CN108537047A - The method and device of information is generated based on block chain - Google Patents

The method and device of information is generated based on block chain Download PDF

Info

Publication number
CN108537047A
CN108537047A CN201810136192.7A CN201810136192A CN108537047A CN 108537047 A CN108537047 A CN 108537047A CN 201810136192 A CN201810136192 A CN 201810136192A CN 108537047 A CN108537047 A CN 108537047A
Authority
CN
China
Prior art keywords
identity information
information
user
block chain
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810136192.7A
Other languages
Chinese (zh)
Inventor
刘春伟
孙海波
孙东凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810136192.7A priority Critical patent/CN108537047A/en
Publication of CN108537047A publication Critical patent/CN108537047A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application discloses a kind of method and device generating information based on block chain.It is related to computer information processing field, this method includes:Obtain the first identity information of the first user;And according to first identity information and Encryption Algorithm, generate the second identity information of the first user.The method and device disclosed in the present application that information is generated based on block chain can confirm the true identity of user so that user can fast and accurately obtain trusted certification by technological means.

Description

The method and device of information is generated based on block chain
Technical field
This application involves computer information processing fields, in particular to a kind of side generating information based on block chain Method and device.
Background technology
With the development of network, more and more users or businessman select the service provided by network to handle life In every affairs.It can be for example, more and more users' selection buys commodity by network businessman.But the anonymity of online transaction Property, virtual and information asymmetry the features such as make trust become an indispensable part.Trust is the base of All Activity Plinth can promote the generation of trading activity.Traditional electric business platform Merchant ID is stepped on using the mode of username and password Record.Operation of the businessman on electric business platform, only electric business platform can know, for purchase user, only electric business platform Do credit underwriting.But due to being all previously stored in its server for the various information of businessman in present electric business platform, businessman Data be easy to be tampered, the accredited degree of the data of the offer of businessman can not be also completely secured in electric business platform.
Therefore, it is necessary to a kind of new method and devices that information is generated based on block chain.
Above- mentioned information is only used for reinforcing the understanding to the background of the application, therefore it disclosed in the background technology part May include the information not constituted to the prior art known to persons of ordinary skill in the art.
Invention content
In view of this, the application provides a kind of method and device generating information based on block chain, technology hand can be passed through Segment acknowledgement businessman's true identity so that the commodity that businessman sells are more genuine and believable, promote user experience.
Other characteristics and advantages of the application will be apparent from by the following detailed description, or partially by the application Practice and acquistion.
According to the one side of the application, propose that a kind of method generating information based on block chain, this method include:Block chain Node receives the first identity information of the first user;Secret key and Encryption Algorithm are encrypted according to first identity information, generates the The second identity information of one user;First identity information is stored in block chain node.
In a kind of exemplary embodiment of the disclosure, further include:By first identity information and second identity Information is associated, and obtains related information;Second identity information is stored in block chain.
In a kind of exemplary embodiment of the disclosure, further include:Send second identity information.
In a kind of exemplary embodiment of the disclosure, further include:The inquiry request from second user is received, it is described to look into Ask in request includes second identity information;According to second identity information, searched in the block chain node and its Corresponding first identity information;And send the first identity information.
According to the one side of the application, propose that a kind of device generating information based on block chain, the device include:Receive mould Block receives the first identity information of the first user for block chain node;And encrypting module, for according to first identity Information encrypts secret key and Encryption Algorithm, generates the second identity information of the first user;Storage module, in block chain node Store first identity information.
In a kind of exemplary embodiment of the disclosure, further include:Relating module, for will first identity information and Second identity information is associated, and obtains related information;Second identity information is stored in block chain.
In a kind of exemplary embodiment of the disclosure, further include:First sending module, for sending second identity Information.
In a kind of exemplary embodiment of the disclosure, further include:Enquiry module is asked for receiving inquiry from the user It asks, includes second identity information in the inquiry request;According to second identity information, in the block chain node Search corresponding first identity information;And second sending module, for sending the first identity information.
According to the one side of the application, propose that a kind of electronic equipment, the electronic equipment include:One or more processors; Storage device, for storing one or more programs;When one or more programs are executed by one or more processors so that one A or multiple processors realize such as methodology above.
According to the one side of the application, proposes a kind of computer-readable medium, be stored thereon with computer program, the program Method as mentioned in the above is realized when being executed by processor.
According to the method and device for generating information based on block chain of the application, it can confirm that businessman is true by technological means Real identity so that the commodity that businessman sells are more genuine and believable, promote user experience.
