CN106096443B - A kind of Contract Enforcement method and system based on Biont information - Google Patents

A kind of Contract Enforcement method and system based on Biont information Download PDF

Info

Publication number
CN106096443B
CN106096443B CN201610407333.5A CN201610407333A CN106096443B CN 106096443 B CN106096443 B CN 106096443B CN 201610407333 A CN201610407333 A CN 201610407333A CN 106096443 B CN106096443 B CN 106096443B
Authority
CN
China
Prior art keywords
contract
information
security identifier
database
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610407333.5A
Other languages
Chinese (zh)
Other versions
CN106096443A (en
Inventor
杨鹏
Original Assignee
杨鹏
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杨鹏 filed Critical 杨鹏
Priority to CN201610407333.5A priority Critical patent/CN106096443B/en
Publication of CN106096443A publication Critical patent/CN106096443A/en
Application granted granted Critical
Publication of CN106096443B publication Critical patent/CN106096443B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The Contract Enforcement method and system based on Biont information that the invention discloses a kind of, wherein, the described method includes: being calculated using predetermined cryptographic algorithm the biological information of the organism of acquisition and preset safety code, the corresponding default security identifier code of the organism is obtained, and is stored into database of identifier codes;Contract content associated with the default security identifier code and contract trigger condition are stored into the contract database, wherein the contract content includes multiple contract terms;The monitoring information that RX monitor is sent executes contract terms corresponding with the contract trigger condition when judging that the monitoring information meets the contract trigger condition.The present invention can judge automatically whether meet preset contract trigger condition according to monitoring information, execute the corresponding contract terms of the contract trigger condition, the just execution of guarantee deed automatically if satisfied, and the content of contract not will be leaked, safe ready.

Description

A kind of Contract Enforcement method and system based on Biont information
Technical field
The present invention relates to field of computer technology, and in particular to a kind of Contract Enforcement method based on Biont information and is System.
Background technique
In the prior art, sign a contract between multi-party, and when carrying out execution content according to contract, typically signing papery Contract, but there is the risk being torn to pieces, be tampered or be leaked in papery contract, and the electronics being stored in general data library Contract then exists and is hacked the risk that database is tampered or is leaked, and the execution of contract be also required to it is artificial Implementation and supervision, it is just objective to accomplish, also not can guarantee the safety of contract content.
Summary of the invention
The Contract Enforcement method and system based on Biont information that technical problem to be solved by the invention is to provide a kind of, It can be judged automatically according to monitoring information and whether meet preset contract trigger condition, execute the contract automatically if satisfied The about corresponding contract terms of trigger condition, the just execution of guarantee deed, and the content of contract not will be leaked, safe ready.
The technical scheme to solve the above technical problems is that
According to one aspect of the present invention, a kind of Contract Enforcement method based on Biont information, the method are provided Include:
S101, the biological information of the organism of acquisition and preset safety code are counted using predetermined cryptographic algorithm It calculates, obtains the corresponding default security identifier code of the organism, and stored into database of identifier codes;
S102, contract content associated with the default security identifier code and contract trigger condition are stored to described In contract database, wherein the contract content includes multiple contract terms;
The monitoring information that S103, RX monitor are sent is judging that the monitoring information meets the contract trigger condition When, execute contract terms corresponding with the contract trigger condition.
Beneficial effects of the present invention: a kind of Contract Enforcement method based on Biont information provided by the invention, Neng Gouyong Encryption Algorithm the biological information of the contracting parties of acquisition and preset safety code is calculated exclusive security identifier code, institute Stating security identifier code is that organism is exclusive, can not be forged, and can guarantee the safety of organism identification, and only by institute The biological information that security identifier code is stored without storing organism is stated, the leakage of biological information is avoided;And contract is worked as into thing The contract content and contract trigger condition of people's agreement are associated together with the default security identifier code, and judge monitor Whether monitoring information meets contract trigger condition, if meeting the contract terms that can be executed automatically in contract content, safety is public It is positive convenient, it is not in the case where contract content is tampered and can not be performed, practicability is stronger.
Further, the biological information specifically include DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, One of dermatoglyph, decorative pattern, posture, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, footprint and scar information The combination of information or much information;The safety code includes text, voice, posture, image, hardware code key and action message One or more of information combination.
Using above-mentioned further scheme the utility model has the advantages that acquiring contracting parties secret according to the actual situation and exclusive life Object information and the safety code of setting guarantee the exclusive property and privacy of the default security identifier code generated.
Further, the biological information and the safety code combined are added using predetermined cryptographic algorithm Close calculating obtains the corresponding default security identifier code of the organism.
Using above-mentioned further scheme the utility model has the advantages that the biological information and the safety code are combined after It is encrypted again, further improves the safety and uniqueness of default security identifier code, default security identifier code is avoided to be broken Solution.
Further, the monitoring information specifically includes security identifier code and monitoring associated with the contract content Data;What the contract trigger condition specifically included security identifier code is verified information and default Contract Enforcement condition.
Using above-mentioned further scheme the utility model has the advantages that being triggered convenient for triggering corresponding contract by corresponding monitoring information Condition.
Further, if the monitoring information is security identifier code, verify whether the security identifier code is described pre- If security identifier code, if so, corresponding contract terms are executed, if it is not, then storing the security identifier code to unknown mark Code database;If the monitoring information is the associated monitoring data of contract content, the monitoring data satisfaction is being judged When the default Contract Enforcement condition, corresponding contract terms are executed.
Using above-mentioned further scheme the utility model has the advantages that whether the monitoring information for judging automatically monitor meets contract triggering Condition, if meeting the contract terms that can be executed automatically in contract content, the just convenience of safety.
Further, the database of identifier codes, contract database and unknown database of identifier codes are by distribution Block chain database composition, and each of distributed block chain database block chain database is mutually backups.
Using above-mentioned further scheme the utility model has the advantages that identification database, contract database and unknown identification code data Library is made of distributed block chain database, each block chain database is stored with corresponding default security identifier Code, contract content and contract trigger condition and unknown identification code, and each block chain database is mutually backups, using distribution Formula block chain database, even if hacker, which attacks to destroy, has distorted a distributed block chain database, as other are backed up Distributed block chain database presence, and entire distributed block chain Database Systems can not be destroyed, the distribution of backup Block chain database is more, and the data in distributed block chain database are safer.
Further, the contract content is specially testament content, transference of title of property content or transfering use right content.
Using above-mentioned further scheme the utility model has the advantages that testament content, transference of title of property content or transfering use right content Can secure storage, and executed according to trigger condition according to agreement is automatic.
According to another aspect of the invention, a kind of Contract Enforcement system based on Biont information, the system are provided System includes:
Calculating storaging unit, for the biological information and preset peace using predetermined cryptographic algorithm to the organism of acquisition All-key is calculated, and obtains the corresponding default security identifier code of the organism, and stored into database of identifier codes;
Contract storage unit, for contract content associated with the default security identifier code and contract to be triggered item Part is stored into the contract database, wherein the contract content includes multiple contract terms;
Contract Enforcement unit, the monitoring information that RX monitor is sent are judging that the monitoring information meets the contract When trigger condition, contract terms corresponding with the contract trigger condition are executed.
Beneficial effects of the present invention: a kind of Contract Enforcement method based on Biont information provided by the invention, Neng Gouyong Encryption Algorithm the biological information of the contracting parties of acquisition and preset safety code is calculated exclusive security identifier code, institute Stating security identifier code is that organism is exclusive, can not be forged, and can guarantee the safety of organism identification, and only by institute The biological information that security identifier code is stored without storing organism is stated, the leakage of biological information is avoided;And contract is worked as into thing The contract content and contract trigger condition of people's agreement are associated together with the default security identifier code, and judge monitor Whether monitoring information meets contract trigger condition, if meeting the contract terms that can be executed automatically in contract content, safety is public It is positive convenient, it is not in the case where contract content is tampered and can not be performed, practicability is stronger.
Further, the calculating storaging unit specifically includes: using predetermined cryptographic algorithm to described in combining Biological information and the safety code carry out computations, obtain the corresponding default security identifier code of the organism.
Using above-mentioned further scheme the utility model has the advantages that the biological information and the safety code are combined after It is encrypted again, further improves the safety and uniqueness of default security identifier code, default security identifier code is avoided to be broken Solution.
Further, monitoring information described in the contract storage unit specifically include security identifier code and with the contract The about associated monitoring data of content;What the contract trigger condition specifically included security identifier code is verified information and pre- If Contract Enforcement condition.
Using above-mentioned further scheme the utility model has the advantages that being triggered convenient for triggering corresponding contract by corresponding monitoring information Condition.
Further, the Contract Enforcement unit specifically includes;If the monitoring information is security identifier code, institute is verified State whether security identifier code is the default security identifier code, if so, corresponding contract terms are executed, if it is not, then will be described Security identifier code is stored to unknown database of identifier codes;If the monitoring information is the associated monitoring number of the contract content According to executing corresponding contract terms when judging that the monitoring data meets the default Contract Enforcement condition.
Using above-mentioned further scheme the utility model has the advantages that whether the monitoring information for judging automatically monitor meets contract triggering Condition, if meeting the contract terms that can be executed automatically in contract content, the just convenience of safety.
Detailed description of the invention
Fig. 1 is a kind of Contract Enforcement method flow diagram based on Biont information of the embodiment of the present invention one;
Fig. 2 is a kind of Contract Enforcement system schematic based on Biont information of the embodiment of the present invention two.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the invention.
Embodiment one, a kind of Contract Enforcement method based on Biont information.Below with reference to Fig. 1 to provided in this embodiment Method is described in detail.
Referring to Fig. 1, S101, the biological information using predetermined cryptographic algorithm to the organism of acquisition and preset safety code It is calculated, obtains the corresponding default security identifier code of the organism, and stored into database of identifier codes.
Specifically, being counted using predetermined cryptographic algorithm to the biological information of the organism of acquisition and preset safety code It calculates, obtains the corresponding default security identifier code of the organism, and stored into database of identifier codes.The biological information Specially DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, posture, gait, decorative pattern, infrared temperature spectrum The combination of one of the information such as figure, dental impression, denture, ear shape, body odour, footprint and scar information or much information.It is described Safety code includes the group of one or more of the information such as text, voice, posture, image, hardware code key and movement information It closes.The permutation and combination of a kind of Encryption Algorithm or multiple encryption algorithms can be used in the predetermined cryptographic algorithm, with specific reference to reality It needs to set.When acquiring the biological information of organism, according to the different biological information of the different acquisition of security level and Different safety codes, and different biological information and safety code are combined, it is calculated using the Encryption Algorithm of setting Security identifier code, the security identifier code are exclusive security identifier code, can not be forged.By by different biological information and peace After all-key carries out different group merging encryptions, different grades of security identifier code is generated, for example, fingerprint is encrypted using algorithm A To inferior grade security identifier code 1;Iris encrypts to obtain inferior grade security identifier code 2 using algorithm A;Fingerprint is encrypted using algorithm B Obtain inferior grade security identifier code 3;After fingerprint and secret safety code Ω combination, encrypt to obtain the middle and low grade safety using algorithm A Identification code 4;After gait, iris, vocal print and secret safety code β combination, encrypt to obtain middle grade security identifier code using algorithm C 5;It encrypts to obtain using algorithm C after DNA, fingerprint, iris, gait, secret safety code α and secret safety code γ combination high-grade Security identifier code 6;In addition, multiple and different security identifier codes can be combined according to the requirement of use environment, to carry out The identification of organism, for example, can be chosen from above-mentioned 6 different grades of security identifier codes according to the requirement of use environment It is multiple to combine, for identifying organism, for example, adding the middle and low grade security identifier using inferior grade security identifier code 2 Code 4 confirms organism;Or inferior grade security identifier code 3 confirms organism plus middle grade security identifier code 5.
For example, if organism be identical twin perhaps multiparity identical twin or multiparity because being from one A fertilization egg division development, DNA is completely the same, but by the nuance of growth and development environment, fingerprint, iris, The living body features such as vein will not be identical, can by the information such as fingerprint, iris, vein come differentiation identical twin or Person multiparity.Assuming that identical twin or multiparity can not collect the biologies such as fingerprint, iris, vein because of certain reason Body characteristics, then can be distinguished by the preset safety code of organism.If all biological informations of organism are leaked, As long as preset safety code is not leaked, which still can confirm identity by the default security identifier code.
The organism both can may be animals and plants for the mankind.For example, the right of attribution of certain animal belongs to possessor, The security identifier code of animal can be so generated according to biological characteristics such as the iris of animal and decorative patterns, and according to possessor's biological information Possessor's security identifier code is generated with default safety code computations, and the security identifier code of the two is associated together and is stored Into database of identifier codes, the right of attribution of animal can be confirmed according to the security identifier code of animal in the case where there is unexpected situation. When organism be plant when, can with the DNA of herborization, kind, annual ring, micronutrient levels or attitude integration together, It is encrypted with Encryption Algorithm and generates the exclusive corresponding security identifier code of plant.
In addition, when acquiring the biological information of organism, it is necessary in a safe environment, guarantee biological information not by not The third party of authorization intercepts and captures, and is handled using Encryption Algorithm such as digital signature, it is ensured that the security identifier code was stored in transmission It is not modified in journey, when storing the security identifier code, first has to analyze the security identifier code transmitted, determined After being the true security identifier code not being modified, then store it in the database of identifier codes.
Only storage security identifier code does not store the biological information of the organism of acquisition in the database of identifier codes, avoids The leakage of the biological information of organism, and then avoid producing identical organism according to the biological information puppet of organism.The mark Know code database to be made of distributed block chain database, is stored with the security identifier in each block chain database Code, and each block chain database is mutually backups, and can be avoided the Missing data in database of identifier codes and avoids black Visitor distorts database of identifier codes.
S102, contract content associated with the security identifier code and contract trigger condition are stored to the contract In database, wherein the contract content includes multiple contract terms.
Specifically, storing contract content associated with the security identifier code and contract trigger condition to the contract About in database, wherein the contract content includes multiple contract terms.In the security identifier code and the contract database Contract content and contract trigger condition it is associated, could be to contract content and contract only after security identifier code is verified About trigger condition is modified, and the contract content being stored in the contract database can be set as according to the actual situation It is disclosed that other people is allowed to see;Or carry out kept secure after encryption, i.e., it will not be seen by other people other than party;Or It is confidential state before person, carries out disclosure after reaching the condition of setting.
The contract database is made of distributed block chain database, is stored in each block chain database The contract content and contract trigger condition, and each block chain database is mutually backups, and can be avoided contract data Missing data in library and hacker is avoided to distort database of identifier codes, ensure that contract content and contract touching in contract database The confidentiality and safety of clockwork spring part.
The monitoring information that S103, RX monitor are sent is judging that the monitoring information meets the contract trigger condition When, execute contract terms corresponding with the contract trigger condition.
Specifically, the monitoring information that RX monitor is sent, judge that the monitoring information meets the contract and trigger item When part, contract terms corresponding with the contract trigger condition are executed.Specifically, the monitoring information specifically includes safety post Know code and monitoring data associated with the contract content;The contract trigger condition specifically includes testing for security identifier code Card passes through information and default Contract Enforcement condition.If the monitoring information is security identifier code, the security identifier is verified Whether code is the default security identifier code, if so, corresponding contract terms are executed, if it is not, then by the security identifier code It stores to unknown database of identifier codes, gives over to evidence, so that the personnel for being intended to intrusion database of identifier codes for investigation in the future provide It helps.If the monitoring information is the associated monitoring data of contract content, judging described in the monitoring data satisfaction When default Contract Enforcement condition, corresponding contract terms are executed.
Contract terms in the corresponding contract content of contract trigger condition are consulted to decide by party according to the actual situation.Institute Stating unknown database of identifier codes equally uses distributed block chain to form, and improves the safety of unknown security identifier code storage.
In addition, the contract content is specially testament content, transference of title of property content or transfering use right content.
If the contract content is specially testament content, the biological information of testator and the safety code of setting are acquired, And it using Encryption Algorithm carries out that exclusive security identifier code is calculated, and store into database of identifier codes, and will be in testament Hold and store with after the encryption of testament trigger condition into contract database, and will not be seen by other people other than testator It arrives, wherein the testament trigger condition includes that security identifier code is verified information, does not receive security identifier in preset time Code is verified information and the dead information of testator.
If specifically, the monitor is not received by the security identifier code of testator in preset time, for example, necessary The biological information of the testator of acquisition in every 3 years and default safety code, generate the security identifier code and are verified, if three Year to the security identifier code for being not received by testator, then defaults testator's death, automatic to decrypt testament content, And it automatically begins to execute testament content;Or the proof information of testator's death is received, it is automatic to decrypt testament content, and certainly It is dynamic to start to execute testament content, wherein described to prove information by the correlation of special bio body activity verifying equipment acquisition organism Information, confirmation identity and whether be existing state, the definition of life and death is by life and death verifying equipment according to forensic medicine regulation before death Assert;The security identifier code of testator is all received in only each preset time, the testament content will not be just performed, And testator can be modified testament content after security identifier code is proved to be successful.
If the contract content is specially transference of title of property content, acquire respectively the biological information of owner and creditor with And default safety code, then the biological information of owner and default safety code are carried out that owner is calculated using Encryption Algorithm Security identifier code, and the biological information of creditor and default safety code are carried out that creditor is calculated using Encryption Algorithm Security identifier code, and the security identifier code of the security identifier code of owner and creditor is stored together to security identifier yardage According in library, then by transference of title of property content associated with the security identifier code of the security identifier code of owner and creditor and turn Trigger condition is allowed to store into contract database, wherein the transfer trigger condition includes that security identifier code is verified information And owner does not carry out certain activity on schedule according to preparatory agreement.
If specifically, the monitor is not received by owner according to must carrying out of making an appointment in preset time Certain movable information then executes the clause of certain settings in transference of title of property content according to agreement, for example owner does not press When periodically refund, then the property right of owner is transferred to creditor under one's name according to agreement automatically, specific transference of title of property content root Arranged according to actual conditions by party;Or monitor monitors the refund that owner completes debt, then contract is lost automatically Effect, being associated between creditor and property right cease to be in force automatically;Or owner and creditor are simultaneously to respective security identifier code It is verified, and changes transference of title of property content, the property right that contract database is stored together according to agreement after being verified Information and with the associated owner's information of property right and creditor's information, disclosed and inquired according to legal provisions.
In addition, the property right of oneself property and corresponding right of disposal part can also be transferred to other people by owner, specifically Other people security identifier code is associated with the property right percentage of owner's property and corresponding right of disposal percentage, is translated into After function, the property right of the property of owner and corresponding right of disposal are co-owned according to the contract content of agreement with other people.Example Such as, first possesses 100% property right and 100% right of disposal of A real estate, and present first is by the property right and right of disposal of A real estate Part is transferred to second, becomes first and occupies 60% property right and 60% right of disposal, and second occupies 40% property right and 40% right of disposal, It is i.e. according to contract content that 60% property right of A real estate and 60% right of disposal is associated with the security identifier code of first, by the room A 40% property right and 40% right of disposal of real estate are associated with the security identifier code of second.
If the contract content is specially transfering use right content, the biology letter of owner and right to use people are acquired respectively Then breath and default safety code to the biological information of owner and default safety code carry out that production is calculated using Encryption Algorithm The security identifier code of people is weighed, and the biological information of right to use people and default safety code are calculated using Encryption Algorithm The security identifier code of right to use people, and the security identifier code of the security identifier code of owner and right to use people is stored together to peace In full database of identifier codes, then by property right associated with the security identifier code of security identifier code and right to use people of owner It transfers the possession of content and transfers the possession of trigger condition and store into contract database, wherein the transfer trigger condition includes security identifier code Information and right to use people is verified to occur violating the content of agreement in the use process to certain article.
The right to use of certain article of people specifically, right to use people holds property right within the set time, for example, vehicle or House, if if monitor detects that right to use people violates in the use process to certain article within the predetermined time The content of agreement then terminates in advance right to use people to the right to use of article according to agreement, for example, supervising if article is car Control discovery right to use people occurs in the case where violating the traffic regulations, and terminates right to use people to the right to use of car, if article is House terminates right to use people to the right to use in house, specifically makes in the case where damage house occurs in monitoring discovery right to use people Content is transferred the possession of with power to be arranged by party according to the actual situation;Or monitor monitors the phase that right to use people uses certain article It is limited to, contract ceases to be in force automatically, and right to use people ceases to be in force automatically with being associated with for article;Or owner and right to use people are right simultaneously Respective security identifier code is verified, and changes transference of title of property content, contract number together according to agreement after being verified The right to use information that is stored according to library and with the associated owner's information of the right to use and right to use people's information, according to legal provisions It is disclosed and is inquired.
Embodiment two, a kind of Contract Enforcement system based on Biont information.Below with reference to Fig. 2 to provided in this embodiment System is described in detail.
Referring to fig. 2, system provided in this embodiment includes calculating storaging unit 201, contract storage unit 202 and contract Execution unit 203.
The calculating storaging unit 201, for using predetermined cryptographic algorithm to the biological information of the organism of acquisition and Preset safety code is calculated, and the corresponding default security identifier code of the organism is obtained, and is stored to mark yardage According in library.
Specifically, the calculating storaging unit 201 use predetermined cryptographic algorithm to the biological information of the organism of acquisition with And preset safety code is calculated, and obtains the corresponding default security identifier code of the organism, and stored to identification code In database.The biological information be specially DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, posture, One of the information such as gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, decorative pattern, footprint or scar information and The combination of much information.The safety code includes one in the information such as text, voice, posture, image, hardware code key and movement The combination of kind or much information.The arrangement of a kind of Encryption Algorithm or multiple encryption algorithms can be used in the predetermined cryptographic algorithm Combination is set with specific reference to actual needs.When acquiring the biological information of organism, according to the different acquisition of security level Different biological informations and different safety codes, and different biological information and safety code are combined, using setting Security identifier code is calculated in Encryption Algorithm, and the security identifier code is exclusive security identifier code, can not forge.The biology Body both can may be animals and plants for the mankind.Only storage security identifier code does not store acquisition in the database of identifier codes The biological information of organism, avoids the leakage of the biological information of organism, and then avoids being forged according to the biological information of organism Identical organism out.The database of identifier codes is made of distributed block chain database, each block chain database In be all stored with the security identifier code, and each block chain database is mutually backups, and can be avoided database of identifier codes In Missing data and avoid hacker from distorting database of identifier codes.
The contract storage unit 202, being used for will contract content associated with the security identifier code and contract touching Clockwork spring part is stored into the contract database, wherein the contract content includes multiple contract terms.
Specifically, the contract storage unit 202 will contract content associated with the security identifier code and contract Trigger condition is stored into the contract database, wherein the contract content includes multiple contract terms.The security identifier Code in the contract database contract content and contract trigger condition it is associated, be only verified it in security identifier code After could modify to contract content and contract trigger condition.The contract database is by distributed block chain database group At being stored with the contract content and contract trigger condition, and each block chain in each block chain database Database is mutually backups, and can be avoided the Missing data in contract database and hacker is avoided to distort database of identifier codes, protects The confidentiality and safety of contract content and contract trigger condition in contract database are demonstrate,proved.
The Contract Enforcement unit 203, the monitoring information that RX monitor is sent are judging that the monitoring information meets institute When stating contract trigger condition, contract terms corresponding with the contract trigger condition are executed.
Specifically, monitoring information described in the contract storage unit specifically include security identifier code and with the contract The associated monitoring data of content;What the contract trigger condition specifically included security identifier code is verified information and default Contract Enforcement condition.The Contract Enforcement unit 203 verifies the security identifier when the monitoring information is security identifier code Whether code is the default security identifier code, if so, corresponding contract terms are executed, if it is not, then by the security identifier code It stores to unknown database of identifier codes;In monitoring information monitoring data associated for the contract content, judging When the monitoring data meets the default Contract Enforcement condition, corresponding contract terms are executed.
A kind of Contract Enforcement method and system based on Biont information provided by the invention, using Encryption Algorithm to acquisition Contracting parties biological information and preset safety code exclusive security identifier code is calculated, and only by the safety The biological information that identification code is stored without storing organism avoids the leakage of biological information, and security identifier code is biology Body is exclusive, can not forge, and can guarantee the safety of organism identification;Also the security identifier code is stored to mark Code database, identification database are made of distributed block chain database, each block chain database stores Security identifier code is stated, and each block chain database is mutually backups, it will also be in contract associated with the security identifier code Hold and contract trigger condition is stored to contract database, contract database is made of distributed block chain database, often One block chain database is stored with the contract content and contract trigger condition, and each block chain database is each other Backup has been distorted a distributed block chain database even if being attacked to destroy using distributed block chain database hacker, also could Because of the presence of the distributed block chain database of other backups, and entire distributed block chain Database Systems can not be destroyed, The distributed block chain database of backup is more, and the data in distributed block chain database are safer;In addition, judgement monitoring Whether the monitoring information of device meets contract trigger condition, if meeting the contract terms that can be executed automatically in contract content, peace Complete just convenience, is not in the case where contract content is tampered and can not be performed, practicability is stronger.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (11)

1. a kind of Contract Enforcement method based on Biont information, which is characterized in that the described method includes:
S101, the biological information of the organism of acquisition and preset safety code are calculated using predetermined cryptographic algorithm, is obtained To the corresponding default security identifier code of the organism, and stored into database of identifier codes;
S102, contract content associated with the default security identifier code and contract trigger condition are stored to contract data In library, wherein the contract content includes multiple contract terms;
The monitoring information that S103, RX monitor are sent is held when judging that the monitoring information meets the contract trigger condition Row contract terms corresponding with the contract trigger condition;
The database of identifier codes and the contract database are made of distributed block chain database, and distributed area Each of block chain database block chain database is mutually backups.
2. a kind of Contract Enforcement method based on Biont information as described in claim 1, which is characterized in that the biology letter Breath specifically includes DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave, dermatoglyph, decorative pattern, posture, gait, infrared temperature The combination of one of spectrogram, dental impression, denture, ear shape, body odour, footprint and scar information information or much information;
The safety code includes one or more of text, voice, posture, image, hardware code key and action message letter The combination of breath.
3. a kind of Contract Enforcement method based on Biont information as claimed in claim 2, which is characterized in that the S101 tool Body includes:
Computations are carried out to the biological information and the safety code combined using Encryption Algorithm, obtain the life The corresponding default security identifier code of object.
4. a kind of Contract Enforcement method based on Biont information as claimed in claim 3, which is characterized in that in the S103 The monitoring information is security identifier code or monitoring data associated with the contract content;
What the contract trigger condition specifically included security identifier code is verified information and default Contract Enforcement condition.
5. a kind of Contract Enforcement method based on Biont information as claimed in claim 4, which is characterized in that the S103 tool Body includes:
If the monitoring information is security identifier code, verify whether the security identifier code is the default security identifier code, If so, corresponding contract terms are executed, if it is not, then storing the security identifier code to unknown database of identifier codes;
If the monitoring information is the associated monitoring data of contract content, judging that it is described pre- that the monitoring data meets If when Contract Enforcement condition, executing corresponding contract terms.
6. a kind of Contract Enforcement method based on Biont information as claimed in claim 5, which is characterized in that the unknown mark Know code database to be made of distributed block chain database, and each of distributed block chain database block chain number It is mutually backups according to library.
7. a kind of Contract Enforcement method based on Biont information as claimed in claim 6, which is characterized in that in the contract Hold is specially testament content, transference of title of property content or transfering use right content.
8. a kind of Contract Enforcement system based on Biont information, which is characterized in that the system comprises:
Calculating storaging unit, for the biological information and preset safety code using predetermined cryptographic algorithm to the organism of acquisition It is calculated, obtains the corresponding default security identifier code of the organism, and stored into database of identifier codes;
Contract storage unit, for depositing contract content associated with the default security identifier code and contract trigger condition Storage is into contract database, wherein the contract content includes multiple contract terms;
Contract Enforcement unit, the monitoring information that RX monitor is sent judges that the monitoring information meets the contract and trigger When condition, contract terms corresponding with the contract trigger condition are executed;
The database of identifier codes and the contract database are made of distributed block chain database, and distributed area Each of block chain database block chain database is mutually backups.
9. a kind of Contract Enforcement system based on Biont information as claimed in claim 8, which is characterized in that the calculating is deposited Storage unit specifically includes:
Computations are carried out to the biological information and the safety code combined using predetermined cryptographic algorithm, obtain institute State the corresponding default security identifier code of organism.
10. a kind of Contract Enforcement system based on Biont information as claimed in claim 9, which is characterized in that the contract Monitoring information described in storage unit is security identifier code or monitoring data associated with the contract content;
What the contract trigger condition specifically included security identifier code is verified information and default Contract Enforcement condition.
11. a kind of Contract Enforcement system based on Biont information as claimed in claim 10, which is characterized in that the contract Execution unit specifically includes;
If the monitoring information is security identifier code, verify whether the security identifier code is the default security identifier code, If so, corresponding contract terms are executed, if it is not, then storing the security identifier code to unknown database of identifier codes;
If the monitoring information is the associated monitoring data of contract content, judging that it is described pre- that the monitoring data meets If when Contract Enforcement condition, executing corresponding contract terms.
CN201610407333.5A 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information Active CN106096443B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610407333.5A CN106096443B (en) 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610407333.5A CN106096443B (en) 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information

Publications (2)

Publication Number Publication Date
CN106096443A CN106096443A (en) 2016-11-09
CN106096443B true CN106096443B (en) 2018-12-21

Family

ID=57228829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610407333.5A Active CN106096443B (en) 2016-06-12 2016-06-12 A kind of Contract Enforcement method and system based on Biont information

Country Status (1)

Country Link
CN (1) CN106096443B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547477B (en) * 2018-12-27 2021-04-23 石更箭数据科技(上海)有限公司 Data processing method and device, medium and terminal thereof
US20210158039A1 (en) * 2019-11-25 2021-05-27 International Business Machines Corporation Managing physical objects using crypto-anchors

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN105225155A (en) * 2015-09-25 2016-01-06 中国人民财产保险股份有限公司 A kind of insurance risk management-control method based on biological identification technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102243748A (en) * 2011-08-04 2011-11-16 郁晓东 Electronic debt management operation system device and realization method of electronization and financial commercialization of claim and debt
CN105225155A (en) * 2015-09-25 2016-01-06 中国人民财产保险股份有限公司 A kind of insurance risk management-control method based on biological identification technology

Also Published As

Publication number Publication date
CN106096443A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
CN106096444B (en) A kind of identification based on biological information and social information's recording method and system
CN103155509B (en) For the method and apparatus providing continuous certification based on dynamic personal information
CN105471903B (en) The production method and related system of electronic lock active information, equipment and method for unlocking
CN102077545B (en) Personal security manager for ubiquitous patient monitoring
CN106096443B (en) A kind of Contract Enforcement method and system based on Biont information
CN105989297A (en) Encryption and decryption method and device of electronic prescription
CN109413087A (en) Data sharing method, device, digital gateway and computer readable storage medium
CN105207776A (en) Fingerprint authentication method and system
CN109767534A (en) Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN108449363A (en) Seal system with biological identification device and preparation method
Zhang et al. A biometrics based security solution for encryption and authentication in tele-healthcare systems
Islam et al. A Blockchain-Based Artificial Intelligence-Empowered Contagious Pandemic Situation Supervision Scheme Using Internet of Drone Things
CN103858377B (en) Method for managing and checking data from different identity domains organized into a structured set
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
Xu et al. A secure mutual authentication scheme of blockchain-based in WBANs
EP3182317A1 (en) Apparatus and method for personalised provision of a key
DE102006021347B4 (en) Procedure for the court-enforceable execution of transactions
CN110430207A (en) A kind of smart grid multi-point remote inter-network interaction collaboration authentication method
CN110414203A (en) A kind of internet medical treatment identity identifying method based on block chain technology
CN106304052A (en) A kind of method of secure communication, device, terminal and client identification module card
CN109992994A (en) A kind of personnel file management method and system based on block chain
CN101119198B (en) Biological stencil and method to produce biological stencil and identification identifying method
CN215120854U (en) Distributed emergency broadcasting system based on PUFs
Fahrnberger Contemporary IT security for military online collaboration platforms
CN208063239U (en) Seal system with biological identification device

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant