CN109523267A - A kind of verification method, the apparatus and system of the transaction data based on block chain - Google Patents
A kind of verification method, the apparatus and system of the transaction data based on block chain Download PDFInfo
- Publication number
- CN109523267A CN109523267A CN201811276380.6A CN201811276380A CN109523267A CN 109523267 A CN109523267 A CN 109523267A CN 201811276380 A CN201811276380 A CN 201811276380A CN 109523267 A CN109523267 A CN 109523267A
- Authority
- CN
- China
- Prior art keywords
- chain
- alliance
- user terminal
- key
- transaction data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 title claims abstract description 9
- 238000012790 confirmation Methods 0.000 claims abstract description 76
- 238000012545 processing Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 22
- 238000004321 preservation Methods 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000013478 data encryption standard Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 239000004744 fabric Substances 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- OTZZZISTDGMMMX-UHFFFAOYSA-N 2-(3,5-dimethylpyrazol-1-yl)-n,n-bis[2-(3,5-dimethylpyrazol-1-yl)ethyl]ethanamine Chemical compound N1=C(C)C=C(C)N1CCN(CCN1C(=CC(C)=N1)C)CCN1C(C)=CC(C)=N1 OTZZZISTDGMMMX-UHFFFAOYSA-N 0.000 description 1
- 241001441724 Tetraodontidae Species 0.000 description 1
- 230000003796 beauty Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Health & Medical Sciences (AREA)
- Technology Law (AREA)
- Software Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention discloses verification method, the apparatus and systems of a kind of transaction data based on block chain; it is related to field of computer technology; the retrospect of transaction can be solved the problems, such as using alliance's chain and encryption principle; and transaction data uploads alliance's chain; data can not be tampered; protecting the interests of user to invent includes: by the client node in alliance's chain; encrypted transaction data and symmetrical code key are uploaded to alliance's chain; wherein; transaction data is encrypted by user terminal by symmetrical code key, and client node is used to receive the access of user terminal;It is decrypted by symmetrical secret key pair transaction data and confirmation message, obtain the plaintext of transaction data and confirmation message, wherein confirmation message is generated after it confirmed transaction data by the merchant node in alliance's chain, confirmation message is encrypted before being uploaded to alliance's chain by merchant node.The present invention is suitable for for alliance's chain being applied to the preservation of Transaction Information.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of verification method of the transaction data based on block chain,
Apparatus and system.
Background technique
Currently, online trading market rapid expanding, traditional off-line transaction mode receives great impact, is especially handing over
Easy data record this aspect, off-line transaction process cannot not there are problems that traceablely and transaction data is easy to be tampered.
Such as after user buys commodity, due to the behaviors such as the loss of purchase invoice or trade company's denial, cause to use
Family has no basis when carrying out after-sale service;It says for another example, after customer buys member card or supplements with money, trade company passes through backstage
The system modification account amount of money causes the loss of user's amount of money, and power of interpretation is usually all in trade company.
Therefore, off-line transaction process cannot not there are problems that traceablely and transaction data is easy to be tampered, and becomes and causes customer
The problem of right-safeguarding difficulty.
Summary of the invention
The embodiment of the present invention provides verification method, the apparatus and system of a kind of transaction data based on block chain, utilizes
Alliance's chain and encryption principle solve the problems, such as the retrospect of transaction, and transaction data uploads alliance's chain, and data can not be tampered, protect
The interests of user.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
On the one hand, user terminal uploads the stage in information, by the client node in alliance's chain, on Xiang Suoshu alliance chain
Passing encrypted transaction data and symmetrical code key wherein, the transaction data is encrypted by user terminal by symmetrical code key,
The client node is used to receive the access of the user terminal;
In the information source tracing stage, the symmetrical code key is uploaded to alliance's chain;By trading described in the symmetrical secret key pair
Data and confirmation message are decrypted, and obtain the plaintext of the transaction data and the confirmation message, wherein the confirmation message
It is to be generated after it confirmed the transaction data by the merchant node in alliance's chain, the confirmation message is being uploaded to
Before stating alliance's chain, encrypted by the merchant node.
On the other hand, merchant node uploads the stage in information, obtains and has accessed the transaction that the user terminal of alliance's chain issues
Data and code key data, the user terminal access alliance's chain wherein by the client node in alliance's chain, institute
It states transaction data and is encrypted by user terminal by symmetrical code key, the client node is for receiving the user terminal
Access;The symmetrical code key is obtained to the code key data deciphering by client public key, and by described in the symmetrical secret key pair
Transaction data is decrypted, and generates confirmation message later, and encrypted by confirmation message described in the symmetrical secret key pair;It will
The encrypted confirmation message uploads alliance's chain;
In the information source tracing stage: obtaining the symmetrical code key from alliance's chain, and pass through the symmetrical secret key pair confirmation
The transaction data of information and the user terminal uploads is decrypted.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client
It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data
Secrecy.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 a is the use schematic illustration of the asymmetric code key in a kind of alliance's chain provided in an embodiment of the present invention;
Fig. 2 b is a kind of method flow schematic diagram provided in an embodiment of the present invention;
Fig. 2 c, Fig. 2 d, Fig. 2 e, the interaction flow schematic diagram that Fig. 2 f is specific example provided in an embodiment of the present invention;
Fig. 3 is another method flow schematic diagram provided in an embodiment of the present invention;
Fig. 4 is apparatus structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, with reference to the accompanying drawing and specific embodiment party
Present invention is further described in detail for formula.Embodiments of the present invention are described in more detail below, the embodiment is shown
Example is shown in the accompanying drawings, and in which the same or similar labels are throughly indicated same or similar element or has identical or class
Like the element of function.It is exemplary below with reference to the embodiment of attached drawing description, for explaining only the invention, and cannot
It is construed to limitation of the present invention.Those skilled in the art of the present technique are appreciated that unless expressly stated, odd number shape used herein
Formula " one ", "one", " described " and "the" may also comprise plural form.It is to be further understood that specification of the invention
Used in wording " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that
In the presence of or add other one or more features, integer, step, operation, element, component and/or their group.It should be understood that
When we say that an element is " connected " or " coupled " to another element, it can be directly connected or coupled to other elements, or
There may also be intermediary elements.In addition, " connection " used herein or " coupling " may include being wirelessly connected or coupling.Here make
Wording "and/or" includes one or more associated any cells for listing item and all combinations.The art
Technical staff is appreciated that unless otherwise defined all terms (including technical terms and scientific terms) used herein have
Meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.It should also be understood that such as general
Those terms, which should be understood that, defined in dictionary has a meaning that is consistent with the meaning in the context of the prior art, and
Unless defined as here, it will not be explained in an idealized or overly formal meaning.
Method provided in an embodiment of the present invention is mainly used for realizing the preservation and verifying for carrying out transaction data using block chain.
As shown in Figure 1, be a kind of system architecture diagram for realizing method provided in an embodiment of the present invention provided in an embodiment of the present invention,
It include: user terminal, client node and merchant node, wherein client node and merchant node form alliance's chain, client
Node is used to receive the access of user terminal, so that user terminal accesses alliance's chain by client node, but user is whole simultaneously
End is again not as a formal node in alliance's chain, to avoid occupying the hardware resource of user terminal.
User terminal disclosed in the present embodiment can specifically be made into an independent device in fact, or be integrated in various differences
Media data playing device in, such as smart phone, smart television, tablet computer (Tablet Personal
Computer), laptop computer (Laptop Computer), multimedia player, digital camera, personal digital assistant
(personal digital assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device,
MID), set-top box etc..
Alliance's chain belongs to a kind of application of block chain technology, generally comprises multiple nodes in alliance's chain, in each node
It is stored with block chain (Block Chain), block chain includes multiple blocks (Block), and each block includes block chain data
Previous block-identified, the generation Block time of middle link and affairs, each block is for storing several affairs, in this hair
In bright embodiment, affairs include having recorded the account books of each transaction data (transaction data recorded in account book all having passed through friendship
Easy both sides are encrypted in symmetrical code key that this transaction always uses), the corresponding symmetrical code key of each transaction, wherein it is every
The corresponding symmetrical code key of one transaction can be set by the user side in both parties, such as symmetrical secret by user terminal generation
Key, then the symmetrical code key is encrypted to obtain code key data by private key for user by user terminal, code key data are led to later
It crosses client node and uploads alliance's chain, the merchant node traded only need to can be to code key by the client public key of user terminal
Data are decrypted to obtain symmetrical code key.
In the present embodiment, client node and merchant node specifically can be implemented as currently used hardware device,
In, the hardware device for having certain data-handling capacity can be used as merchant node, such as: merchant node refers specifically to set
Set the individual of server in each trade company, the server cluster system, work station or the small trade company that are made of multiple servers
Computer etc..
The hardware device for having stronger data-handling capacity can be used as client node, in practical applications client
Node needs while handling the access of multiple user terminals, and common client node can be implemented as existing on the market at present
Server or the server cluster system that is made of multiple servers.
In the present embodiment, alliance's chain can be built based on fabric, each trade company provides hardware device as participation connection
The merchant node of alliance's chain saves the account book of all trade companies based on alliance's chain;User terminal runs client, accesses client therein
End node, and transaction data is cached, it can both guarantee that the multicenter characteristic of alliance's chain is also protected so that data are not tampered in this way
Data pressure will not be generated by having demonstrate,proved client.
Specifically, the node of each access alliance's chain can distribute one in the alliance's chain built based on fabric technology
To code key, this pair of of code key includes private key and corresponding public key.And it is set in the agreement of alliance's chain, private key is used
The data that upload of needs are encrypted in each node, corresponding public key is then used for other nodes to having uploaded alliance's chain
Encryption data be decrypted.Specifically, the alliance's chain set up in the present embodiment, as long as node is uploaded to alliance's chain
Also all each node can be downloaded arbitrarily for data, the ciphertext being entirely encrypted, while these ciphertexts, because of block chain
In all node preserve account book data.Public key and private key distribute in pairs, i.e., each node is in successful registration
And after accessing alliance's chain, a public key and a corresponding private key will be assigned, it should be noted that here to each
Node distributes the concrete mode of " public-private key ", can be node access alliance's chain, and enrollment status simultaneously obtains corresponding certificate
Afterwards, it locally oneself is calculated based on the code key generating algorithm in certificate in node, the private key being calculated is stored in node sheet
Ground, and public key then uploads alliance's chain, such as: merchant node generates the trade company's private key and therewith of oneself after accessing alliance's chain
Trade company's public key is uploaded alliance's chain later by corresponding trade company's public key;And user terminal is then to access alliance by client node
Chain, user terminal not as alliance's chain a node, but from client node downloading alliance's chain certificate and generate use
Family private key and corresponding client public key, then client public key is uploaded to alliance's chain by client node, and private key for user
It is stored in user terminal local.This formal node not as alliance's chain of user terminal accesses, but still obtains in alliance's chain
Identity and distribution " public-private key " mode, can be referred to as " light node ".
In the present embodiment, " public-private key " of each node distribution, it is understood that be a kind of asymmetric code key, example
As: shown in Fig. 2 a, private key A- public key A is generated after A node access alliance's chain in alliance's chain, wherein private key A is stored in node
The local of A, public key A upload alliance's chain.A node encrypts data by private key A, and encryption data is uploaded, Zhi Houtong
Know B node;B node downloads the public key A and encryption data of A node, and decrypts encryption data with public key A, obtains data clear text.I.e.
The data of public key encryption are decrypted by corresponding private key, and the data of private key encryption are by corresponding public key decryptions, public affairs
Key-private key is asymmetric code key, and the code key of enciphering/deciphering is different.
In the present embodiment, to being symmetrical code key used by encrypted transaction data, symmetrical code key refers to identical
Code key * 2, it is the same to the code key of transaction data encryption and decryption.In the present embodiment, symmetrical code key is generated by user terminal, is used
Trade company's public key of family terminal merchant node encrypts symmetrical code key, or by the trade company of client node merchant node
Public key encrypts symmetrical code key, in a word by the symmetrical code key of trade company's public key encryption, i.e., as the code key data,
Code key data are uploaded to alliance's chain later, merchant node downloads code key data, and merchant node is recycled locally to deposit
Trade company's private key decryption code key data of storage obtain symmetrical code key.Generally speaking, in the present embodiment, it is encrypted and is handed over by symmetrical code key
Alliance's chain is uploaded after easy data, then uploads alliance's chain after the symmetrical code key of public key encryption for passing through node.
The embodiment of the present invention provides a kind of verification method of transaction data based on block chain, and this method specifically may be implemented
On the user terminal in system architecture as shown in Figure 1.Such as: client-side program can be installed on user terminal, and run
Client-side program access client node, and from data information needed for client node acquisition access alliance's chain, such as: user
For terminal by app, network etc. obtains the private key for user of alliance's chain distribution and the certificate of alliance's chain in the Node registry.
The process realized on the subscriber terminal can specifically be divided into information and upload stage and information source tracing stage.Wherein:
The information upload stage refers to: user passes through operation user terminal and generates phase when carrying out transaction with trade company
The transaction data answered, and transaction data encrypt the process for being finally uploaded to alliance's chain;
The information source tracing stage refers to: user completes the transaction carried out in the information upload stage with trade company, transaction
It needs to recall trading situation after the completion of activity, needs to be loaded in information at this time under in alliance's chain and upload what the stage was uploaded
The confirmation message that transaction data and merchant node upload, and be decrypted by symmetrical secret key pair transaction data and confirmation message
To plaintext, to realize processing, the negotiation etc. of the plaintext progress Transaction Disputes of later use transaction data and confirmation message.
It is specific as shown in Figure 2 b, this method comprises:
S101, the stage is uploaded in information, by the client node in alliance's chain, Xiang Suoshu alliance chain uploads encrypted
Transaction data and symmetrical code key.
Wherein, the transaction data is encrypted by user terminal by symmetrical code key, and the client node is used
In the access for receiving the user terminal.In the present embodiment, the node of composition alliance's chain has included at least 2 seed types: client
Node and merchant node, such as: alliance's chain includes multiple merchant nodes and at least one client node.Merchant node can be with
As the ordinary node for the chain that coalizes, client node is a kind of special joint of alliance's chain, the use for the chain that do not coalize
Family (in actual application, these users would generally have trading activity with the trade company for the chain that coalizes) can be by operation certainly
Oneself user terminal accesses the client node, such as: by the app run on user terminal, by network in client's end segment
Point registration, and obtain the certificate of private key for user and alliance's chain.
In the present embodiment, user terminal is not intended as a node in alliance's chain, does not protect locally in user terminal
The account book in alliance's chain is deposited, the account book in alliance's chain is only stored in merchant node and client node.In every user and quotient
In the transaction at family, user terminal locally generates transaction data, and transaction data can specifically include: the disbursement letter generated in transaction
The particular content of the data such as breath, the photo of commodity, merchandise news, transaction data can be set according to specific application scenarios,
This is not repeated them here.
In the present embodiment, user terminal can use symmetrical secret key pair transaction data and be encrypted.Institute in the present embodiment
The symmetric key stated, and be properly termed as private key or shared key, that is, send and receive data both sides must use it is identical
Operation is encrypted and decrypted in key pair in plain text.Symmetric key encryption algorithm specifically includes that DES (Data Encryption
Standard, data encryption standards), 3DES (or be Triple DES, be triple data encryption algorithm (TDEA, Triple
Data Encryption Algorithm) block encryption common name), IDEA (International Data Encryption
Algorithm, international data encryption algorithm), FEAL (Fast Data Encipherment Algorithm, a set of similar beauty
The block encryption algorithm of state DES), BLOWFISH (being Bruce Shi Naier in the block encryption algorithm of exploitation in 1993) etc.).
S102, in the information source tracing stage, be decrypted by transaction data described in the symmetrical secret key pair and confirmation message,
Obtain the plaintext of the transaction data and the confirmation message.
Wherein, symmetrical code key used in user and trade company both sides during each transaction, all upload alliance's chain, so as to
In obtaining symmetrical code key from alliance's chain using respective private key in information source tracing stage merchant node and user terminal.Symmetrical secret
Key needs to be encrypted before uploading alliance's chain.
What user terminal and merchant node were directly acquired from alliance's chain is code key data, and code key data are to pass through private key for user
It is obtained after being encrypted to symmetrical code key.Such as: as shown in Figure 2 c, symmetrical code key is local with unencryption in user terminal
The form of plaintext stores, and user terminal encrypts symmetrical code key by private key for user to upload alliance's chain after obtaining code key data.?
Trade company is clearly the user known as counterpart in process of exchange, therefore merchant node is according to the identity mark of user terminal
Know (such as: the pet name, account ID, cell-phone number, order number of this transaction etc. can be used in identifying one side of user in this transaction
Identification information), download the client public key of the user terminal from alliance's chain, merchant node utilizes user after obtaining code key data
Public key is decrypted code key data to obtain symmetrical code key.
Wherein, the confirmation message is generated after it confirmed the transaction data by the merchant node in alliance's chain
's.The confirmation message is encrypted before being uploaded to alliance's chain by the merchant node.
User can upload alliance for relevant transaction data in the future as the evidence traced after carrying out each transaction
Chain is confirmed to trade company, while the confirmation message that merchant node issues also uploads alliance's chain, in retrospect trading situation after sale
When, convenient for tracing to the source and obtaining evidence.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client
It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data
Secrecy.
Specifically, the present embodiment further include:
Access request is issued to the client node.
Wherein, the trading object of the user terminal is determined as according to the access request by the client node
Merchant node.Specifically, access request at least have recorded the account ID of both parties, the pet name, cell-phone number, in alliance's chain
Letter of identity information, this order number traded etc. (for example including the character for indicating businessman and user identity in order number),
It can be used in identifying the identification information of the businessman and user both sides in this transaction.Client node can be according in access request
Identity, determine merchant node corresponding with user terminal in this process of exchange.
It is described to upload encrypted symmetrical code key to alliance's chain, comprising:
S1001, after issuing access request to the client node, the symmetrical code key is carried out by private key for user
Encryption obtains code key data;
S1002, the code key data are uploaded by the client node to alliance's chain.
Wherein, the private key for user is stored in the user terminal.In the present embodiment, user terminal needs to access first
Client node accesses alliance's chain by client node, obtains account of the user terminal in alliance's chain, and obtains user's private
Key and corresponding client public key, wherein private key for user be stored in user terminal local, corresponding client public key then on
Reach alliance's chain.Such as shown in Fig. 2 d, user terminal downloads client app is carried out in alliance's chain by client node
Registration, and obtains private key and certificate, to obtain account of the user terminal in alliance's chain, and obtains private key for user and right therewith
The client public key answered, wherein private key for user is stored in user terminal local, and corresponding client public key is then uploaded to alliance's chain.
After user's operation user terminal buys the commodity of trade company, symmetrical code key is generated at random, is submitted after encrypting transactions data
Onto alliance's chain.Code key data are obtained by private key for user cryptographic symmetrical code key simultaneously, upload to connection also by client node
On alliance's chain.
After merchant node takes transaction data and code key data from alliance's chain, the client public key pair of user terminal is first downloaded
Code key data are decrypted, and obtain symmetrical code key;Again with symmetrical code key decrypted transaction data, the plaintext of transaction data is obtained.Quotient
Family read transaction data plaintext after to transaction data carry out confirmation operation, merchant node generate confirmation message, then by pair
It is submitted on alliance's chain after claiming secret key pair confirmation message to be encrypted.At this point, the save location of symmetrical code key includes at least two:
On user terminal local and alliance's chain, wherein what user terminal locally saved is the plaintext of symmetrical code key, is saved on alliance's chain
Be the private key data obtained after being encrypted by private key for user.
It is as shown in Figure 2 e, when dispute occurs, merchant node can be obtained from alliance's chain encryption transaction data and
Code key data include encrypted symmetrical code key in code key data, to obtain locally identical symmetrically secret with user terminal
Key;User terminal obtains the transaction data of encryption from alliance's chain.Then trade company and user both sides' decrypted transaction data.Wherein,
It ensure that code key data will not be modified by block chain, code key data can be saved in the local account book of multiple trade companies.
Optionally, as shown in figure 2f, merchant node is by symmetrical secret key pair confirmation message after being encrypted, can also be with
Symmetrical code key encrypt and be also uploaded on alliance's chain using the trade company's private key of itself, user terminal can then pass through client
End node downloads the code key data encrypted by trade company from alliance's chain, and trade company's public key is recycled to be decrypted to obtain to code key data
Symmetrical code key.In this process, trade company is used further to the encryption to confirmation message after being updated to symmetrical code key, thus
A sub-symmetry code key is changed, safety is further increased.
Specifically, private key for user described in code key data is stored in the user terminal, use corresponding with the private key for user
Family public key uploads alliance's chain, and the client public key is used for the encryption that the merchant node decrypts the user terminal uploads
Data;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, with trade company's private key
Corresponding trade company's public key uploads alliance's chain, and trade company's public key is used for: described in the node decryption for accessing alliance's chain
The encryption data that merchant node uploads.
In the present embodiment, the client node by alliance's chain, Xiang Suoshu alliance chain upload encrypted friendship
The concrete mode of easy data and symmetrical code key, comprising: after receiving the triggering message that the client node is sent, Xiang Suoshu
Client node uploads encrypted transaction data.
Wherein, after the confirmation message after encryption is uploaded to alliance's chain, the client node is to the use
Family terminal issues triggering message, and confirmation message at this time has already passed through merchant node encryption.I.e. by client after trade company's confirmation
Node notifies user terminal, and user terminal uploads encrypted transaction data to the client node again later.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.Such as: the Xian Xia entity trade company of retail trade forms alliance's chain, each node as independent merchant node
Save complete account book information.With these trade companies carry out off-line transaction user can operate user terminal (such as smart phone,
Tablet computer etc.) application access alliance's chain, and distribute corresponding account.The account of user's application, is not involved in the guarantor of whole account books
It deposits, the transaction data for only saving oneself is local to user terminal.After transaction data is submitted on alliance's chain by user manually, trade company
It comes into force after being confirmed, by block chain technology, by multiple merchant nodes of this synchronizing information alliance chain.
Since there are multiple trade companies to save complete account book for alliance's chain, have recorded businessman's all in alliance's chain in account book
Transaction data can accomplish that transaction data is difficult to be tampered, unless modify the account book information of all trade companies, while user's conduct
Light node, each user terminal is local only to save transaction data involved in the user terminal oneself, to reduce user
The resource occupation of terminal.
It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data all saves the decryption code key of ciphertext as the trade company of both parties and client when being traced
(trade company's private key and private key for user) allows and only checks the plaintext of transaction data as the trade company of both parties and client,
Other trade companies can not check that other trade companies can only view transaction, but cannot view specific information, to reach friendship
The secrecy of easy data.
The verification method of transaction data the embodiment of the invention provides another kind based on block chain, this method specifically can be with
It realizes in the equipment as merchant node in system architecture as shown in Figure 1.
The process realized in merchant node can also specifically be divided into information and upload stage and information source tracing stage.Its
In:
The information upload stage refers to: trade company needs to confirm what user terminal issued when carrying out transaction with user
Transaction data.And to for confirming the confirmation message of the transaction data, carry out encrypting the process for being finally uploaded to alliance's chain;
The information source tracing stage refers to: trade company completes the transaction carried out in the information upload stage with user, transaction
It needs to recall trading situation after the completion of activity, needs to be loaded in information at this time under in alliance's chain and upload what the stage was uploaded
The confirmation message that transaction data and merchant node upload, and be decrypted by symmetrical secret key pair transaction data and confirmation message
To plaintext, to realize processing, the negotiation etc. of the plaintext progress Transaction Disputes of later use transaction data and confirmation message.
It is specific as shown in Figure 3, this method comprises:
The stage is uploaded in information:
S201, acquisition have accessed the transaction data and code key data that the user terminal of alliance's chain issues.
Wherein, the user terminal accesses alliance's chain, the transaction by the client node in alliance's chain
Data are encrypted by user terminal by symmetrical code key, and the client node is used to receive the access of the user terminal.
S202, the symmetrical code key is obtained to the code key data deciphering by client public key, and by described symmetrical secret
The transaction data is decrypted in key.
S203, it generates confirmation message and uploads alliance's chain.
In the information source tracing stage:
S204, the symmetrical code key is obtained from alliance's chain.
S205, it is decrypted by the transaction data of the symmetrical secret key pair confirmation message and the user terminal uploads.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client
It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data
Secrecy.
In the present embodiment, the acquisition in S201 has accessed the transaction data and secret that the user terminal of alliance's chain issues
Key data, specifically include:
S2011 receives the identification information that the client node issues.
S2012 sends feedback information to the client node.
S2013 downloads the transaction data and institute when determining the user terminal is trading object, from alliance's chain
State code key data.
Wherein, the feedback information is or is not trading object for indicating the user terminal.User terminal be or
Person is not that trading object can be judged by trade company, and the equipment for operating merchant node is written in feedback information.
In the present embodiment, confirmation message is generated in S203 and uploads alliance's chain, is specifically included:
S2021, the operation according to the user of merchant node, generate the confirmation message.
S2022, code key data are obtained from alliance's chain, and are decrypted described in the code key data obtain by client public key
Symmetrical code key;
S2023, it is encrypted by confirmation message described in the symmetrical secret key pair and is uploaded to alliance's chain.
Wherein, after the confirmation message after encryption is uploaded to alliance's chain, the client node is to the use
Family terminal issues triggering message, after the user terminal receives the triggering message that the client node is sent, to the visitor
Family end node uploads encrypted transaction data.
In the present embodiment, the symmetrical code key is obtained from alliance's chain described in S204, specifically included:
S2041, code key data are obtained from alliance's chain.
S2042, the code key data are decrypted by client public key obtaining the symmetrical code key, trade company's private key is stored in
The merchant node of alliance's chain.
Wherein, the private key for user is stored in the user terminal, and client public key corresponding with the private key for user uploads
Alliance's chain;Trade company's private key is stored in the merchant node of the trading object as the user terminal, with the trade company
The corresponding trade company's public key of private key uploads alliance's chain, and trade company's public key is used for: accessing the node decryption of alliance's chain
The encryption data that the merchant node uploads.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.Such as: the Xian Xia entity trade company of retail trade forms alliance's chain, each node as independent merchant node
Save complete account book information.With these trade companies carry out off-line transaction user can operate user terminal (such as smart phone,
Tablet computer etc.) application access alliance's chain, and distribute corresponding account.The account of user's application, is not involved in the guarantor of whole account books
It deposits, the transaction data for only saving oneself is local to user terminal.After transaction data is submitted on alliance's chain by user manually, trade company
It comes into force after being confirmed, by block chain technology, by multiple merchant nodes of this synchronizing information alliance chain.
Since there are multiple trade companies to save complete account book for alliance's chain, have recorded businessman's all in alliance's chain in account book
Transaction data can accomplish that transaction data is difficult to be tampered, unless modify the account book information of all trade companies, while user's conduct
Light node, each user terminal is local only to save transaction data involved in the user terminal oneself, to reduce user
The resource occupation of terminal.
It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data all saves the decryption code key of ciphertext as the trade company of both parties and client when being traced
(trade company's private key and private key for user) allows and only checks the plaintext of transaction data as the trade company of both parties and client,
Other trade companies can not check that other trade companies can only view transaction, but cannot view specific information, to reach friendship
The secrecy of easy data.
The embodiment of the present invention provides a kind of user terminal, as shown in Figure 4, comprising:
First uploading module, for by the client node in alliance's chain, Xiang Suoshu alliance chain to upload encrypted friendship
Easy data and symmetrical code key, wherein the transaction data is encrypted by user terminal by the symmetrical code key, the client
End node is used to receive the access of the user terminal.
First enquiry module, for obtaining the symmetrical code key, the transaction data and the confirmation from alliance's chain
Information.
First processing module is decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtains institute
State the plaintext of transaction data and the confirmation message, wherein the confirmation message is existed by the merchant node in alliance's chain
It confirmed to generate after the transaction data, the confirmation message is before being uploaded to alliance's chain, by the merchant node
It is encrypted.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client
It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data
Secrecy.
The embodiment of the present invention provides a kind of equipment for merchant node, as shown in Figure 4, comprising:
Second enquiry module has accessed the transaction data and code key data that the user terminal of alliance's chain issues for obtaining,
Wherein, the user terminal accesses alliance's chain by the client node in alliance's chain, the transaction data by with
Family terminal is encrypted by symmetrical code key, and the client node is used to receive the access of the user terminal, the code key
Data are encrypted by private key for user to the symmetrical code key by the user terminal.
Feedback module for obtaining the symmetrical code key to the code key data deciphering by client public key, and passes through institute
Transaction data described in symmetrical secret key pair is stated to be decrypted.
Second uploading module, for being encrypted the confirmation message of generation and uploading alliance's chain.
Second processing module, for obtaining the symmetrical code key, the transaction data and the confirmation from alliance's chain
Information, and be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtain the transaction data and institute
State the plaintext of confirmation message.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client
It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data
Secrecy.
A kind of verifying system of transaction data based on block chain is also provided in the present embodiment, as illustrated in figure 1 or 4,
The verifying system includes merchant node and client node, merchant node and client node composition in the verifying system
Alliance's chain;
The client node, for receiving the access of user terminal, and after receiving the encryption of the user terminal uploads
Transaction data and symmetrical code key, wherein the transaction data is encrypted by the user terminal by the symmetrical code key;
The merchant node has accessed the transaction data and code key data that the user terminal issues for obtaining, described
Code key data are encrypted by private key for user to the symmetrical code key by the user terminal;
The merchant node is also used to obtain the symmetrical code key to the code key data deciphering by client public key, and
It is decrypted by transaction data described in the symmetrical secret key pair;
The merchant node is also used to generate confirmation message and uploads alliance's chain, and the confirmation message is being uploaded to
Before alliance's chain, encrypted by the merchant node;
The merchant node is also used to obtain the symmetrical code key from alliance's chain, and passes through the symmetrical secret key pair
The transaction data of the confirmation message and the user terminal uploads is decrypted, and the user terminal then passes through described symmetrical secret
The transaction data and confirmation message is decrypted in key, obtains the plaintext of the transaction data and the confirmation message.
Specifically, the private key for user is stored in the user terminal, on client public key corresponding with the private key for user
Alliance's chain is passed, the client public key is used for the encryption data that the merchant node decrypts the user terminal uploads;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, corresponding with trade company's private key
Trade company's public key upload alliance's chain, trade company's public key is used for: accessing trade company described in the node decryption of alliance's chain
The encryption data that node uploads.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user,
It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale
Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously
Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client
It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data
Secrecy.
The above-mentioned integrated module realized in the form of software function module, can store and computer-readable deposit at one
In storage media.Above-mentioned software function module is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the portion of each embodiment the method for the present invention
Step by step.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, abbreviation
ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc. are various can store
The medium of program code.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality
For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method
Part explanation.The above description is merely a specific embodiment, but protection scope of the present invention is not limited to
This, anyone skilled in the art in the technical scope disclosed by the present invention, the variation that can readily occur in or replaces
It changes, should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claim
Subject to enclosing.
Claims (12)
1. a kind of verification method of the transaction data based on block chain characterized by comprising
By the client node in alliance's chain, Xiang Suoshu alliance chain uploads encrypted transaction data and symmetrical code key, wherein
The transaction data is encrypted by user terminal by the symmetrical code key, and the client node is for receiving the user
The access of terminal;
Be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtain the transaction data and it is described really
Recognize the plaintext of information, wherein the confirmation message is to confirmed the transaction data by the merchant node in alliance's chain
It generates afterwards, the confirmation message is encrypted before being uploaded to alliance's chain by the merchant node.
2. the method according to claim 1, wherein further include:
Access request is issued to the client node, wherein by the client node according to the access request, is determined and is made
For the merchant node of the trading object of the user terminal;
It is described to upload encrypted symmetrical code key to alliance's chain, comprising: to issue access request to the client node
Afterwards, the symmetrical code key is encrypted to obtain code key data by private key for user;
The code key data are uploaded by the client node to alliance's chain.
3. method according to claim 1 or 2, which is characterized in that the client node by alliance's chain, to institute
It states alliance's chain and uploads encrypted transaction data, comprising:
After receiving the triggering message that the client node is sent, Xiang Suoshu client node uploads encrypted number of deals
According to, wherein after the confirmation message after encryption is uploaded to alliance's chain, the client node is to the user terminal
Issue triggering message.
4. the method according to claim 1, wherein the private key for user is stored in the user terminal, with institute
It states the corresponding client public key of private key for user and uploads alliance's chain, the client public key is used for described in the merchant node decryption
The encryption data of user terminal uploads;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, corresponding with trade company's private key
Trade company's public key upload alliance's chain, trade company's public key is used for: accessing trade company described in the node decryption of alliance's chain
The encryption data that node uploads.
5. a kind of verification method of the transaction data based on block chain characterized by comprising
Obtain the transaction data and code key data for having accessed that the user terminal of alliance's chain issues, wherein the user terminal passes through
Client node in alliance's chain accesses alliance's chain, and the transaction data is carried out by user terminal by symmetrical code key
Encryption, the client node are used to receive the access of the user terminal, and the code key data are led to by the user terminal
Cross what private key for user encrypted the symmetrical code key;
The symmetrical code key is obtained to the code key data deciphering by client public key, and by handing over described in the symmetrical secret key pair
Easy data are decrypted;
It generates confirmation message and uploads alliance's chain;
The symmetrical code key is obtained from alliance's chain, and whole by confirmation message described in the symmetrical secret key pair and the user
The transaction data that end uploads is decrypted.
6. according to the method described in claim 5, it is characterized in that, what the user terminal that the acquisition has accessed alliance's chain issued
Transaction data and code key data, comprising:
Receive the identification information that the client node issues;
To the client node send feedback information, the feedback information for indicate the user terminal be or be not hand over
Easy object;
When determining the user terminal is trading object, the transaction data and the code key number are downloaded from alliance's chain
According to.
7. according to the method described in claim 6, wrapping it is characterized in that, the generation confirmation message and upload alliance's chain
It includes:
According to the operation of the user of merchant node, the confirmation message is generated;
It is encrypted by confirmation message described in the symmetrical secret key pair and is uploaded to alliance's chain, wherein after encryption
After the confirmation message is uploaded to alliance's chain, the client node issues triggering message to the user terminal, described
After user terminal receives the triggering message that the client node is sent, Xiang Suoshu client node uploads encrypted transaction
Data.
8. the method according to any one of claim 5-7, which is characterized in that described from described in alliance's chain acquisition
Symmetrical code key, comprising:
Obtain code key data from alliance's chain, and by the client public key decrypt the code key data obtain it is described symmetrically secret
Key;
Wherein, the private key for user is stored in the user terminal, described in client public key upload corresponding with the private key for user
Alliance's chain;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, corresponding with trade company's private key
Trade company's public key upload alliance's chain, trade company's public key is used for: accessing trade company described in the node decryption of alliance's chain
The encryption data that node uploads.
9. a kind of user terminal characterized by comprising
First uploading module, for by the client node in alliance's chain, Xiang Suoshu alliance chain to upload encrypted number of deals
According to symmetrical code key, wherein the transaction data is encrypted by user terminal by the symmetrical code key, client's end segment
Put the access for receiving the user terminal;
First enquiry module, for obtaining the symmetrical code key, the transaction data and the confirmation message from alliance's chain;
First processing module is decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtains the friendship
The plaintext of easy data and the confirmation message, wherein the confirmation message is being confirmed by the merchant node in alliance's chain
It is generated after the transaction data, the confirmation message carries out before being uploaded to alliance's chain by the merchant node
Encryption.
10. a kind of equipment for merchant node characterized by comprising
Second enquiry module has accessed the transaction data and code key data that the user terminal of alliance's chain issues for obtaining, wherein
The user terminal accesses alliance's chain by the client node in alliance's chain, and the transaction data is by user terminal
It is encrypted by symmetrical code key, the client node is used to receive the access of the user terminal, and the code key data are
The symmetrical code key is encrypted by private key for user by the user terminal;
Feedback module, for obtaining the symmetrical code key to the code key data deciphering by client public key, and by described right
Transaction data described in secret key pair is claimed to be decrypted;
Second uploading module, for being encrypted the confirmation message of generation and uploading alliance's chain;
Second processing module, for obtaining the symmetrical code key, the transaction data and the confirmation message from alliance's chain,
And be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtain the transaction data and the confirmation
The plaintext of information.
11. a kind of verifying system of the transaction data based on block chain, which is characterized in that the verifying system includes merchant node
And client node, merchant node and client node in the verifying system form alliance's chain;
The client node for receiving the access of user terminal, and receives the encrypted friendship of the user terminal uploads
Easy data and symmetrical code key, wherein the transaction data is encrypted by the user terminal by the symmetrical code key;
The merchant node has accessed the transaction data and code key data that the user terminal issues, the code key for obtaining
Data are encrypted by private key for user to the symmetrical code key by the user terminal;
The merchant node is also used to obtain the symmetrical code key to the code key data deciphering by client public key, and passes through
Transaction data described in the symmetrical secret key pair is decrypted;
The merchant node is also used to generate confirmation message and uploads alliance's chain, the confirmation message be uploaded to it is described
Before alliance's chain, encrypted by the merchant node;
The merchant node is also used to obtain the symmetrical code key from alliance's chain, and by described in the symmetrical secret key pair
The transaction data of confirmation message and the user terminal uploads is decrypted, and the user terminal then passes through the symmetrical secret key pair
The transaction data and confirmation message are decrypted, and obtain the plaintext of the transaction data and the confirmation message.
12. verifying system according to claim 11, which is characterized in that it is whole that the private key for user is stored in the user
End, client public key corresponding with the private key for user upload alliance's chain, and the client public key is used for the merchant node
Decrypt the encryption data of the user terminal uploads;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, quotient corresponding with trade company's private key
Family public key uploads alliance's chain, and trade company's public key is used for: accessing merchant node described in the node decryption of alliance's chain
The encryption data of upload.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811276380.6A CN109523267A (en) | 2018-10-30 | 2018-10-30 | A kind of verification method, the apparatus and system of the transaction data based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811276380.6A CN109523267A (en) | 2018-10-30 | 2018-10-30 | A kind of verification method, the apparatus and system of the transaction data based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109523267A true CN109523267A (en) | 2019-03-26 |
Family
ID=65774063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811276380.6A Pending CN109523267A (en) | 2018-10-30 | 2018-10-30 | A kind of verification method, the apparatus and system of the transaction data based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109523267A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188138A (en) * | 2019-04-25 | 2019-08-30 | 阿里巴巴集团控股有限公司 | Data synchronous system, method, apparatus and electronic equipment based on alliance's chain |
CN110245945A (en) * | 2019-05-20 | 2019-09-17 | 阿里巴巴集团控股有限公司 | In conjunction with the receipt storage method and node of code mark and user type |
CN110955909A (en) * | 2019-10-12 | 2020-04-03 | 四川九洲电器集团有限责任公司 | Personal data protection method and block link point |
CN111523895A (en) * | 2020-05-06 | 2020-08-11 | 杭州复杂美科技有限公司 | Data delay publishing method, device and storage medium |
CN111598574A (en) * | 2020-05-12 | 2020-08-28 | 江苏大学 | Intelligent service transaction oriented supervision method and supervision interface |
CN112001717A (en) * | 2020-10-27 | 2020-11-27 | 四川泰立科技股份有限公司 | Method, system and storage medium for calculating encryption currency of digital television |
CN112307500A (en) * | 2020-11-02 | 2021-02-02 | 杭州甘道智能科技有限公司 | Block chain-based vaccine circulation data encryption device and method |
CN112418850A (en) * | 2019-08-21 | 2021-02-26 | 中国移动通信有限公司研究院 | Transaction method and device based on block chain and electronic equipment |
CN112633858A (en) * | 2021-01-05 | 2021-04-09 | 润联软件系统(深圳)有限公司 | Process approval processing method and system |
CN112685780A (en) * | 2020-12-31 | 2021-04-20 | 杭州链化洞察科技有限公司 | Data encryption and decryption method based on block chain |
US10984417B2 (en) | 2019-04-25 | 2021-04-20 | Advanced New Technologies Co., Ltd. | Blockchain-based data synchronization system, method, apparatus, and electronic device |
CN112818412A (en) * | 2021-01-25 | 2021-05-18 | 重庆川仪自动化股份有限公司 | Block chain-based equipment data access method and system |
CN113378192A (en) * | 2021-06-02 | 2021-09-10 | 浙江数秦科技有限公司 | Alliance link data encryption method |
CN113657972A (en) * | 2021-08-31 | 2021-11-16 | 卓尔智联(武汉)研究院有限公司 | Article transaction method based on block chain, computer device and storage medium |
CN113761543A (en) * | 2020-06-01 | 2021-12-07 | 菜鸟智能物流控股有限公司 | Data processing method, device, equipment and machine readable medium based on alliance chain |
EP4156072A4 (en) * | 2020-05-19 | 2024-05-29 | Jingdong Technology Information Technology Co., Ltd. | Transaction tracing method and apparatus based on blockchain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529951A (en) * | 2016-12-30 | 2017-03-22 | 杭州云象网络技术有限公司 | Node consensus verification method under league chain network through asynchronous mode |
CN108200079A (en) * | 2018-01-19 | 2018-06-22 | 深圳四方精创资讯股份有限公司 | Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption |
CN108566375A (en) * | 2018-03-12 | 2018-09-21 | 深圳壹账通智能科技有限公司 | The method, terminal and storage medium of message communicating between multiterminal based on block chain |
-
2018
- 2018-10-30 CN CN201811276380.6A patent/CN109523267A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529951A (en) * | 2016-12-30 | 2017-03-22 | 杭州云象网络技术有限公司 | Node consensus verification method under league chain network through asynchronous mode |
CN108200079A (en) * | 2018-01-19 | 2018-06-22 | 深圳四方精创资讯股份有限公司 | Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption |
CN108566375A (en) * | 2018-03-12 | 2018-09-21 | 深圳壹账通智能科技有限公司 | The method, terminal and storage medium of message communicating between multiterminal based on block chain |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188138A (en) * | 2019-04-25 | 2019-08-30 | 阿里巴巴集团控股有限公司 | Data synchronous system, method, apparatus and electronic equipment based on alliance's chain |
US10984417B2 (en) | 2019-04-25 | 2021-04-20 | Advanced New Technologies Co., Ltd. | Blockchain-based data synchronization system, method, apparatus, and electronic device |
CN110245945A (en) * | 2019-05-20 | 2019-09-17 | 阿里巴巴集团控股有限公司 | In conjunction with the receipt storage method and node of code mark and user type |
CN112418850A (en) * | 2019-08-21 | 2021-02-26 | 中国移动通信有限公司研究院 | Transaction method and device based on block chain and electronic equipment |
CN110955909A (en) * | 2019-10-12 | 2020-04-03 | 四川九洲电器集团有限责任公司 | Personal data protection method and block link point |
CN111523895A (en) * | 2020-05-06 | 2020-08-11 | 杭州复杂美科技有限公司 | Data delay publishing method, device and storage medium |
CN111598574A (en) * | 2020-05-12 | 2020-08-28 | 江苏大学 | Intelligent service transaction oriented supervision method and supervision interface |
EP4156072A4 (en) * | 2020-05-19 | 2024-05-29 | Jingdong Technology Information Technology Co., Ltd. | Transaction tracing method and apparatus based on blockchain |
CN113761543A (en) * | 2020-06-01 | 2021-12-07 | 菜鸟智能物流控股有限公司 | Data processing method, device, equipment and machine readable medium based on alliance chain |
CN113761543B (en) * | 2020-06-01 | 2024-04-02 | 菜鸟智能物流控股有限公司 | Data processing method, device, equipment and machine-readable medium based on alliance chain |
CN112001717A (en) * | 2020-10-27 | 2020-11-27 | 四川泰立科技股份有限公司 | Method, system and storage medium for calculating encryption currency of digital television |
CN112307500A (en) * | 2020-11-02 | 2021-02-02 | 杭州甘道智能科技有限公司 | Block chain-based vaccine circulation data encryption device and method |
CN112685780A (en) * | 2020-12-31 | 2021-04-20 | 杭州链化洞察科技有限公司 | Data encryption and decryption method based on block chain |
CN112633858A (en) * | 2021-01-05 | 2021-04-09 | 润联软件系统(深圳)有限公司 | Process approval processing method and system |
CN112818412A (en) * | 2021-01-25 | 2021-05-18 | 重庆川仪自动化股份有限公司 | Block chain-based equipment data access method and system |
CN113378192B (en) * | 2021-06-02 | 2022-06-10 | 浙江数秦科技有限公司 | Alliance link data encryption method |
CN113378192A (en) * | 2021-06-02 | 2021-09-10 | 浙江数秦科技有限公司 | Alliance link data encryption method |
CN113657972A (en) * | 2021-08-31 | 2021-11-16 | 卓尔智联(武汉)研究院有限公司 | Article transaction method based on block chain, computer device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109523267A (en) | A kind of verification method, the apparatus and system of the transaction data based on block chain | |
CN107403303B (en) | Signing method of electronic contract system based on block chain deposit certificate | |
Ramana et al. | A three-level gateway protocol for secure m-commerce transactions using encrypted OTP | |
CN108564353A (en) | Payment system based on block chain and method | |
CN101459517B (en) | B2b data exchange system | |
CN106452775A (en) | Method and apparatus for accomplishing electronic signing and signing server | |
US20180047011A1 (en) | Authentication system | |
CA2808369A1 (en) | System for protecting an encrypted information unit | |
CN101262332A (en) | Method and system for mutual authentication between mobile and host devices | |
CN108965228B (en) | Dispute relief system with KYC data mark of multiple keys and method thereof | |
CN112685760A (en) | Financial data privacy processing and sharing method capable of authorizing on block chain | |
CN105022966A (en) | Database data encryption and decryption method and system | |
CN102801730A (en) | Information protection method and device for communication and portable devices | |
Shedid et al. | Modified SET protocol for mobile payment: an empirical analysis | |
CN109241754A (en) | A kind of cloud file data de-duplication method based on block chain | |
CN100530028C (en) | Method and system for controlling the disclosure time of information | |
Khan et al. | Buyer seller watermarking protocols issues and challenges–a survey | |
KR20130021774A (en) | Method for providing security service based on digital certificate and system for providing security service based on digital certificate | |
Kisore et al. | A secure SMS protocol for implementing digital cash system | |
KR20060130312A (en) | A method and system thereof for delivery of issuer's key to a smart card chip issued by multi-institutions | |
CN106779645B (en) | Information encryption method and device | |
Chang et al. | Secure electronic coupons | |
CN115941773A (en) | Project transaction method, system, terminal device and medium based on cloud service sharing | |
TWI430643B (en) | Secure key recovery system and method | |
CN115423455A (en) | Method for creating anonymous transaction on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190326 |
|
RJ01 | Rejection of invention patent application after publication |