It should be understood that above general description and following detailed description is merely exemplary, this can not be limited Application.
Description of the drawings
Its example embodiment is described in detail by referring to accompanying drawing, above and other target, feature and the advantage of the application will It becomes more fully apparent.Drawings discussed below is only some embodiments of the present application, for the ordinary skill of this field For personnel, without creative efforts, other drawings may also be obtained based on these drawings.
Fig. 1 is a kind of system of method, apparatus generating information based on block chain shown according to an exemplary embodiment Block diagram.
Fig. 2 is a kind of flow chart of method generating information based on block chain shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of the method generating information based on block chain shown according to another exemplary embodiment.
Fig. 4 is a kind of flow chart of the method generating information based on block chain shown according to another exemplary embodiment.
Fig. 5 is a kind of block diagram of device generating information based on block chain shown according to an exemplary embodiment.
Fig. 6 is show according to another exemplary embodiment one block diagram that the device of information is generated based on block chain.
Fig. 7 is the block diagram according to a kind of electronic equipment shown in an exemplary embodiment.
Fig. 8 is to show a kind of computer readable storage medium schematic diagram according to an exemplary embodiment.
Specific implementation mode
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the application will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical reference numeral indicates in figure Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to fully understand embodiments herein to provide.However, It will be appreciated by persons skilled in the art that the technical solution of the application can be put into practice without one or more in specific detail, Or other methods, constituent element, device, step may be used etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation to avoid fuzzy the application various aspects.
Block diagram shown in attached drawing is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in attached drawing is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to be changed according to actual conditions.
It should be understood that although herein various assemblies may be described using term first, second, third, etc., these groups Part is not answered limited by these terms.These terms are distinguishing a component and another component.Therefore, first group be discussed herein below Part can be described as teaching of second component without departing from disclosure concept.As used herein, term " and/or " include associated All combinations for listing any of project and one or more.
It will be understood by those skilled in the art that attached drawing is the schematic diagram of example embodiment, the module in attached drawing or flow Necessary to not necessarily implementing the application, therefore it cannot be used for the protection domain of limitation the application.
Fig. 1 is a kind of system of method, apparatus generating information based on block chain shown according to an exemplary embodiment Block diagram.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105. Network 104 between terminal device 101,102,103 and server 105 provide communication link medium.Network 104 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted by network 104 with server 105 with using terminal equipment 101,102,103, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 101,102,103 The application of page browsing device, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 101,102,103 can be the various electronic equipments with display screen and supported web page browsing, packet Include but be not limited to smart mobile phone, tablet computer, pocket computer on knee and desktop computer etc..
Server 105 can for example obtain the first identity information of the first user;Server 105 can be for example according to described first Identity information and Encryption Algorithm generate the second identity information of the first user.
In one embodiment, when the first user is businessman, the first identity information of the first user is the letters such as enterprise qualification When breath, server 105 for example can generate company information according to commercial articles vending merchant data;Server 105 can also for example pass through area Block chain agreement stores the company information into the block of block chain, and generates the second identity information.
Server 105 can also be the server for providing various services, for example, to user using terminal device 101,102, The 103 shopping class websites browsed provide the server supported.Server 105 can for example receive inquiry request from the user, It include second identity information in the inquiry request;According to second identity information, area is determined in the block chain Block;And the area first identity in the block is pushed into user.
It should be noted that the method based on block chain generation information that the embodiment of the present application is provided is generally by server 105 execute, and correspondingly, the device that information is generated based on block chain is generally positioned at the execution of server 105.And be supplied to user into The page end of row goods browse is normally at the request end for carrying out businessman's inquiry in terminal device 101,102,103.
Fig. 2 is a kind of flow chart of method generating information based on block chain shown according to an exemplary embodiment.
As shown in Fig. 2, in S202, block chain node receives the first identity information of the first user.
In one embodiment, the first user may be, for example, businessman user, background as described above, businessman user in order to So that the qualification of itself carries out obtaining higher accredited degree, its first identity information can be for example submitted.First identity information can Such as the information including the businessman can for example including:General status of the enterprise:Such as enterprise nature, business scope set up time, registration money Gold, headcount, position, floor space etc..The first information can also be such as including important informations such as official seals enterprise.At this Can also include for the sake of security, in company information the key data that company information is encrypted in application, can for example, Enterprise voluntarily generates private key, and public key and company information and other platforms or trusted qualification examination mechanism are issued Certificate is as the first identity information.
In one embodiment, the first user may be, for example, personal user, and the method in the application is also applied for needing The scene of accredited confirmation is carried out to personal user information.Can be for example, in relevant industries such as finance, personal user can be for example by certificate Information is as the first identity information.Personal user submits certificate information to carry out subsequent processing.
In one embodiment, the first user may be, for example, the information of employee user in enterprise, the method in the application Suitable in the scene for needing to carry out employee's user information accredited confirmation.Employee user's phase such as proving personal work Material is closed as the first identity information, employee user submits the associated materials such as personal work proof to make subsequent processing.
In some embodiments, the first user also may be, for example, the user in other application scene, and the first user is not It is limited to for people, the first user also may be, for example, that certain independences manage individual, enterprise and communal facility, and institute is in need to it The object for carrying out trust identification, can be used as the first user in the application.
In S204, secret key and Encryption Algorithm are encrypted according to first identity information, generate the second body of the first user Part information.Encryption Algorithm is the mathematical algorithm used in data encryption process, and the basic process of data encryption is exactly to being originally The file or data of plaintext are handled by certain algorithm, and becoming one section of unreadable code commonly referred to as " ciphertext " makes It can only can just show original content after inputting corresponding key, approach in this way come reach protect data not by The purpose that juridical-person is stolen, read.The inverse process of the process is decryption, i.e., converts the coding information to the mistake of original data Journey.
In one embodiment, Encryption Algorithm includes the Encryption Algorithm in block chain, and block chain is substantially several technologies The general designation of scheme, including point-to-point peer-to-peer network transport protocol, cryptography Encryption Algorithm, distributed common recognition mechanism, and The Game Design of Nash Equilibrium.Based on the combination of these types of technology, decentralization may be implemented and go to the authentic data library trusted, make Ensure that the traceable of recorded information is traced to the source on chain, can not be forged with algorithm proof mechanism, can not distort.Alliance's block chain is Refer to the block chain that its common recognition process is controlled by preselected node;For example, the community of Ge You15Ge financial institutions composition, each Mechanism all runs a node, and needs to obtain the confirmations of wherein 10 mechanisms in order to make each block come into force (2/3 really Recognize).Block chain perhaps allows everyone can be read, or is limited only in participant, or walks mixed type route, such as block Root Hash and its API (application programming interfaces) external disclosure, the permissible extraneous inquiries for being used for making finite number of time of API and acquisition area The information of block chain state.These block chains can be considered " part decentralization ".Alliance's chain uses multicenter mode, participant node It is also set in advance, by knowing together, mechanism confirms.In alliance's chain, be different from it is publicly-owned have chain, can carry out authority setting and Control possesses higher apply and scalability.Encryption Algorithm in the application can for example pass through adding in alliance's block chain Close algorithm is realized.
Corresponding to each embodiment above, in one embodiment, when the first user is businessman user, businessman user Generate private key, and the certificate that public key and company information and other platforms or trusted qualification examination mechanism are issued as First identity information.First identity information is encrypted by scheduled Encryption Algorithm, generates the second identity letter of the user Breath can for example read the second identity letter when user buys the commodity of the businessman user by electric business platform in electric business website Breath carries out trusted certification by the second identity information to the businessman user.
In one embodiment, the first user is personal user, and personal user submits certificate information subsequently to be located Reason.First identity information is encrypted by scheduled Encryption Algorithm, generates the second identity information of the user.It is used in individual It, can be for example by the second identity information, specific when family needs to prove the certificate information of its own to other unit or user Platform in obtain trusted certification.
In one embodiment, the first user may be, for example, the information of employee user in enterprise, and employee can for example submit a Artificial testify waits associated materials to make subsequent processing.First identity information is encrypted by scheduled Encryption Algorithm, it is raw At the second identity information of the user.It needs to prove that the work of its own is carried out to other unit or Enterprises Leader in employee user It lasts, can accredited guarantee for example be obtained by the second identity information.
In some embodiments, the first user also may be, for example, the user in other application scene, and the first user is not It is limited to for people, the first user also may be, for example, that certain independences manage individual, enterprise and communal facility, and institute is in need to it The object for carrying out trust identification, can be used as the first user in the application.User in other application scene is by the first body Part information is encrypted by scheduled Encryption Algorithm, generates the second identity information of the user.
In S206, first identity information is stored in block chain node.
In some embodiments, first identity information and second identity information are associated, are associated with Information;Second identity information is stored in block chain.It is handled by block chain associated encryption in the first identity information Afterwards, the second identity information of generation can be associated by block chain and the first identity information.
In some embodiments, after the first identity information is associated with the second identity information, second identity is sent Information, the second identity information can be for example sent in the platform of block chain, can be also for example published to others and can be carried out qualification and test In the platform of card.
According to the method for generating information based on block chain of the application, the true body of user can be confirmed by technological means Part so that user can fast and accurately obtain trusted certification.
Fig. 3 is a kind of flow chart of method generating information based on block chain shown according to an exemplary embodiment.
As shown in figure 3, in S302, the inquiry request from second user is received, includes described in the inquiry request Second identity information.
Corresponding to foregoing embodiments, second user may be, for example, to browse commodity in the user for wanting purchase commodity and think When more information for understanding businessman, it can propose that inquiry request, inquiry request can for example pass through electric business platform by the second information It receives, can also for example be received by block platform chain, inquiry request can also be received for example by other mutual accredited platforms.
In one embodiment, can inquiry request for example be received by electric business platform, electric business platform forwards inquiry request To being inquired in block catenary system.
In S304, according to second identity information, corresponding described is searched in the block chain node One identity information.By the second identity information, the corresponding block of the second identity information can be determined in block chain.It is worth mentioning When, when area content in the block is not original document but the updated file of process, it can for example obtain under the block and own Correlation zone content in the block.So that user traces to the source to the various information of the businessman.
In S306, the first identity information is sent.The first identity information is sent to second user, it can also be for example, by first Identity information is sent in trusted electric business platform.
In one embodiment, for the company information of cochain, businessman can the voluntarily line by way of certificate signature Upper revocation can also manually be cancelled by way of real name.After cancelling, the life cycle of the certificate of the businessman terminates.
In one embodiment, the block chain certificate B (company information) that electric business platform is issued is the unified mark of merchant identity Know.When businessman does necessary operation in electric business platform, and write-in arm's length dealing data are required to make to needs when block chain With this certificate.Enterprise includes the corresponding private key signature S of A certificates.The effect of signature S is to prove the behavior of businessman's Active Registration.(label Name S can prevent businessman from denying problem on behalf of registration and businessman).
In one embodiment, businessman can also apply for multistage block chain certificate, establish the classification block chain certificate of itself, with Just company information is further managed.
Fig. 4 is a kind of flow chart of method generating information based on block chain shown according to an exemplary embodiment.Fig. 4 It is to when the first user is businessman user, second user is to generate letter based on block chain in the application when buying the user of commodity The method of breath should scene explanation.Method in the application could be applicable to as the first user be personal user or employee In other scenes of user etc., the flow of concrete application is similar with the flow in Fig. 4, and the application repeats no more.
As shown in figure 4, in S402, merchandise news is generated according to commodity data.Merchandise news is to refer to be connect Receipts person receives, and meets its certain special requirement, there is underlying commodity and its production, the message of circulation or consumption, information, data or know The general name of knowledge etc..Merchandise news can be for example including commodity appearance, color, application method, price, commodity points for attention etc., Any to contribute to businessman that commodity are introduced, the information that user understands commodity can be used as the commodity in the application Information.
In S404, company information (the second information) is generated according to commercial articles vending merchant data (first information).Enterprise believes Breath can for example including:General status of the enterprise:Such as enterprise nature, business scope set up time, registered capital, headcount, institute in place It sets, floor space etc..In this application, for the sake of security, can also include that company information is encrypted in company information Key data, can be for example, enterprise voluntarily generates private key, and by public key and company information and other platforms or trusted The certificate that qualification examination mechanism issues, which is submitted as application material to electric business platform, to be applied.After manual examination and verification pass through, electric business Platform can give enterprise's certificate.
In one embodiment, there is the certificate A that audit mechanism trusty issues in enterprise, and has the card that block catenary system is issued Book B, company information include two certificates of A and B, may also include the corresponding private key signature S of A certificates in company information.The work of signature S With the behavior for being proof businessman's Active Registration.(signature S can prevent businessman from denying problem on behalf of registration and businessman).
In S406, the company information is stored into the block of block chain by block chain agreement, and generate signature Information.It can be for example, the electric business platform in upper step can be given in the storage to block chain of the contents such as enterprise's certificate.
In one embodiment, the company information is stored into the block of block chain by block chain agreement, and raw At signing messages, including:The company information is encrypted by block chain agreement;And it will be after encryption The company information is stored into the block.It can be for example, for the sake of security, will be stored to block after company information encryption In, the key in encryption can be the public key that enterprise provides, can also be for example, the encryption solution arranged by other means Ciphertext part.
In one embodiment, further include:Obtain the signing messages and fresh information of commodity;Pass through the A.L.S. Breath determines block in block chain;And it is handled by block chain and stores the fresh information to the block.Company information When having altered, apply being updated on block chain by the company information after change.Company information after update can link After the company information being updated, the newer process of company information can be also tracked for user by way of block chain and be looked into It sees.
In S408, commodity are generated with the signing messages by the merchandise news and are released news.Pass through merchandise news With signing messages generate commodity release news, commodity, which release news, can issue in this electric business platform, or publication with the electricity Quotient's platform has in other platforms of trust cooperation.User can page end by browse merchandise news obtain commodity data with Signing messages.
In one embodiment, user can inquire company information in user terminal by signing messages.Can also for example, Multiple trusted electric business platforms or qualification examination platform build credible block chain website using respective certificate.User can be from It is multi-party to consult, obtain credible consistent information.
In one embodiment, further include:After the commodity are purchased, information of tracing to the source is generated;And it traces to the source described Information is sent to user terminal with commodity.For example, after the commodity are purchased, pass through merchandise news, the signing messages and purchase Buyer's information generates information of tracing to the source.The information of tracing to the source can be for example attached in the outer packing of least unit, can also be for example, following the quotient The e bill or paper bill of product are sent at user, can also for example, store the signing messages at the shopping record of user, The application is not limited.
In one embodiment, in company information as described above, there is the certificate A that audit mechanism trusty issues, There is the certificate B that block catenary system is issued, uses certificate B, user that can be looked in block chain by certificate B in follow-up retrospect To businessman certificate A, and signature S.
It will be clearly understood that This application describes how to form and use particular example, but the principle of the application is not limited to These exemplary any details.On the contrary, the introduction based on present disclosure, these principles can be applied to many other Embodiment.
According to the method that the application generates information based on block chain, when block catenary system grant a certificate, the correlation of businessman It is extracted in the various certificates that information can be uploaded for example by businessman, eliminates the trouble that businessman provides various information again, registered When enterprise certificate A and corresponding private key signature need to be only provided, saved a large amount of human cost.
According to the method for generating information based on block chain of the application, the true body of businessman can be confirmed by technological means Part so that the commodity that businessman sells are more genuine and believable, promote user experience.
According to the method for generating information based on block chain of the application, register flow path of the businessman in block chain can remove people from The problems such as work audit business license, enterprise qualification, less strict operation system is required suitable for examining.
According to the method for generating information based on block chain of the application, enterprise certificate holder is verified in the help of block catenary system Identity, success after, block chain voluntarily applies for issuing the block chain certificate of businessman.
It, can be by checking that businessman signs after user buys commodity according to the method for generating information based on block chain of the application Name, to the certificate for searching this businessman in block chain, can then trace back to the true information of businessman and original certificate.User verifies Commodity are user's checking commodity signatures, confirm certificate B;User verifies merchant identity, is to use certificate B, and then user can be in block Certificate A and signature S is found in chain.To confirm merchant identity.
It will be appreciated by those skilled in the art that realizing that all or part of step of above-described embodiment is implemented as being executed by CPU Computer program.When the computer program is executed by CPU, above-mentioned work(defined by the above method provided by the present application is executed Energy.The program can be stored in a kind of computer readable storage medium, which can be read-only memory, magnetic Disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only the place included by method according to the application exemplary embodiment Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these The time sequencing of reason.In addition, being also easy to understand, these processing for example can be executed either synchronously or asynchronously in multiple modules.
Following is the application device embodiment, can be used for executing the application embodiment of the method.It is real for the application device Undisclosed details in example is applied, the application embodiment of the method is please referred to.
Fig. 5 is a kind of block diagram of the device generating information based on block chain shown according to another exemplary embodiment.Quotient The device 50 that product are traced to the source includes:Receiving module 502, encrypting module 504, storage module 506.
Receiving module 502 receives the first identity information of the first user for block chain node.
Encrypting module 504 is used to encrypt secret key and Encryption Algorithm according to first identity information, generates the first user's Second identity information.
Storage module 506 in block chain node for storing first identity information.
Fig. 6 is the block diagram of the identity information generation device shown according to another exemplary embodiment.The dress that commodity are traced to the source It sets outside 60 module in the device 50 traced to the source including commodity, further includes:Relating module 602, the first sending module 604, inquiry Module 606, pushing module 608, the second sending module 608.
Relating module 602 is associated with for first identity information and second identity information to be associated Information;Second identity information is stored in block chain.
First sending module 604 is for sending second identity information.
Enquiry module 606 includes second identity in the inquiry request for receiving inquiry request from the user Information;According to second identity information, corresponding first identity information is searched in the block chain node;With And
Second sending module 608 is for sending the first identity information.
Fig. 7 is the block diagram according to a kind of electronic equipment shown in an exemplary embodiment.
The electronic equipment 200 of this embodiment according to the application is described referring to Fig. 7.The electronics that Fig. 7 is shown Equipment 200 is only an example, should not bring any restrictions to the function and use scope of the embodiment of the present application.
As shown in fig. 7, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap It includes but is not limited to:At least one processing unit 210, at least one storage unit 220, (including the storage of connection different system component Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit has program stored therein code, and said program code can be held by the processing unit 210 Row so that the processing unit 210 execute described in this specification above-mentioned electronic prescription circulation processing method part according to this The step of applying for various illustrative embodiments.For example, the processing unit 210 can be executed such as Fig. 2, Fig. 3, shown in Fig. 4 The step of.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practicality work with one group of (at least one) program module 2205 Tool 2204, such program module 2205 include but not limited to:Operating system, one or more application program, other programs Module and program data may include the realization of network environment in each or certain combination in these examples.
Bus 230 can be to indicate one or more in a few class bus structures, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use the arbitrary bus structures in a variety of bus structures Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make Any equipment that the electronic equipment 200 can be communicated with one or more of the other computing device (such as router, modulation /demodulation Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with By network adapter 260 and one or more network (such as LAN (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but it is unlimited In:Microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be expressed in the form of software products, the software product can be stored in one it is non-volatile Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server or network equipment etc.) executes the above method according to disclosure embodiment.
Fig. 8 schematically shows a kind of computer readable storage medium schematic diagram in disclosure exemplary embodiment.
Refering to what is shown in Fig. 8, describing the program product for realizing the above method according to presently filed embodiment 400, portable compact disc read only memory (CD-ROM) may be used and include program code, and can in terminal device, Such as it is run on PC.However, the program product of the application is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device either device use or It is in connection.
The arbitrary combination of one or more readable mediums may be used in described program product.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or the arbitrary above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include:It is electrical connection, portable disc, hard disk, random access memory (RAM) with one or more conducting wires, read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include the data letter propagated in a base band or as a carrier wave part Number, wherein carrying readable program code.Diversified forms, including but not limited to electromagnetism may be used in the data-signal of this propagation Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, which can send, propagate either transmission for being used by instruction execution system, device or device or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It executes on computing device, partly execute on a user device, being executed as an independent software package, partly in user's calculating Upper side point is executed or is executed in remote computing device or server completely on a remote computing.It is being related to far In the situation of journey computing device, remote computing device can pass through the network of any kind, including LAN (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
Above computer readable medium carries one or more program, when said one or multiple programs are by one When the equipment executes so that the computer-readable medium implements function such as:Obtain the first identity information of the first user;And According to first identity information and Encryption Algorithm, the second identity information of the first user is generated.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed according to the description of embodiment in device, also may be used Uniquely it is different from one or more devices of the present embodiment with carrying out respective change.The module of above-described embodiment can be merged into One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implemented according to the application The technical solution of example can be expressed in the form of software products, which can be stored in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a computing device (can To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present application.
It is particularly shown and described the exemplary embodiment of the application above.It should be appreciated that the application is not limited to Detailed construction, set-up mode or implementation method described herein;On the contrary, it is intended to cover to be included in appended claims Various modifications in spirit and scope and equivalence setting.
In addition, structure, ratio, size etc. shown by this specification Figure of description, only coordinating specification institute Disclosure, for skilled in the art realises that with reading, being not limited to the enforceable qualifications of the disclosure, therefore Do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size are not influencing the disclosure Under the technique effect that can be generated and achieved purpose, it should all still fall the technology contents disclosed in the disclosure and obtain and can cover In the range of.Meanwhile cited such as "upper" in this specification, " first ", " second " and " one " term, be also only and be convenient for Narration is illustrated, rather than to limit the enforceable range of the disclosure, relativeness is altered or modified, without substantive change Under technology contents, when being also considered as the enforceable scope of the application.

Claims (10)

1. a kind of method generating information based on block chain, which is characterized in that including:
Block chain node receives the first identity information of the first user;
Secret key and Encryption Algorithm are encrypted according to first identity information, generates the second identity information of the first user;
First identity information is stored in block chain node.
2. the method as described in claim 1, which is characterized in that further include:
First identity information and second identity information are associated, related information is obtained;
Second identity information is stored in block chain.
3. the method as described in claim 1, which is characterized in that further include:
Send second identity information.
4. method as claimed in claim 3, which is characterized in that further include:
The inquiry request from second user is received, includes second identity information in the inquiry request;
According to second identity information, corresponding first identity information is searched in the block chain node;With And
Send the first identity information.
5. a kind of device generating information based on block chain, which is characterized in that including:
Receiving module receives the first identity information of the first user for block chain node;And
Encrypting module generates the second body of the first user for encrypting secret key and Encryption Algorithm according to first identity information Part information;
Storage module, for storing first identity information in block chain node.
6. device as claimed in claim 5, which is characterized in that further include:
Relating module obtains related information for first identity information and second identity information to be associated; Second identity information is stored in block chain.
7. device as claimed in claim 5, which is characterized in that further include:
First sending module, for sending second identity information.
8. device as claimed in claim 7, which is characterized in that further include:
Enquiry module includes second identity information in the inquiry request for receiving inquiry request from the user;Root According to second identity information, corresponding first identity information is searched in the block chain node;And
Second sending module, for sending the first identity information.
9. a kind of electronic equipment, which is characterized in that including:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method as described in any in claim 1-4.
10. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor The method as described in any in claim 1-4 is realized when row.
CN201810136192.7A 2018-02-09 2018-02-09 The method and device of information is generated based on block chain Pending CN108537047A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810136192.7A CN108537047A (en) 2018-02-09 2018-02-09 The method and device of information is generated based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810136192.7A CN108537047A (en) 2018-02-09 2018-02-09 The method and device of information is generated based on block chain

Publications (1)

Publication Number Publication Date
CN108537047A true CN108537047A (en) 2018-09-14

Family

ID=63485957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810136192.7A Pending CN108537047A (en) 2018-02-09 2018-02-09 The method and device of information is generated based on block chain

Country Status (1)

Country Link
CN (1) CN108537047A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086459A (en) * 2018-09-17 2018-12-25 中国科学院重庆绿色智能技术研究院 A kind of news gathering and editing and dissemination method based on block chain
CN109241362A (en) * 2018-09-18 2019-01-18 百度在线网络技术(北京)有限公司 Block generation method, device, equipment and storage medium
CN109492424A (en) * 2018-09-29 2019-03-19 平安科技(深圳)有限公司 Data assets management method, data assets managing device and computer-readable medium
WO2020107223A1 (en) * 2018-11-27 2020-06-04 深圳链报科技有限公司 Multi-chain information management method and apparatus, storage medium, and blockchain identity parser

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005204134A (en) * 2004-01-16 2005-07-28 Mitsubishi Electric Corp Anti-tamper encryption system, memory device, authentication terminal and program
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN106357640A (en) * 2016-09-18 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN107292629A (en) * 2017-05-12 2017-10-24 深圳蜂链科技有限公司 Anti-counterfeit tracking verification method based on block chain and the device using this method
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107657463A (en) * 2017-09-29 2018-02-02 北京京东尚科信息技术有限公司 Article is traced to the source platform and method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005204134A (en) * 2004-01-16 2005-07-28 Mitsubishi Electric Corp Anti-tamper encryption system, memory device, authentication terminal and program
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN106357640A (en) * 2016-09-18 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN107292629A (en) * 2017-05-12 2017-10-24 深圳蜂链科技有限公司 Anti-counterfeit tracking verification method based on block chain and the device using this method
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107657463A (en) * 2017-09-29 2018-02-02 北京京东尚科信息技术有限公司 Article is traced to the source platform and method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨东 等: "《链金有法 区块链商业实践与法律指南》", 30 June 2017 *
辛路: "《互联网金融风险及监管研究》", 31 May 2017 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086459A (en) * 2018-09-17 2018-12-25 中国科学院重庆绿色智能技术研究院 A kind of news gathering and editing and dissemination method based on block chain
CN109241362A (en) * 2018-09-18 2019-01-18 百度在线网络技术(北京)有限公司 Block generation method, device, equipment and storage medium
CN109241362B (en) * 2018-09-18 2020-12-01 百度在线网络技术(北京)有限公司 Block generation method, device, equipment and storage medium
CN109492424A (en) * 2018-09-29 2019-03-19 平安科技(深圳)有限公司 Data assets management method, data assets managing device and computer-readable medium
WO2020062667A1 (en) * 2018-09-29 2020-04-02 平安科技(深圳)有限公司 Data asset management method, data asset management device and computer readable medium
CN109492424B (en) * 2018-09-29 2023-05-26 平安科技(深圳)有限公司 Data asset management method, data asset management device, and computer-readable medium
WO2020107223A1 (en) * 2018-11-27 2020-06-04 深圳链报科技有限公司 Multi-chain information management method and apparatus, storage medium, and blockchain identity parser

Similar Documents

Publication Publication Date Title
CN101978646B (en) For performing the system and method for file distributing and purchase
US10547446B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens
CN108370314A (en) Use the secure storage of data and the device of retrieval
CN110349056A (en) Transaction processing system and method based on block chain
CN108537047A (en) The method and device of information is generated based on block chain
CN109670803A (en) Method, apparatus, medium and the electronic equipment tested before online trading
TWI734764B (en) Multi-dimensional barcode mobile payment method
CN109479001A (en) Exit passageway is established
CN104040933A (en) Differential client-side encryption of information originating from client
CN103942719A (en) Fraud detection method and system employing personalized fraud detection rules
EP1647932A1 (en) Method and system to automatically evaluate a participant in a trust management infrastructure
CN109003093A (en) The method, apparatus and system traced to the source for commodity
CN111902838A (en) Internet data use control system
CN111079190A (en) Block chain supply chain transaction hiding dynamic supervision system and method
CN116325645A (en) Privacy preserving identity data exchange
CN109146482A (en) User's right providing method and device based on block chain
AU2020432497A1 (en) Cryptosystem, systems, methods and applications for zero-knowledge anonymously-individualized marketing and loyalty management based on end-to-end encrypted transfer of statements like receipts or scripts
KR101525928B1 (en) System and the method for certification honest goods
CN108829436A (en) Hot restorative procedure, device, system, electronic equipment and computer-readable medium
CN110210975A (en) Data trade method and its equipment on block chain
CN116868217A (en) Non-contact delivery system and method
KR20230037887A (en) System and method for providing information of used cars
CN109639409A (en) Cipher key initialization method, apparatus, electronic equipment and computer readable storage medium
US20230394559A1 (en) Order information for electronic devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination