CN109325764B - Sensitive data transaction system and method based on block chain - Google Patents

Sensitive data transaction system and method based on block chain Download PDF

Info

Publication number
CN109325764B
CN109325764B CN201811064754.8A CN201811064754A CN109325764B CN 109325764 B CN109325764 B CN 109325764B CN 201811064754 A CN201811064754 A CN 201811064754A CN 109325764 B CN109325764 B CN 109325764B
Authority
CN
China
Prior art keywords
code
electronic contract
digital
order
seed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811064754.8A
Other languages
Chinese (zh)
Other versions
CN109325764A (en
Inventor
汪子彧
张法锦
苏新
孟蕾蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Nanda Digital Science & Technology Co ltd
Original Assignee
Jiangsu Nanda Digital Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Nanda Digital Science & Technology Co ltd filed Critical Jiangsu Nanda Digital Science & Technology Co ltd
Priority to CN201811064754.8A priority Critical patent/CN109325764B/en
Publication of CN109325764A publication Critical patent/CN109325764A/en
Application granted granted Critical
Publication of CN109325764B publication Critical patent/CN109325764B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)

Abstract

A sensitive data transaction system based on a block chain comprises a block chain bottom layer module, an electronic contract layer module and a SaaS layer module; the block chain layer module provides technical support for the bottom layer block chain, and comprises a virtual machine supporting the running of the electronic contract, a consensus algorithm, a transaction verification mechanism and a billing mechanism; the electronic contract layer module is used for providing distributed application service, using block chain technology endorsement, and running codes of system sensitive data transaction and codes of a code generation algorithm in the electronic contract layer; and the SaaS layer module provides cloud platform services, so that all participants can conveniently participate in business cooperation through a web platform and a client. The invention provides a data transaction system based on a block chain, which is used for multi-party participation to jointly produce sensitive data, the final sensitive data is obtained by a final data generator, and other roles do not know the final data in the data production process, so that the sensitive data is prevented from being leaked in the circulation process.

Description

Sensitive data transaction system and method based on block chain
Technical Field
The invention relates to the technical field of block chain technology and electronic commerce, in particular to a sensitive data transaction system and method based on a block chain.
Background
The anti-counterfeiting tracing is one of essential production elements of traditional enterprises, all commodities produced by regular enterprises have an anti-counterfeiting label of a two-dimensional code or a one-dimensional code for anti-counterfeiting tracing inquiry, and the content of the label is a string of digital codes (short for digital codes) substantially.
In the current industry, the digital code is usually generated by a system integrator and then delivered to a printing factory, the printing factory takes the digital code to manufacture a paper or plastic anti-counterfeiting label and then takes the paper or plastic anti-counterfeiting label to an industry client (a production enterprise), the industry client pastes a label in a production link, software and hardware of the system integrator are used for collecting information and associating the digital code on the label, and then the commodity is delivered out of a warehouse. Finally, in the consumption link of the anti-counterfeit label, a consumer can identify the digital code by means of code scanning and the like, and inquire commodity information in a database provided by a system integrator, so that the authenticity of the commodity is judged.
In the above links, a huge leakage risk exists in the digital production link of the two-dimensional code, because a system integrator directly provides digital files to a printing factory or an industry client, the digital files have a great artificial leakage risk in the circulation process, and once the problem of leakage of the digital packages occurs, the system integrator, the printing factory and other participants cannot self-prove. The digital circulation phenomenon of the existing industry has the following problems:
1. the risk of artificially leaking digital information exists in the circulation process of the digital;
2. once the digital code is revealed, each participant can not clear the self-identification, and usually has responsibility and compensation together;
3. the system integrator and the printing factory cannot well store the certificate and identify the authenticity of the upstream agent.
4. After the digital data is produced, the digital data is centrally stored in databases of system integrators for future reference, and may be tampered by workers.
Disclosure of Invention
Aiming at the technical problems, the invention designs a sensitive data transaction system and a sensitive data transaction method based on a block chain, which utilize the block chain to store and verify the operation behaviors of all participants, and utilize all the participants to participate in generating digital information together, and all the participants can not acquire the digital information before the digital information is not printed into a label, thereby ensuring that the digital information can not be leaked due to human, and all the participants can trace the source through the block chain operation and self-verify.
A sensitive data transaction system based on a block chain comprises a block chain layer module, an electronic contract layer module and a SaaS layer module;
the block chain layer module provides technical support for the bottom layer block chain, and comprises a virtual machine supporting the running of an electronic contract, a consensus algorithm, a transaction verification mechanism and an accounting mechanism; the block chain layer is not a public chain such as bitcoin and Ether house which can be accessed anonymously for transaction, but an alliance chain based on a super ledger. Therefore, all parties participating in the block chain need authentication and authorization of the system, the information of the business entity and the personal entity is stored in the block chain, and an enterprise can add a self-established node into the block chain or lease the node provided by the system to access the block chain. After an enterprise joins a block chain, the bottom-layer service of the block chain can be obtained, and the bottom-layer distributed storage, the consensus algorithm support and the container for providing contract operation of an electronic contract layer are mainly realized when credit endorsement, behavior and key data record and sensitive data transaction are used in the electronic contract layer.
The electronic contract layer module provides credible distributed application service, distributed application is closely associated with business, application codes are disclosed to participants, and then everybody executes the business according to a convention algorithm. The electronic contract module of the system is concentrated on sensitive data services such as digital codes, point cards and the like which can be controlled and calculated by algorithms, and sensitive data transaction codes and digital code generation algorithm codes are operated;
the SaaS layer module provides cloud platform service, and enables all participants to conveniently participate in business cooperation through a web platform and a client.
Preferably, the block chain layer module, the electronic contract layer module and the SaaS layer module each provide a service call to an upper layer through an interface. All participants are authenticated on a SaaS platform, the authentication is not only a CA certificate issued by an authority, but also identity authentication of biological and social attributes such as faces, identity cards, industrial and commercial subjects and the like, each participant defines the participation role of the participant in a block chain platform, and operation behaviors and sensitive data are recorded in a block chain, so that the method has the benefit of legal evidence collection;
preferably, the system further comprises a digital transaction service layer module, wherein in the module, the SaaS platform calls a service electronic contract stored on the block chain through an SDK or API, records the whole process from ordering to code printing of a printer by a user, and ensures that the printer only has final digital data through a code generation delivery module in the process; finally, after the printer delivers the anti-counterfeit label, the code checking process checks the final digital code by calling the query interface of the electronic contract layer.
Preferably, the system further comprises a code generation delivery module, wherein the code generation delivery module comprises,
the system comprises an industry user sub-module, an anti-counterfeit label module and a block chain platform, wherein the industry user sub-module generates an anti-counterfeit label order according to a request of an industry user, the anti-counterfeit label order calls an electronic contract interface through a SaaS layer, anti-counterfeit label order information is uploaded to a block chain electronic contract, the block chain electronic contract is stored on the block chain platform, the industry user sub-module automatically obtains a random number A _1 according to the order information through a hash algorithm, and the random number A _1 is stored in the electronic contract and is invisible to the outside;
the system comprises an agent business user sub-module, a system integration sub-module and a system integration sub-module, wherein the agent business user sub-module transfers an anti-counterfeit label order transferred to the agent business user sub-module to the system integration sub-module through platform flow according to the confirmation of an agent business user, meanwhile, the agent business user sub-module places a digital order to the system integration sub-module, order information is stored in a block chain electronic contract through a digital order interface, the system obtains a random number A _2 according to the digital order information Hash, and the random number A _2 is stored in the electronic contract, is used for subsequent code generation and is invisible to the outside;
the system integrator submodule receives the digital order, checks and confirms the legality of the digital order, checks and determines whether the digital order is authorized by an industry client, determines the order of an agent after the digital order is confirmed, and executes the following operations; if the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to an agent; seed codes are invisible to the outside and are marked as SeednN is the number of digits;
and the printing submodule generates a random number A _3 of the order Hash according to the confirmed order, stores the random number in the electronic contract and is invisible to the outside.
Preferably, the printing submodule further comprises a code generation submodule, a final anti-counterfeiting digital downloading submodule and/or a direct-connected printer module, wherein the code generation submodule creates a function group of code generation transformation by combining a code generation algorithm in an electronic contract according to random numbers A _1, A _2 and A _3 stored in the whole process by a code generation electronic contract to generate codes; the final anti-counterfeiting digital downloading submodule provides final anti-counterfeiting digital downloading; the direct-connected printer module is directly connected with the printer through the electronic contract to finish final anti-counterfeiting digital printing.
Preferably, the code delivery module further comprises an agent confirmation submodule, and after confirming that the order of the agent is received, the agent confirmation submodule transfers the order flow to the printing submodule to issue the production task.
Preferably, the code generation submodule comprises a code conversion module and a code generation function generation submodule,
the code conversion module is used for converting the order Hash results of all the participants into numbers to be used as a parameter set for electronic contract function transformation;
a code generation function generation submodule, setting the code length to be generated as M, the Seed code length as N (M > N), the random number length as L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function is of the functional form X:
Figure GDA0003608980940000041
wherein j is from [0, Z +1 ]]Where k and b correspond to M-dimensional vectors, respectively. k and b are selected from the set of random numbers A1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
calling Seed and function set code generation submodules and finally calculating all output FZY, modulo by a digital scale number for each dimension of Y, for example: decimal mod10, hexadecimal mod 16, to get the final result; the code generation electronic contract records X, Y the key value binding relationship, which facilitates the quick code verification.
Preferably, the electronic contract is an irreversible electronic contract, and the electronic contract generates a function group in the final printing stage to generate codes;
the irreversible electronic contract with code generation comprises the following steps
step1 transcoding
Converting the order Hash results of all participants into numbers to be used as a parameter set for electronic contract function transformation;
step2 code generating function set generation
Let the code length to be generated be M and the Seed code length be N (M)>N), the random number length is L, SeednDividing the code into Z-M-N groups, each group corresponding to a code generating function to obtain oneA set of code generating functions;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
Figure GDA0003608980940000042
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b correspond to M-dimensional vectors respectively, and k and b are digital matrixes corresponding to k and b; each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
according to the code generating function, the complexity of the calculation time of each digital code mainly depends on the j power of X, j is related to the block number of Seed codes, and the algorithm for randomly selecting the set elements in the process can adopt square-taking neutral and linear complementation; k. the operation of the function group b can be obtained by matrix calculation;
step3 calls Seed and function set generation codes
Finally calculate all out FZThe method comprises the following steps that (X) is equal to Y, for each dimension of Y, the modulus is calculated according to a digital scale number, a final result is obtained, then each dimension of Y is combined, and a final digital code is generated; the key value binding relation of Y and X is recorded by a Hash table for the electronic contract of the code generation, on one hand, the key value binding relation is used for checking coincident codes, on the other hand, the subsequent quick code verification is facilitated, and for the coincident codes, the key value binding relation is obtained by recalculating by reducing mod values.
Preferably, the electronic contract is reversible, and only in the final printing stage is the electronic contract generating the function group for code generation; the reversible code generation electronic contract comprises the following steps
step1 transcoding
Converting the order Hash results of all participants into numbers to be used as a parameter set for electronic contract function transformation;
step2 code generating function set generation
Setting the code length to be generated as M, the Seed code length as N (M > N), requiring N < M/3, the random number length as L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, which is marked as X and is used as the input of a Z-th set code generation function;
in the set of code generating functions, the function is a linear monotonic function of the form X:
Figure GDA0003608980940000051
wherein k and b correspond to N-dimensional vectors respectively, and k and b are digital matrixes corresponding to k and b; each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting N bits from the L-dimensional variable according to the step length of round (M/N +1) to generate the N bits;
and generating a random M-dimension digit G for each transformation function, wherein the value range of each dimension is [0, M ],0 represents that the corresponding digit is not exchanged, and other digits represent the digit exchanged with the corresponding digit. G is used for digital replacement of corresponding code bits when Step3 finally generates code combination;
step3 calls Seed and function set generation codes
Finally calculate all out FZ(X) Y, obtaining a final result for each dimension of Y, then combining, when combining, taking decimal as an example, at most 3 bits for each dimension, and supplementing 0 on the left for insufficient bits; comparing the exchange code bits with the combined code by using G to obtain a final code; for the final number, the duplicate needs to be checked, if the number is repeated, a G is newly generated, and the number is ensured not to be repeated.
And the code generation electronic contract stores the G and a code generation function, and is used for reducing and calculating the X according to the Y for subsequent query.
The invention also provides a method of the sensitive data transaction system based on the block chain, which comprises the following steps:
the first step, a random number A _1 is obtained by a first participant through a hash algorithm according to order information and is stored in an electronic contract and is invisible to the outside;
secondly, a random number A _2 is obtained by a second party through a Hash algorithm according to the order information and is stored in the electronic contract for subsequent code generation, and the random number A _2 is invisible to the outside;
the third step, the third party uploads the seed code, if the third party has the seed code, the third party can choose to upload the seed code to the block chain electronic contract, and the seed code is generated by the third party; if the third party does not have a seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to a second participant; seed codes are invisible to the outside and are marked as SeednN is the number of digits;
and fourthly, the fourth participant generates an order, obtains a random number A _3 through a Hash algorithm, stores the random number in the electronic contract and cannot be seen to the outside, and meanwhile, the code generation electronic contract of the fourth participant creates a code generation transformation function group by combining a code generation algorithm in the electronic contract according to the random numbers A _1, A _2 and A _3 which are obtained through storage in the whole process to generate codes.
The invention also provides a method for applying the sensitive data transaction system based on the block chain, which comprises the following steps:
s1, the trade client sends the anti-counterfeit label order to the agent or directly facing the system integrator and the printing factory;
an industry client logs in an industry user sub-module, an anti-counterfeit label order is placed to an agent, an electronic contract interface is called through an SaaS layer when the order is placed, block chain electronic contracts are stored on a block chain platform according to order information, a random number A _1 is automatically obtained by a system according to the order information through a hash algorithm and is stored in the electronic contracts and is invisible to the outside;
s2, taking the anti-counterfeit label order from the industry client by the agent, and outsourcing the anti-counterfeit label order to the system integrator and the printing factory;
the agent logs in an agent business user sub-module, the anti-counterfeiting label order is transferred to an agent account number at the moment, the agent determines the anti-counterfeiting label order and transfers the anti-counterfeiting label order to a system integrator through a platform, the agent places a digital order to the system integrator, order information is stored in a block chain electronic contract through a digital order interface, and the system obtains a random number A _2 according to the anti-counterfeiting label order information Hash and stores the random number A _2 in the electronic contract for subsequent code generation and is invisible to the outside;
s3, the system integrator provides algorithm and original data, calculates to generate digital code, and then delivers the digital package to the printing factory or agent;
the system integrator logs in the system integrator submodule, after receiving the digital order, the system integrator checks and confirms the legality of the digital order, checks whether the digital order is authorized by an industry client, determines the order of the agent after the digital order is confirmed, and executes the following operations. If the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract for the system. The digital order stream is then forwarded to the agent. Seed codes are invisible to the outside and are marked as SeednAnd n is the number of digits.
S4, taking the digital package provided by the system integrator, typesetting the digital data according to the format requirement of the trade customer or the agent to the order, organizing and printing, and finally delivering the anti-counterfeiting label to the agent or the trade customer;
after a printing factory logs in the printing sub-module, the order is confirmed to be received, the order is generated, a random number A _3 is obtained through a Hash algorithm and stored in an electronic contract and is invisible to the outside; meanwhile, a code generation electronic contract of the printing sub-module creates a function group of code generation transformation by combining a code generation algorithm in the electronic contract according to random numbers A _1, A _2 and A _3 which are obtained by storage in the whole process, and generates codes; and the printing factory operates on the system to download the final anti-counterfeiting digital code, then introduces the digital code into the printer to print the anti-counterfeiting label, or operates on the system, directly connects the printer to print through an electronic contract, and completes the code printing delivery under the monitoring of the business client.
The invention provides a data transaction system based on a block chain, which is used for multi-party participation to jointly produce sensitive data, the final sensitive data is obtained by a final data generator, and other roles do not know the final data in the data production process, so that the sensitive data is prevented from being leaked in the circulation process. The sensitive data comprises anti-counterfeiting codes, game point cards and the like. The system is based on a block chain technology, all parties participating in data are certified on the block chain, and data generation and circulation are realized by using an electronic contract technology. The business starts from a data demand order, the final result is not presented to all parties participating in the business in a circulation link, all the parties operate the circulation of data on a block chain electronic contract, conversion parameters are input to the data, and the final result is generated during data delivery. The problem of leakage of digital information from the links of generating the digital codes to printing is solved; by using the technical advantages of the block chain, the operation behavior of the participants of the digital service is stored, and the participants can self-verify and clear according to the service specification; and the problems of information splitting of each participant and counterfeiting of agents are solved.
Drawings
FIG. 1 is a code flow diagram;
FIG. 2 is a transcoding diagram;
FIG. 3 is a diagram of access rights to data by various parties;
FIG. 4 is an exemplary diagram of an irreversible electronic contract for generating code;
fig. 5 is an exemplary diagram of a reversible code-generating electronic contract.
Detailed Description
Example 1: a sensitive data transaction system based on a block chain comprises a block chain layer module, an electronic contract layer module and a SaaS layer module;
the block chain layer module provides technical support for the bottom layer block chain, and comprises a virtual machine supporting the running of an electronic contract, a consensus algorithm, a transaction verification mechanism and an accounting mechanism;
the electronic contract layer module provides distributed application service, and runs codes of system sensitive data transaction and codes of a code generation algorithm on the electronic contract layer by using block chain technology endorsement;
the SaaS layer module provides cloud platform service, and enables all participants to conveniently participate in business cooperation through a web platform and a client.
Preferably, each module provides service call to an upper layer through an interface, and a participant determines the role of the participant in the block chain platform by storing the identity of the participant in the SaaS platform; and storing the identity information and the operation information of the SaaS platform as a block chain storage certificate through service calling of the SaaS platform.
Preferably, the system further comprises a digital transaction service layer module, wherein in the digital transaction service layer module, the SaaS platform records the whole process from ordering to code printing of a printing factory by a user to a block chain by calling an electronic contract, so that the printing factory is ensured to have final digital data; finally, after the printer delivers the anti-counterfeit label, the code checking process also checks the final digital code by calling an interface of the electronic contract layer.
Preferably, the system further comprises a code generation delivery module, wherein the code generation delivery module comprises,
the system comprises an industry user sub-module, an anti-counterfeit label module and a block chain platform, wherein the industry user sub-module generates an anti-counterfeit label order according to a request of an industry user, the anti-counterfeit label order calls an electronic contract interface through a SaaS layer, anti-counterfeit label order information is uploaded to a block chain electronic contract, the block chain electronic contract is stored on the block chain platform, the industry user sub-module automatically obtains a random number A _1 according to the order information through a hash algorithm, and the random number A _1 is stored in the electronic contract and is invisible to the outside;
the system comprises an agent business user sub-module, a system integration sub-module and a system integration sub-module, wherein the agent business user sub-module transfers an anti-counterfeit label order transferred to the agent business user sub-module to the system integration sub-module through platform flow according to the confirmation of an agent business user, meanwhile, the agent business user sub-module places a digital order to the system integration sub-module, order information is stored in a block chain electronic contract through a digital order interface, the system obtains a random number A _2 according to the digital order information Hash, and the random number A _2 is stored in the electronic contract, is used for subsequent code generation and is invisible to the outside;
the system integrator submodule receives the digital order, checks and confirms the legality of the digital order, checks and determines whether the digital order is authorized by an industry client, determines the order of an agent after the digital order is confirmed, and executes the following operations; if the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to an agent; seed codes are invisible to the outside and are marked as SeednN is the number of digits;
and the printing submodule generates a random number A _3 of the order Hash according to the confirmed order, stores the random number in the electronic contract and is invisible to the outside.
Preferably, the printing submodule further comprises a code generation submodule, a final anti-counterfeiting digital downloading submodule and/or a direct-connected printer module, wherein the code generation submodule creates a function group of code generation transformation by combining a code generation algorithm in an electronic contract according to random numbers A _1, A _2 and A _3 stored in the whole process by a code generation electronic contract to generate codes; the final anti-counterfeiting digital downloading submodule provides final anti-counterfeiting digital downloading; the direct-connected printer module is directly connected with the printer through the electronic contract to finish final anti-counterfeiting digital printing.
Preferably, the code delivery module further comprises an agent confirmation submodule, and after confirming that the order of the agent is received, the agent confirmation submodule transfers the order flow to the printing submodule to issue the production task.
Preferably, the following components: the code generation submodule comprises a code conversion module and a code generation function generation submodule,
the code conversion module is used for converting the order Hash results of all the participants into numbers to be used as a parameter set for electronic contract function transformation;
a code generation function generation submodule, setting the code length to be generated as M, the Seed code length as N (M > N), the random number length as L,
seed will benDividing the code into Z-N groups, wherein each group corresponds to a code generation function to obtain a code generation function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
Figure GDA0003608980940000101
wherein j is from [0, Z +1 ]]K and b are respectively corresponding to the M-dimensional vectors. k and b are selected from the set of random numbers A1,A2,A3,…,AiChoose any A fromiSplitting the variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
calling Seed and function set code generation submodules and finally calculating all output FZY, modulo by a digital scale number for each dimension of Y, for example: decimal mod10, hexadecimal mod 16, to get the final result; the code generation electronic contract records X, Y the key value binding relationship, which facilitates the quick code verification.
Example 2: the invention also provides a method of the sensitive data transaction system based on the block chain, which comprises the following steps:
the first step, a random number A _1 is obtained by a first participant through a hash algorithm according to order information and is stored in an electronic contract and is invisible to the outside;
secondly, a random number A _2 is obtained by a second party through a Hash algorithm according to the order information and is stored in the electronic contract for subsequent code generation, and the random number A _2 is invisible to the outside;
third step, the third party uploads the seed codeStep, if the third party has the seed code, the seed code can be uploaded to the block chain electronic contract, and the seed code is generated by the third party; if the third party does not have a seed code, the seed code will actually be automatically generated by an electronic contract for the system; then, the digital order stream is transferred to a second participant; seed codes are invisible to the outside and are marked as SeednN is the number of digits;
and fourthly, the fourth participant generates an order, obtains a random number A _3 through a Hash algorithm, stores the random number in the electronic contract and cannot be seen to the outside, and meanwhile, the code generation electronic contract of the fourth participant creates a code generation transformation function group by combining a code generation algorithm in the electronic contract according to the random numbers A _1, A _2 and A _3 which are obtained through storage in the whole process to generate codes.
Example 3: the invention also provides a method for applying the sensitive data transaction system based on the block chain, which comprises the following steps:
s1, the trade client sends the anti-counterfeit label order to the agent or directly facing the system integrator and the printing factory;
an industry client logs in an industry user sub-module, an anti-counterfeit label order is placed to an agent, an electronic contract interface is called through an SaaS layer when the order is placed, block chain electronic contracts are stored on a block chain platform according to order information, a random number A _1 is automatically obtained by a system according to the order information through a hash algorithm and is stored in the electronic contracts and is invisible to the outside;
s2, taking the anti-counterfeit label order from the industry client by the agent, and outsourcing the anti-counterfeit label order to the system integrator and the printing factory;
the agent logs in an agent business user sub-module, the anti-counterfeiting label order is transferred to an agent account at the moment, the agent determines the anti-counterfeiting label order and transfers the anti-counterfeiting label order to a system integrator through a platform, the agent places a digital order to the system integrator, order information is stored in a block chain electronic contract through a digital order interface, and the system also obtains a random number A _2 according to the anti-counterfeiting label order information Hash and stores the random number A _2 in the electronic contract for subsequent code generation and is invisible to the outside;
s3, the system integrator provides algorithm and original data, calculates to generate digital code, and then delivers the digital package to the printing factory or agent;
the system integrator logs in the system integrator submodule, after receiving the digital order, the system integrator checks and confirms the legality of the digital order, checks whether the digital order is authorized by an industry client, determines the order of the agent after the digital order is confirmed, and executes the following operations. If the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract for the system. The digital order stream is then forwarded to the agent. Seed codes are invisible to the outside and are marked as SeednAnd n is the number of digits.
S4, taking the digital package provided by the system integrator, typesetting the digital data according to the format requirement of the trade customer or the agent to the order, organizing and printing, and finally delivering the anti-counterfeiting label to the agent or the trade customer;
after a printing factory logs in the printing sub-module, the order is confirmed to be received, the order is generated, a random number A _3 is obtained through a Hash algorithm and stored in an electronic contract and is invisible to the outside; meanwhile, a code generation electronic contract of the printing sub-module creates a function group of code generation transformation by combining a code generation algorithm in the electronic contract according to random numbers A _1, A _2 and A _3 which are obtained by storage in the whole process, and generates codes; and the printing factory operates on the system to download the final anti-counterfeiting digital code, then introduces the digital code into the printer to print the anti-counterfeiting label, or operates on the system, directly connects the printer to print through an electronic contract, and completes the code printing delivery under the monitoring of the business client.
The invention provides a data transaction system based on a block chain, which is used for multi-party participation to jointly produce sensitive data, the final sensitive data is obtained by a final data generator, and other roles do not know the final data in the data production process, so that the sensitive data is prevented from being leaked in the circulation process. The sensitive data comprises anti-counterfeiting codes, game point cards and the like. The system is based on a block chain technology, all parties participating in data are certified on the block chain, and data generation and circulation are realized by using an electronic contract technology. The business starts from a data demand order, the final result is not presented to all parties participating in the business in a circulation link, all the parties operate the circulation of data on a block chain electronic contract, conversion parameters are input to the data, and the final result is generated during data delivery. The problem of leakage of digital information from the links of generating the digital codes to printing is solved; by using the technical advantages of the block chain, the operation behavior of the participants of the digital service is stored, and the participants can self-verify and clear according to the service specification; and the problems of information splitting of each participant and counterfeiting of agents are solved. The sensitive data transaction system designed by the invention is applied to the whole-flow delivery of digital codes, solves the problems of information splitting, easy counterfeiting of agents and irretrievable enterprise behaviors in the traditional business flow, provides the services of evidence storage and credit granting by using the block chain technology, and ensures that system integrators and printer factories can conveniently identify the authenticity of the agents.
The invention designs a whole flow framework of digital delivery, wherein industrial clients, agents, system integrators and printing factories operate through a sensitive data transaction system based on a block chain, the block chain is acted and data is loaded, and all participants do not contact a digital package in the process, and the digital package is randomly generated according to the participation of each participant when being printed at last, thereby ensuring the safety of the digital in the transmission process.
Example 4: a sensitive data transaction system based on a block chain is divided into three layers: the system comprises a block chain bottom layer, an electronic contract layer and a SaaS layer.
The block chain layer provides technical support for the block chain of the bottom layer, and comprises a virtual machine supporting the running of the electronic contract, a consensus algorithm, a transaction verification mechanism, a billing mechanism and the like
An electronic contract layer for providing distributed application service, using block chain technology endorsement, running code of system sensitive data transaction and code of code generation algorithm at the electronic contract layer
The SaaS layer provides cloud platform services, and all participants can conveniently participate in business cooperation through a web platform, a client and the like
Each layer provides service calling to the upper layer through an interface, and the participating party determines the participating role of the participating party in the block chain platform through storing the identity of the card in the SaaS platform. And storing the identity information and the operation information of the SaaS platform as a block link certificate through service calling of the SaaS platform. On the service level of digital transaction, the SaaS platform records the whole process from ordering to printing code printing of a printing factory to a block chain by calling an electronic contract, so that the printing factory is ensured to have final digital data. Finally, after the anti-counterfeit label is delivered by the printing factory, the code checking process also checks the final digital code by calling an interface of the electronic contract layer.
The method comprises the following steps of code generation delivery stage, and participants are as follows: industry customers, agents, system integrators, print shops.
(1) An industry user logs in the system, an anti-counterfeit label order is placed to an agent, an electronic contract interface is called through the SaaS layer when the order is placed, therefore, the order information is stored in a block chain electronic contract on a block chain platform, and the system automatically obtains a random number A through a hash algorithm according to the order information1Stored in the electronic contract and invisible to the outside.
(2) The agent logs in the system, at the moment, the anti-counterfeit label order flow is transferred to the agent account, the agent determines the anti-counterfeit label order and transfers the anti-counterfeit label order to the system integrator through the platform, the agent places a digital order to the system integrator, the order information is stored in the block chain electronic contract through the digital order interface, and the system obtains a random number A according to the anti-counterfeit label order information Hash2Stored in the electronic contract for subsequent generation of code, invisible to the outside.
(3) The system integrator logs in the system, receives the digital order, checks and confirms the legality of the digital order, checks whether the digital order is authorized by an industry client, determines the order of the agent after the digital order is confirmed, and executes the following operations. First, if the system integrators have their seed codes, they can choose to upload their seed codes to the blockchain electronic contract, and the seed codes are generated by each system integrator. If the system integrator does not have a seed code,bypassing this step, the seed code will actually be automatically generated by the electronic contract of the system. The digital order stream is then forwarded to the agent. Seed codes are invisible to the outside and are marked as SeednAnd n is the number of digits.
(4) And the agent confirms the order after receiving the order, transfers the order flow to a printing factory and issues a production task.
(5) After the printing factory logs in the system, the order is confirmed to be received, and a random number A of the order Hash is generated3Stored in the electronic contract and invisible to the outside. The print shop may now perform the following operations:
and operating and downloading the final anti-counterfeiting digital on the system, and then importing the digital into a printer to print the anti-counterfeiting label. This is done so that the printer cannot self-certify, but other parties can.
The system is operated, the printer is directly connected with the electronic contract for printing, and the code printing delivery is completed under the monitoring of the business client.
In the above two steps, the code generation electronic contract obtains the random number A according to the storage in the whole process1、A2、A3And combining a code generation algorithm in the electronic contract to create a function group of code generation transformation to generate codes. The code generation flow chart is shown in fig. 1.
The random number A1-A3 is the result of the conversion of corresponding digital codes of the character string obtained by the Hash algorithm, and the codes can be ascii or other coding schemes for converting letters into numbers in a codebook. The code generation algorithm is irreversible, the contract needs to store the one-to-one mapping of the Seed codes and the final codes, if the algorithm is reversible, the cracking probability can be increased, but the final codes do not need to be stored, so that a part of space for storing the final codes can be saved.
As shown in fig. 2 and 4, step1-3 is an irreversible encoded electronic contract. The electronic contract will generate the function set at the final printing stage for code generation.
step1 transcoding
And converting the order Hash result of each participant into a number as a parameter set for electronic contract function transformation. Take MD5 as an example. The transcoding diagram is shown in fig. 2.
step2 generation of a set of code generating functions
As shown in FIG. 4, let the code length to be generated be M and the Seed code length be N (M)>N), the random number length is L, SeednAnd dividing the code into Z-M-N groups, wherein each group corresponds to one code generating function to obtain a code generating function group. In each set Seed, each code is split into an N-dimensional variable, 1 is complemented on the left, and M bits are complemented all the way to be marked as X and used as the input of the code generating function of the Z-th set.
In the set of code generation functions, the polynomial function has the functional form X:
Figure GDA0003608980940000141
wherein j is from [0, Z +1 ]]And k and b are respectively corresponding to M-dimensional vectors and are respectively digital rectangles corresponding to k and b. Each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose any A fromiSplitting the variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate the M bits.
According to the code generating function, the complexity of the calculation time of each digital code mainly depends on the j power of X, j is related to the block number of Seed codes, and the algorithm for randomly selecting the set elements in the process can adopt square taking, linear complementation and the like. k. The operation of the set of b functions may be obtained by matrix calculation.
Step3 calls Seed and function set generation codes
As shown in FIG. 4, all of the outgoing F's are finally calculatedZY, modulo by a digital scale number for each dimension of Y, for example: decimal mod10, hexadecimal mod 16, to get the final result and merge each dimension of Y to generate the final number. The code generation electronic contract records the key value binding relationship between Y and X, is used for checking coincident codes on one hand, facilitates subsequent quick code verification on the other hand, and is obtained by reducing mod values and recalculating the coincident codes.
As shown in fig. 2 and 5, Step1-3 is a reversible electronic contract for code generation. The advantage of reversible cryptographic electronic contracts over irreversible cryptographic electronic contracts is that they are computationally simple and may not require the storage of the final cryptographic result on the block chain.
step1 transcoding
The same as the irreversible algorithm. And converting the order Hash result of each participant into a number as a parameter set for the function transformation of the electronic contract. Take MD5 as an example. The transcoding diagram is shown in fig. 2.
step2 code generating function set generation
As shown in FIG. 5, let the code length to be generated be M and the Seed code length be N (M)>N), requires N<M/3, the length of the random number is L, SeednAnd dividing the code into Z-M-N groups, wherein each group corresponds to one code generating function to obtain a code generating function group. In each set Seed, each code is split into an N-dimensional variable, denoted X, which is used as input to the Z-th set of code generation functions.
In the set of code generating functions, the function is a linear monotonic function of the form X:
Figure GDA0003608980940000151
wherein k and b correspond to the M-dimensional vectors respectively and are digital rectangles corresponding to k and b respectively. Each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose A fromiSplitting the variable into an L-dimensional variable, and then selecting N bits from the L-dimensional variable according to the round (M/N +1) step length to generate the N bits.
And generating a random M-dimension number G for each transformation function, wherein the value range of each dimension is [0, M ],0 represents that the bit is not exchanged, other numbers represent the exchanged bit with the current bit, and G is used for digital replacement of the corresponding code bit when Step3 finally generates the code combination.
Step3 calls Seed and function set generation codes
As shown in FIG. 5, all of the outputs F are finally calculatedZAnd (X) ═ Y, the final result is obtained for each dimension of Y, and then combined, when combined, at most 3 bits (in the case of decimal) for each dimension, the number of insufficient bits, and 0 is complemented on the left. For combined numberAnd code, exchanging code bits by G contrast to obtain a final digital code. For the final number, the duplicate needs to be checked, if the number is repeated, a G is newly generated, and the number is ensured not to be repeated.
The code generation method of the electronic contract needs to carry out a large amount of calculation on the matrix, and in the process, the calculation resources of all the nodes of the block chain are utilized to carry out parallel solution on the subproblems of matrix calculation, and then the results are summarized, so that the characteristic that the block chain 'mining' has a large amount of GPU resources is fully used, and valuable data are solved.
The access rights of the various parties to the data are illustrated in figure 3.
Except that the authorization information is public, all roles can only see the associated information directly input or output by themselves, and all people cannot see the information such as the random number generated by the order Hash, the code generating function combination and the like.
The sensitive data transaction system designed by the invention is applied to the whole-flow delivery of digital codes, solves the problems of information splitting, easy counterfeiting of agents and irretrievable enterprise behaviors in the traditional business flow, provides the services of evidence storage and credit granting by using the block chain technology, and ensures that system integrators and printer factories can conveniently identify the authenticity of the agents. The invention designs a whole flow framework of digital delivery, wherein industrial clients, agents, system integrators and printing factories operate through a sensitive data transaction system based on a block chain, the block chain is acted and data is loaded, and all participants do not contact a digital package in the process, and the digital package is randomly generated according to the participation of each participant when being printed at last, thereby ensuring the safety of the digital in the transmission process. The invention also innovates the development of the code generation contract and innovates a code generation function generation method.
Example 5: industry customers are Party A, such as: the white spirit manufacturing enterprise issues the anti-counterfeit label order to the agent or directly facing the system integrator and the printing factory.
The agent is the second party of the industry client, is the first party of the system integrator and the printing factory, takes the anti-counterfeit label order from the industry client and outsources the anti-counterfeit label order to the system integrator and the printing factory.
And the system integrator is used for providing algorithm and original data, calculating to generate a digital code and then delivering the digital code package to a printing factory or an agent.
The printing factory is a second party, takes the digital package provided by the system integrator, typesets the two-dimensional code data according to the format requirement of the trade customer or the agent on the order, organizes and prints the two-dimensional code data, and finally delivers the anti-counterfeit label to the agent or the trade customer.
Each role joins the system of the present invention through a registered account and then operates as follows.
1. The industry users place orders to the agent;
2. the agent gives an order to the system integrator;
3. the system integrator confirms the order and uploads the seed number or the seed number generated by the system;
3. the agent places a bill to the printing factory for production;
4. and printing factory codes and printing codes.
The method comprises the steps that an industry client issues an anti-counterfeiting label order to an agent or directly faces a system integrator and a printing factory, the industry client logs in an industry user sub-module, the anti-counterfeiting label order is issued to the agent, an electronic contract interface is called through a SaaS layer when the order is issued, order information is stored in a block chain electronic contract on a block chain platform, the system automatically obtains a random number A _1 according to the order information through a hash algorithm and stores the random number in the electronic contract, and the random number is invisible to the outside;
taking the anti-counterfeit label order from the industry client by the agent, and outsourcing the anti-counterfeit label order to the system integrator and the printing factory; the agent logs in an agent business user sub-module, the anti-counterfeiting label order is transferred to an agent account at the moment, the agent determines the anti-counterfeiting label order and transfers the anti-counterfeiting label order to a system integrator through a platform, the agent places a digital order to the system integrator, order information is stored in a block chain electronic contract through a digital order interface, and the system also obtains a random number A _2 according to the anti-counterfeiting label order information Hash and stores the random number A _2 in the electronic contract for subsequent code generation and is invisible to the outside;
the system integrator provides the algorithm and the raw data,calculating to generate a digital code, and then delivering the digital code package to a printing factory or an agent; the system integrator logs in the system integrator submodule, after receiving the digital order, the system integrator checks and confirms the legality of the digital order, checks whether the digital order is authorized by an industry client, determines the order of the agent after the digital order is confirmed, and executes the following operations. If the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract for the system. The digital order stream is then forwarded to the agent. Seed codes are invisible to the outside and are marked as SeednAnd n is the number of digits.
Taking a digital package provided by a system integrator by a printing factory, typesetting the digital data according to the format requirement of an industrial customer or an agent on an order, organizing and printing, and finally delivering the anti-counterfeiting label to the agent or the industrial customer;
after a printing factory logs in the printing sub-module, the order is confirmed to be received, the order is generated, a random number A _3 is obtained through a Hash algorithm and stored in an electronic contract and is invisible to the outside; meanwhile, a code generation electronic contract of the printing sub-module creates a function group of code generation transformation by combining a code generation algorithm in the electronic contract according to random numbers A _1, A _2 and A _3 which are obtained by storage in the whole process, and generates codes; and the printing factory operates on the system to download the final anti-counterfeiting digital code, then introduces the digital code into the printer to print the anti-counterfeiting label, or operates on the system, directly connects the printer to print through an electronic contract, and completes the code printing delivery under the monitoring of the business client.

Claims (6)

1. A sensitive data transaction system based on a blockchain is characterized in that: the system comprises a block chain layer module, an electronic contract layer module and a SaaS layer module;
the block chain layer module provides technical support for a bottom layer block chain based on a super account book union chain, and comprises a virtual machine supporting the operation of an electronic contract, a consensus algorithm, a transaction verification mechanism and an accounting mechanism; when credit endorsements, behavior and key data records and sensitive data transactions are used in the electronic contract layer, the container for carrying out contract operation is provided for the bottom distributed storage and the consensus algorithm support of the electronic contract layer;
the electronic contract layer module provides credible distributed application service, distributed application and service are closely associated, application codes are disclosed to all participants, all participants execute service according to an agreed algorithm, and system sensitive data transaction codes and code generation algorithm codes are operated on the electronic contract layer;
the SaaS layer module provides cloud platform service, and each participant can conveniently participate in business cooperation through a web platform and a client;
the system also comprises a digital transaction service layer module, wherein in the digital transaction service layer module, the SaaS platform records the whole process from ordering to code printing of a printer by a user by calling a service electronic contract stored on a block chain, and the printer is ensured to have final digital data through a code generation delivery module in the process; finally, after the printer delivers the anti-counterfeit label, the code checking process checks the final digital code by calling an inquiry interface of an electronic contract layer; still include the biography module of giving birth to a yard, give birth to a yard delivery module and include: the system comprises an industry user sub-module, wherein the industry user sub-module generates an anti-counterfeit label order according to the request of an industry user, the anti-counterfeit label order calls an electronic contract interface through a SaaS layer, anti-counterfeit label order information is uploaded to a block chain electronic contract, the block chain electronic contract is stored on a block chain platform, and the industry user sub-module automatically obtains a random number A through a Hash algorithm according to the order information1Stored in the electronic contract, invisible to the outside;
the agent business user sub-module transfers the anti-counterfeit label order transferred to the agent business user sub-module to the system integration sub-module through the platform flow according to the confirmation of the agent business user, meanwhile, the agent business user sub-module places a digital order to the system integration sub-module, the order information is stored in the block chain electronic contract through a digital order interface, and the system obtains a random order according to the digital order information HashNumber A2The code generation device is stored in the electronic contract and used for subsequent code generation, and is invisible to the outside;
the system integrator submodule receives the digital order, checks and confirms the legality of the digital order, checks and determines whether the digital order is authorized by an industry client, determines the order of an agent after the digital order is confirmed, and executes the following operations; if the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to an agent; seed codes are invisible to the outside and are marked as SeednN is the number of digits; a printing submodule for generating a random number A of an order Hash according to the confirmed order3The electronic contract is stored in the electronic contract and is invisible to the outside;
the printing submodule also comprises a code generation submodule and a final anti-counterfeiting digital downloading submodule and/or a direct-connected printer module, and the code generation submodule is used for obtaining a random number A according to a code generation electronic contract stored in the whole process1、A2、A3Creating a function group of code generation transformation by combining a code generation algorithm in the electronic contract to generate codes; the final anti-counterfeiting digital downloading submodule provides final anti-counterfeiting digital downloading; the direct-connected printer module is directly connected with a printer through an electronic contract to finish final anti-counterfeiting digital printing;
the electronic contract is an irreversible electronic contract which generates codes only when the electronic contract generates a function group at the final printing stage;
the irreversible electronic contract with code generation comprises the following steps
step1 transcoding
Converting the order Hash results of all participants into numbers to be used as a parameter set for electronic contract function transformation;
step2 generation of a set of code generating functions
Assuming that the code length to be generated is M, the Seed code length is N (M > N), the random number length is L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
Figure FDA0003596793370000021
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b correspond to M-dimensional vectors respectively and are digital rectangles corresponding to k and b respectively; each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
according to the code generating function, the complexity of the calculation time of each digital code mainly depends on the j power of X, j is related to the block number of Seed codes, and the algorithm for randomly selecting the set elements in the process can adopt square-taking neutral and linear complementation; k. the operation of the function group b can be obtained by matrix calculation;
step3 calls Seed and function set generation codes
Finally calculate all out FZThe method comprises the following steps that (X) is equal to Y, for each dimension of Y, the modulus is calculated according to a digital scale number, a final result is obtained, then each dimension of Y is combined, and a final digital code is generated; the code generation electronic contract records the key value binding relationship between X, Y and X, is used for checking coincident codes on one hand, is convenient for subsequent quick code verification on the other hand, and is obtained by recalculating the coincident codes by reducing mod values;
the code generation submodule comprises a code conversion module and a code generation function generation submodule;
the code conversion module is used for converting the order Hash results of all the participants into numbers to be used as a parameter set for electronic contract function transformation;
a code generation function generation submodule, setting the code length to be generated as M, the Seed code length as N (M > N), the random number length as L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
FZ(X)=Xj×kZ+bZ
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b respectively correspond to M-dimensional vectors; k and b are selected from the set of random numbers A1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
calling Seed and function set code generation submodules and finally calculating all output FZ(X) Y, modulo each dimension of Y according to a digital scale number, the digital scale number being decimal mod10 or hexadecimal mod 16, to obtain a final result; the code generation electronic contract records X, Y the key value binding relationship, which facilitates the quick code verification.
2. The blockchain-based sensitive data transaction system of claim 1, wherein: each module provides service calling to an upper layer through an interface, and a participant defines the role of the participant in the block chain platform through the identity of a certificate stored in the SaaS platform; operational behavior and sensitive data are recorded in the blockchain.
3. The blockchain-based sensitive data transaction system of claim 1, wherein: the code generation delivery module also comprises an agent confirmation submodule, and after confirming that the order of the agent is received, the agent confirmation submodule transfers the order flow to the printing submodule to issue a production task.
4. The blockchain-based sensitive data transaction system of claim 1, wherein: the electronic contract for generating codes is reversible, and only in the final printing stage is the electronic contract for generating the functions, the functions are generated for generating codes;
the reversible code generation electronic contract comprises the following steps
step1 transcoding
Converting the order Hash results of all participants into numbers to be used as a parameter set for electronic contract function transformation;
step2 code generating function set generation
Setting the code length to be generated as M, the Seed code length as N (M > N), requiring N < M/3, the random number length as L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, which is marked as X and is used as the input of a Z-th set code generation function;
in the set of code generating functions, the function is a linear monotonic function of the form X:
Figure FDA0003596793370000041
wherein k and b correspond to N-dimensional variables respectively and are digital rectangles corresponding to k and b respectively; each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting N bits from the L-dimensional variable according to the step length of round (M/N +1) to generate the N bits;
step3 calls Seed and function set generation codes
Finally calculate all out FZ(X) ═ Y, with a final result for each dimension of Y, then combined; associating a random M-dimensional number G for each transformation function, each dimensionHas a value range of [0, M]0 means that the corresponding code bit is not swapped, G is used for digital permutation of the corresponding code bit in the final combination;
taking decimal number as an example, for each Y when combinedZThe number of the calculated digital digits is at most 3 bits, and for the digits less than 3 bits, 0 is complemented on the left side; for the combined digital code, the G exchange code bit is referred to obtain a final digital code; and (4) verifying and checking the final code, and if the final code is repeated, generating a G replacement newly to ensure that the code is not repeated.
5. A method of a block chain-based sensitive data transaction system is characterized in that:
the system comprises a block chain layer module, an electronic contract layer module and a SaaS layer module;
the block chain layer module provides technical support for a bottom layer block chain based on a super account book union chain, and comprises a virtual machine supporting the operation of an electronic contract, a consensus algorithm, a transaction verification mechanism and an accounting mechanism; when credit endorsements, behavior and key data records and sensitive data transactions are used in the electronic contract layer, the container for carrying out contract operation is provided for the bottom distributed storage and the consensus algorithm support of the electronic contract layer;
the electronic contract layer module provides credible distributed application service, distributed application and service are closely associated, application codes are disclosed to all participants, all participants execute service according to an agreed algorithm, and system sensitive data transaction codes and code generation algorithm codes are operated on the electronic contract layer;
the SaaS layer module provides cloud platform service, and each participant can conveniently participate in business cooperation through a web platform and a client;
the system also comprises a digital transaction service layer module, wherein in the digital transaction service layer module, the SaaS platform records the whole process from ordering to code printing of a printer by a user by calling a service electronic contract stored on a block chain, and the printer is ensured to have final digital data through a code generation delivery module in the process; finally, after the printer delivers the anti-counterfeit label, the code checking process is realized by calling an electronic contract layerInquiring an interface, and checking the final digital code; still include the biography module of giving birth to a yard, give birth to a yard delivery module and include: the system comprises an industry user sub-module, wherein the industry user sub-module generates an anti-counterfeit label order according to the request of an industry user, the anti-counterfeit label order calls an electronic contract interface through a SaaS layer, anti-counterfeit label order information is uploaded to a block chain electronic contract, the block chain electronic contract is stored on a block chain platform, and the industry user sub-module automatically obtains a random number A through a Hash algorithm according to the order information1Stored in the electronic contract, invisible to the outside;
the agent business user sub-module transfers the anti-counterfeit label order transferred to the agent business user sub-module to the system integration sub-module through the platform flow according to the confirmation of the agent business user, meanwhile, the agent business user sub-module places a digital order to the system integration sub-module, the order information is stored in the block chain electronic contract through a digital order interface, and the system obtains a random number A according to the digital order information Hash2The code generation device is stored in the electronic contract and used for subsequent code generation, and is invisible to the outside;
the system integrator submodule receives the digital order, checks and confirms the legality of the digital order, checks and determines whether the digital order is authorized by an industry client, determines the order of an agent after the digital order is confirmed, and executes the following operations; if the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to an agent; seed codes are invisible to the outside and are marked as SeednN is the number of digits;
a printing submodule for generating a random number A of an order Hash according to the confirmed order3The electronic contract is stored in the electronic contract and is invisible to the outside;
the printing submodule also comprises a code generation submodule, a final anti-counterfeiting digital downloading submodule and/or a direct-connected printerThe code generation sub-module is used for obtaining a random number A according to the code generation electronic contract stored in the whole process1、A2、A3Creating a function group of code generation transformation by combining a code generation algorithm in the electronic contract to generate codes; the final anti-counterfeiting digital downloading submodule provides final anti-counterfeiting digital downloading; the direct-connected printer module is directly connected with a printer through an electronic contract to finish final anti-counterfeiting digital printing;
the electronic contract is an irreversible electronic contract which generates codes only when the electronic contract generates a function group at the final printing stage;
the irreversible electronic contract with code generation comprises the following steps
step1 transcoding
Converting the order Hash results of all participants into numbers to be used as a parameter set for electronic contract function transformation;
step2 code generating function set generation
Assuming that the code length to be generated is M, the Seed code length is N (M > N), the random number length is L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
Figure FDA0003596793370000061
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b correspond to M-dimensional vectors respectively and are digital rectangles corresponding to k and b respectively; each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
according to the code generating function, the complexity of the calculation time of each digital code mainly depends on the j power of X, j is related to the block number of Seed codes, and the algorithm for randomly selecting the set elements in the process can adopt square-taking neutral and linear complementation; k. the operation of the function group b can be obtained by matrix calculation;
step3 calls Seed and function set generation codes
Finally calculate all out FZThe method comprises the following steps that (X) is equal to Y, for each dimension of Y, the modulus is calculated according to a digital scale number, a final result is obtained, then each dimension of Y is combined, and a final digital code is generated; the code generation electronic contract records the key value binding relationship between X, Y and X, is used for checking coincident codes on one hand, is convenient for subsequent quick code verification on the other hand, and is obtained by recalculating the coincident codes by reducing mod values;
the code generation submodule comprises a code conversion module and a code generation function generation submodule,
the code conversion module is used for converting the order Hash results of all the participants into numbers to be used as a parameter set for electronic contract function transformation;
a code generation function generation submodule, setting the code length to be generated as M, the Seed code length as N (M > N), the random number length as L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
FZ(X)=Xj×kZ+bZ
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b respectively correspond to M-dimensional vectors; k and b are selected from the set of random numbers A1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
calling Seed and function set generation submodelsBlock, finally calculate all out FZ(X) Y, modulo each dimension of Y according to a digital scale number, the digital scale number being decimal mod10 or hexadecimal mod 16, to obtain a final result; the code generation electronic contract records X, Y key value binding relation, which is convenient for quick code check; the method comprises the following steps:
the first step, a random number A _1 is obtained by a first participant through a Hash algorithm according to order information and is stored in an electronic contract and is invisible to the outside;
secondly, a random number A _2 is obtained by a second party through a Hash algorithm according to the digital order information and is stored in the electronic contract for subsequent code generation, and the random number A _2 is invisible to the outside;
the third step, the third party uploads the seed code, if the third party has the seed code, the third party can choose to upload the seed code to the block chain electronic contract, and the seed code is generated by the third party; if the third party does not have a seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to a second participant; seed codes are invisible to the outside and are marked as SeednN is a digital number;
and fourthly, the fourth participant generates an order, obtains a random number A _3 through a Hash algorithm, stores the random number in the electronic contract and cannot be seen to the outside, and meanwhile, the code generation electronic contract of the fourth participant creates a code generation transformation function group by combining a code generation algorithm in the electronic contract according to the random numbers A _1, A _2 and A _3 which are obtained through storage in the whole process to generate codes.
6. A method for applying a block chain-based sensitive data transaction system is characterized in that: comprises the following steps of (a) carrying out,
s1, the trade client sends the anti-counterfeit label order to the agent or directly facing the system integrator and the printing factory;
an industry client logs in an industry user sub-module, an anti-counterfeit label order is placed to an agent, an electronic contract interface is called through an SaaS layer when the order is placed, order information is uploaded to a block chain electronic contract, the block chain electronic contract is stored on a block chain platform, a random number A _1 is obtained by the system automatically according to the order information through a hash algorithm and is stored in the electronic contract and is invisible to the outside;
s2, taking the anti-counterfeit label order from the industry client by the agent, and outsourcing the anti-counterfeit label order to the system integrator and the printing factory; the agent logs in an agent user sub-module, the anti-counterfeit label order is transferred to an agent account at the moment, the agent determines the anti-counterfeit label order and transfers the anti-counterfeit label order to the system integrator through a platform, the agent places a digital order to the system integrator, order information is stored in a block chain electronic contract through a digital order interface, and the system obtains a random number A _2 according to the digital order information Hash and stores the random number A _2 in the electronic contract for subsequent code generation and is invisible to the outside;
s3, the system integrator provides algorithm and original data, calculates to generate digital code, and then delivers the digital package to the printing factory or agent;
the system integrator logs in the system integrator submodule, after the system integrator receives the digital order, the validity of the digital order is checked and confirmed, whether the digital order is authorized by an industry client is checked and the order of the agent is determined after the digital order is confirmed, and the following operations are executed; if the system integrator does not have the seed code, the seed code will actually be automatically generated by the electronic contract of the system; then, the digital order stream is transferred to an agent; seed codes are invisible to the outside and are marked as SeednN is the number of digits;
s4, taking the digital package provided by the system integrator, typesetting the digital data according to the format requirement of the trade customer or the agent to the order, organizing and printing, and finally delivering the anti-counterfeiting label to the agent or the trade customer;
after a printing factory logs in the printing sub-module, the order is confirmed to be received, the order is generated, a random number A _3 is obtained through a Hash algorithm and stored in an electronic contract and is invisible to the outside; meanwhile, a code generation electronic contract of the printing sub-module creates a function group of code generation transformation by combining a code generation algorithm in the electronic contract according to random numbers A _1, A _2 and A _3 which are obtained by storage in the whole process, and generates codes; the printing factory operates and downloads the final anti-counterfeiting digital code on the system, then the digital code is led into a printer to print an anti-counterfeiting label, or operates on the system, is directly connected with the printer to print through an electronic contract, and finishes printing and delivering under the monitoring of an industrial client;
the printing submodule also comprises a code generation submodule and a final anti-counterfeiting digital downloading submodule and/or a direct-connected printer module, and the code generation submodule is used for obtaining a random number A according to a code generation electronic contract stored in the whole process1、A2、A3Creating a function group of code generation transformation by combining a code generation algorithm in the electronic contract to generate codes; the final anti-counterfeiting digital downloading submodule provides final anti-counterfeiting digital downloading; the direct-connected printer module is directly connected with a printer through an electronic contract to finish final anti-counterfeiting digital printing;
the electronic contract is an irreversible electronic contract which generates codes only when the electronic contract generates a function group at the final printing stage;
the irreversible encoded electronic contract comprises the following steps:
step1 transcoding
Converting the order Hash results of all participants into numbers to be used as a parameter set for electronic contract function transformation;
step2 code generating function set generation
Assuming that the code length to be generated is M, the Seed code length is N (M > N), the random number length is L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
Figure FDA0003596793370000101
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b correspond to M-dimensional vectors respectively and are digital rectangles corresponding to k and b respectively; each pair of k and b multidimensional variables is generated from a set of random numbers { A }1,A2,A3,…,AiChoose any A fromiSplitting the L-dimensional variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
according to the code generating function, the complexity of the calculation time of each digital code mainly depends on the j power of X, j is related to the block number of Seed codes, and the algorithm for randomly selecting the set elements in the process can adopt square-taking neutral and linear complementation; k. the operation of the function group b can be obtained by matrix calculation;
step3 calls Seed and function set generation codes
Finally calculate all the output FZThe method comprises the following steps that (X) is equal to Y, for each dimension of Y, the modulus is calculated according to a digital scale number, a final result is obtained, then each dimension of Y is combined, and a final digital code is generated; the code generation electronic contract records the key value binding relationship between X, Y and X, so that on one hand, the key value binding relationship is used for checking duplicate codes, on the other hand, the subsequent quick code verification is facilitated, and for the duplicate codes, the values of mod are reduced and recalculated to obtain the double codes;
the code generation submodule comprises a code conversion module and a code generation function generation submodule;
the code conversion module is used for converting the order Hash results of all the participants into numbers to be used as a parameter set for electronic contract function transformation;
a code generation function generation submodule, setting the code length to be generated as M, the Seed code length as N (M > N), the random number length as L,
seed tonDividing the code into Z-M-N groups, wherein each group corresponds to a code generating function to obtain a code generating function group;
in each set Seed, each code is divided into an N-dimensional variable, 1 is complemented on the left, and the N-dimensional variable is complemented to M bits all the time and is marked as X to be used as the input of a Z-th set code generating function;
in the set of code generation functions, the polynomial function has the functional form X:
FZ(X)=Xj×kZ+bZ
wherein j is from [0, Z +1 ]]Selecting randomly, wherein k and b respectively correspond to M-dimensional vectors; k and b are derived from the set of random numbers A1,A2,A3,…,AiChoose any A fromiSplitting the variable into an L-dimensional variable, and then selecting M bits from the L-dimensional variable according to the round (M/N +1) step length to generate;
calling Seed and function set code generation submodules and finally calculating all output FZ(X) Y, modulo each dimension of Y according to a digital scale number, the digital scale number being decimal mod10 or hexadecimal mod 16, to obtain a final result; the code generation electronic contract records X, Y the key value binding relationship, which facilitates the quick code verification.
CN201811064754.8A 2018-09-12 2018-09-12 Sensitive data transaction system and method based on block chain Active CN109325764B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811064754.8A CN109325764B (en) 2018-09-12 2018-09-12 Sensitive data transaction system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811064754.8A CN109325764B (en) 2018-09-12 2018-09-12 Sensitive data transaction system and method based on block chain

Publications (2)

Publication Number Publication Date
CN109325764A CN109325764A (en) 2019-02-12
CN109325764B true CN109325764B (en) 2022-05-27

Family

ID=65265834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811064754.8A Active CN109325764B (en) 2018-09-12 2018-09-12 Sensitive data transaction system and method based on block chain

Country Status (1)

Country Link
CN (1) CN109325764B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933629B (en) 2019-03-15 2021-07-30 腾讯科技(深圳)有限公司 Data synchronization method and device, computer equipment and readable storage medium
CN111222169B (en) * 2019-10-10 2023-04-18 深圳创链数据科技有限公司 Intelligent equipment authentication system and method based on block chain technology
CN112100269B (en) * 2020-11-19 2021-02-12 北京连琪科技有限公司 Interface cooperation method and system capable of proving
CN113393313B (en) * 2021-08-17 2021-11-09 环球数科集团有限公司 Writing mechanism for carrying out trusted deposit certificate on accounting tool for telecommunication value-added service
CN114462094B (en) * 2021-09-08 2023-07-14 北京天德科技有限公司 Multi-party bidding intelligent contract digital system based on container and execution method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105691019A (en) * 2016-01-13 2016-06-22 张法锦 Manufacturing method for colored digital anti-counterfeit paper
CN106845275A (en) * 2017-02-09 2017-06-13 中国科学院数据与通信保护研究教育中心 The electronic bill management system and method for a kind of secret protection
CN107079058A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 The business of block chain node performs method, device and node device
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN107924389A (en) * 2015-07-02 2018-04-17 纳斯达克公司 The system and method traced to the source the safety of distributed transaction database
CN108182581A (en) * 2017-12-29 2018-06-19 北京欧链科技有限公司 A kind of bookkeeping methods and device of block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10121019B2 (en) * 2015-06-02 2018-11-06 ALTR Solutions, Inc. Storing differentials of files in a distributed blockchain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107924389A (en) * 2015-07-02 2018-04-17 纳斯达克公司 The system and method traced to the source the safety of distributed transaction database
CN105691019A (en) * 2016-01-13 2016-06-22 张法锦 Manufacturing method for colored digital anti-counterfeit paper
CN107079058A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 The business of block chain node performs method, device and node device
CN106845275A (en) * 2017-02-09 2017-06-13 中国科学院数据与通信保护研究教育中心 The electronic bill management system and method for a kind of secret protection
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN108182581A (en) * 2017-12-29 2018-06-19 北京欧链科技有限公司 A kind of bookkeeping methods and device of block chain

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows;wangziyu等;《2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)》;20160225;第1-6页,全文 *
A supply chain traceability system for food safety based on HACCP, blockchain & Internet of things;Feng Tian;《2017 International Conference on Service Systems and Service Management》;20170731;第1-6页,全文 *
供应链的可信溯源查询在区块链上的实现;郭珊珊;《中国优秀博硕士学位论文全文数据库(硕士)经济与管理科学辑》;20180115(第1期);第J152-1134页,全文 *
区块链技术:应用及问题;翟社平;《西安邮电大学学报》;20180131;第23卷(第1期);第1-13页,全文 *
区块链技术在农产品溯源系统中的应用研究;李静等;《区块链技术在农产品溯源系统中的应用研究》;20180630;第2卷(第6期);第192-196页,全文 *
结合稀疏编码和金字塔匹配的视频检索;汪子彧等;《计算机工程与应用》;20131115;第49卷(第21期);第191-194页 *

Also Published As

Publication number Publication date
CN109325764A (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN109325764B (en) Sensitive data transaction system and method based on block chain
US20230410215A1 (en) Cryptographic method and system for secure extraction of data from a blockchain
US11743052B2 (en) Platform for generating authenticated data objects
CN109829824B (en) Commodity transaction information sharing method based on block chain technology
US11126976B2 (en) Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
JP7249148B2 (en) Blockchain-based universal tokenization system
CN112166578A (en) Improved system and method for storage, generation and verification of tokens for controlling access to resources
CN110807641A (en) Pet food traceability system
JP2019508950A (en) Data transfer control method and system based on integrated block chain
CN114884681B (en) Authorization code-based network office wholesale authorization approval method
CN112435006A (en) Patent overall process management method, system and equipment applying block chain technology
CN113988857A (en) NFT transaction method, transaction system, computer-readable storage medium and terminal device
CN113779594A (en) Data distribution sharing method and system based on block chain
CN110492997A (en) A kind of encryption system based on super account book, method, apparatus and storage medium
KR102320103B1 (en) Method for Authenticating Genuineness by Substituting the Autograph of the Work
CN114529310A (en) Block chain-based data transaction verification and data ownership tracing method and system
CN116015609A (en) Business record storage method, device, computer equipment and storage medium
TWM644096U (en) Data exchange system
KR20230019002A (en) Method and apparatus for generating evaluation for a plurality of cryptocurrencies using on-chain information and off-chain information
CN117853102A (en) Point-to-point payment method and system based on blockchain
CN114826613A (en) Block chain-based identity information query method, device, equipment and storage medium
CN117333164A (en) Integration processing method, apparatus, computer device, storage medium, and program product
CN117749379A (en) Data processing method, device, equipment and computer readable storage medium
CN113793149A (en) Off-line transaction authentication system and method, central server and client

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant