-11-01 | 2019-07-16 | 杭州沃朴物联科技有限公司 | A kind of cultivated animals tracking anti-counterfeiting system and method based on block chain |
CN110598063A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Biological identity query method, device and storage medium |
WO2021105797A1 (en) * | 2019-11-25 | 2021-06-03 | International Business Machines Corpofiation | Managing physical objects using crypto-anchors |
US11397760B2 (en) | 2019-11-25 | 2022-07-26 | International Business Machines Corporation | Managing relationships between persons and physical objects based on physical fingerprints of the physical objects |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101661599A (en) * | 2009-09-25 | 2010-03-03 | 浙江维尔生物识别技术股份有限公司 | Method for authenticating validity of self-contained software of equipment system |
CN102243748A (en) * | 2011-08-04 | 2011-11-16 | 郁晓东 | Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt |
US20150379510A1 (en) * | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN105225155A (en) * | 2015-09-25 | 2016-01-06 | 中国人民财产保险股份有限公司 | A kind of insurance risk management-control method based on biological identification technology |
-
2016
- 2016-06-12 CN CN201610407333.5A patent/CN106096443B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101661599A (en) * | 2009-09-25 | 2010-03-03 | 浙江维尔生物识别技术股份有限公司 | Method for authenticating validity of self-contained software of equipment system |
CN102243748A (en) * | 2011-08-04 | 2011-11-16 | 郁晓东 | Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt |
US20150379510A1 (en) * | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN105225155A (en) * | 2015-09-25 | 2016-01-06 | 中国人民财产保险股份有限公司 | A kind of insurance risk management-control method based on biological identification technology |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110019206A (en) * | 2017-11-01 | 2019-07-16 | 杭州沃朴物联科技有限公司 | A kind of cultivated animals tracking anti-counterfeiting system and method based on block chain |
CN109547477A (en) * | 2018-12-27 | 2019-03-29 | 石更箭数据科技(上海)有限公司 | A kind of data processing method and its device, medium, terminal |
CN110598063A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Biological identity query method, device and storage medium |
CN110598063B (en) * | 2019-09-29 | 2023-08-11 | 腾讯科技(深圳)有限公司 | Biological identity query method, device and storage medium |
WO2021105797A1 (en) * | 2019-11-25 | 2021-06-03 | International Business Machines Corpofiation | Managing physical objects using crypto-anchors |
US11397760B2 (en) | 2019-11-25 | 2022-07-26 | International Business Machines Corporation | Managing relationships between persons and physical objects based on physical fingerprints of the physical objects |
GB2604565A (en) * | 2019-11-25 | 2022-09-07 | Ibm | Managing physical objects using crypto-anchors |
US11798342B2 (en) | 2019-11-25 | 2023-10-24 | International Business Machines Corporation | Managing physical objects using crypto-anchors |
Also Published As
Publication number | Publication date |
---|---|
CN106096443B (en) | 2018-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106096444B (en) | A kind of identification based on biological information and social information's recording method and system | |
CN106096443A (en) | A kind of Contract Enforcement method and system based on Biont information | |
CN102077545B (en) | Personal security manager for ubiquitous patient monitoring | |
CN112217807B (en) | Cone block chain key generation method, authentication method and system | |
CN108665275A (en) | The system and method for block chain project management | |
CN107947922A (en) | A kind of digital archives management method and system based on block chain technology | |
CN109243553A (en) | Medical data processing method, system, computer equipment and readable storage medium storing program for executing | |
Li et al. | Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic? | |
CN109496403A (en) | For having the preceding dynamic to privacy and commission verifiability to can search for the method and system of symmetric cryptography | |
CN109961826A (en) | A kind of health information management system and method based on medical block chain | |
CN107871081A (en) | A kind of computer information safe system | |
CN105989297A (en) | Encryption and decryption method and device of electronic prescription | |
CN109741819A (en) | A kind of clinical care system, method and data ciphering method based on block chain | |
CN116318617B (en) | Medical rescue material charity donation method based on RFID and blockchain | |
Xu et al. | A secure mutual authentication scheme of blockchain-based in WBANs | |
CN108063754A (en) | Towards the attribute base encryption method of wearable health monitoring equipment anonymization data | |
CN106921489B (en) | Data encryption method and device | |
Kasat et al. | A novel security framework for healthcare data through IOT sensors | |
Al-Saeed et al. | Efficient key agreement algorithm for wireless body area networks using reusable ECG-based features | |
CN109522694A (en) | A kind of identification system based on computer network | |
CN112487461A (en) | Data encryption method | |
Zhang et al. | A biometrics based security solution for encryption and authentication in tele-healthcare systems | |
CN114491631A (en) | Nursing sensitive index information interaction method and monitoring device | |
DE102020130815B3 (en) | Decentralized provision of user data | |
DE102006021347B4 (en) | Procedure for the court-enforceable execution of transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |