CN109523267A - A kind of verification method, the apparatus and system of the transaction data based on block chain - Google Patents

A kind of verification method, the apparatus and system of the transaction data based on block chain Download PDF

Info

Publication number
CN109523267A
CN109523267A CN201811276380.6A CN201811276380A CN109523267A CN 109523267 A CN109523267 A CN 109523267A CN 201811276380 A CN201811276380 A CN 201811276380A CN 109523267 A CN109523267 A CN 109523267A
Authority
CN
China
Prior art keywords
chain
alliance
user terminal
key
transaction data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811276380.6A
Other languages
Chinese (zh)
Inventor
夏亮
张明喜
杨洋
刘燚
邵君宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suningcom Group Co Ltd
Original Assignee
Suningcom Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suningcom Group Co Ltd filed Critical Suningcom Group Co Ltd
Priority to CN201811276380.6A priority Critical patent/CN109523267A/en
Publication of CN109523267A publication Critical patent/CN109523267A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Software Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention discloses verification method, the apparatus and systems of a kind of transaction data based on block chain; it is related to field of computer technology; the retrospect of transaction can be solved the problems, such as using alliance's chain and encryption principle; and transaction data uploads alliance's chain; data can not be tampered; protecting the interests of user to invent includes: by the client node in alliance's chain; encrypted transaction data and symmetrical code key are uploaded to alliance's chain; wherein; transaction data is encrypted by user terminal by symmetrical code key, and client node is used to receive the access of user terminal;It is decrypted by symmetrical secret key pair transaction data and confirmation message, obtain the plaintext of transaction data and confirmation message, wherein confirmation message is generated after it confirmed transaction data by the merchant node in alliance's chain, confirmation message is encrypted before being uploaded to alliance's chain by merchant node.The present invention is suitable for for alliance's chain being applied to the preservation of Transaction Information.

Description

A kind of verification method, the apparatus and system of the transaction data based on block chain
Technical field
The present invention relates to field of computer technology more particularly to a kind of verification method of the transaction data based on block chain, Apparatus and system.
Background technique
Currently, online trading market rapid expanding, traditional off-line transaction mode receives great impact, is especially handing over Easy data record this aspect, off-line transaction process cannot not there are problems that traceablely and transaction data is easy to be tampered.
Such as after user buys commodity, due to the behaviors such as the loss of purchase invoice or trade company's denial, cause to use Family has no basis when carrying out after-sale service;It says for another example, after customer buys member card or supplements with money, trade company passes through backstage The system modification account amount of money causes the loss of user's amount of money, and power of interpretation is usually all in trade company.
Therefore, off-line transaction process cannot not there are problems that traceablely and transaction data is easy to be tampered, and becomes and causes customer The problem of right-safeguarding difficulty.
Summary of the invention
The embodiment of the present invention provides verification method, the apparatus and system of a kind of transaction data based on block chain, utilizes Alliance's chain and encryption principle solve the problems, such as the retrospect of transaction, and transaction data uploads alliance's chain, and data can not be tampered, protect The interests of user.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
On the one hand, user terminal uploads the stage in information, by the client node in alliance's chain, on Xiang Suoshu alliance chain Passing encrypted transaction data and symmetrical code key wherein, the transaction data is encrypted by user terminal by symmetrical code key, The client node is used to receive the access of the user terminal;
In the information source tracing stage, the symmetrical code key is uploaded to alliance's chain;By trading described in the symmetrical secret key pair Data and confirmation message are decrypted, and obtain the plaintext of the transaction data and the confirmation message, wherein the confirmation message It is to be generated after it confirmed the transaction data by the merchant node in alliance's chain, the confirmation message is being uploaded to Before stating alliance's chain, encrypted by the merchant node.
On the other hand, merchant node uploads the stage in information, obtains and has accessed the transaction that the user terminal of alliance's chain issues Data and code key data, the user terminal access alliance's chain wherein by the client node in alliance's chain, institute It states transaction data and is encrypted by user terminal by symmetrical code key, the client node is for receiving the user terminal Access;The symmetrical code key is obtained to the code key data deciphering by client public key, and by described in the symmetrical secret key pair Transaction data is decrypted, and generates confirmation message later, and encrypted by confirmation message described in the symmetrical secret key pair;It will The encrypted confirmation message uploads alliance's chain;
In the information source tracing stage: obtaining the symmetrical code key from alliance's chain, and pass through the symmetrical secret key pair confirmation The transaction data of information and the user terminal uploads is decrypted.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data Secrecy.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is system architecture schematic diagram provided in an embodiment of the present invention;
Fig. 2 a is the use schematic illustration of the asymmetric code key in a kind of alliance's chain provided in an embodiment of the present invention;
Fig. 2 b is a kind of method flow schematic diagram provided in an embodiment of the present invention;
Fig. 2 c, Fig. 2 d, Fig. 2 e, the interaction flow schematic diagram that Fig. 2 f is specific example provided in an embodiment of the present invention;
Fig. 3 is another method flow schematic diagram provided in an embodiment of the present invention;
Fig. 4 is apparatus structure schematic diagram provided in an embodiment of the present invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, with reference to the accompanying drawing and specific embodiment party Present invention is further described in detail for formula.Embodiments of the present invention are described in more detail below, the embodiment is shown Example is shown in the accompanying drawings, and in which the same or similar labels are throughly indicated same or similar element or has identical or class Like the element of function.It is exemplary below with reference to the embodiment of attached drawing description, for explaining only the invention, and cannot It is construed to limitation of the present invention.Those skilled in the art of the present technique are appreciated that unless expressly stated, odd number shape used herein Formula " one ", "one", " described " and "the" may also comprise plural form.It is to be further understood that specification of the invention Used in wording " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that In the presence of or add other one or more features, integer, step, operation, element, component and/or their group.It should be understood that When we say that an element is " connected " or " coupled " to another element, it can be directly connected or coupled to other elements, or There may also be intermediary elements.In addition, " connection " used herein or " coupling " may include being wirelessly connected or coupling.Here make Wording "and/or" includes one or more associated any cells for listing item and all combinations.The art Technical staff is appreciated that unless otherwise defined all terms (including technical terms and scientific terms) used herein have Meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.It should also be understood that such as general Those terms, which should be understood that, defined in dictionary has a meaning that is consistent with the meaning in the context of the prior art, and Unless defined as here, it will not be explained in an idealized or overly formal meaning.
Method provided in an embodiment of the present invention is mainly used for realizing the preservation and verifying for carrying out transaction data using block chain. As shown in Figure 1, be a kind of system architecture diagram for realizing method provided in an embodiment of the present invention provided in an embodiment of the present invention, It include: user terminal, client node and merchant node, wherein client node and merchant node form alliance's chain, client Node is used to receive the access of user terminal, so that user terminal accesses alliance's chain by client node, but user is whole simultaneously End is again not as a formal node in alliance's chain, to avoid occupying the hardware resource of user terminal.
User terminal disclosed in the present embodiment can specifically be made into an independent device in fact, or be integrated in various differences Media data playing device in, such as smart phone, smart television, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), multimedia player, digital camera, personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID), set-top box etc..
Alliance's chain belongs to a kind of application of block chain technology, generally comprises multiple nodes in alliance's chain, in each node It is stored with block chain (Block Chain), block chain includes multiple blocks (Block), and each block includes block chain data Previous block-identified, the generation Block time of middle link and affairs, each block is for storing several affairs, in this hair In bright embodiment, affairs include having recorded the account books of each transaction data (transaction data recorded in account book all having passed through friendship Easy both sides are encrypted in symmetrical code key that this transaction always uses), the corresponding symmetrical code key of each transaction, wherein it is every The corresponding symmetrical code key of one transaction can be set by the user side in both parties, such as symmetrical secret by user terminal generation Key, then the symmetrical code key is encrypted to obtain code key data by private key for user by user terminal, code key data are led to later It crosses client node and uploads alliance's chain, the merchant node traded only need to can be to code key by the client public key of user terminal Data are decrypted to obtain symmetrical code key.
In the present embodiment, client node and merchant node specifically can be implemented as currently used hardware device, In, the hardware device for having certain data-handling capacity can be used as merchant node, such as: merchant node refers specifically to set Set the individual of server in each trade company, the server cluster system, work station or the small trade company that are made of multiple servers Computer etc..
The hardware device for having stronger data-handling capacity can be used as client node, in practical applications client Node needs while handling the access of multiple user terminals, and common client node can be implemented as existing on the market at present Server or the server cluster system that is made of multiple servers.
In the present embodiment, alliance's chain can be built based on fabric, each trade company provides hardware device as participation connection The merchant node of alliance's chain saves the account book of all trade companies based on alliance's chain;User terminal runs client, accesses client therein End node, and transaction data is cached, it can both guarantee that the multicenter characteristic of alliance's chain is also protected so that data are not tampered in this way Data pressure will not be generated by having demonstrate,proved client.
Specifically, the node of each access alliance's chain can distribute one in the alliance's chain built based on fabric technology To code key, this pair of of code key includes private key and corresponding public key.And it is set in the agreement of alliance's chain, private key is used The data that upload of needs are encrypted in each node, corresponding public key is then used for other nodes to having uploaded alliance's chain Encryption data be decrypted.Specifically, the alliance's chain set up in the present embodiment, as long as node is uploaded to alliance's chain Also all each node can be downloaded arbitrarily for data, the ciphertext being entirely encrypted, while these ciphertexts, because of block chain In all node preserve account book data.Public key and private key distribute in pairs, i.e., each node is in successful registration And after accessing alliance's chain, a public key and a corresponding private key will be assigned, it should be noted that here to each Node distributes the concrete mode of " public-private key ", can be node access alliance's chain, and enrollment status simultaneously obtains corresponding certificate Afterwards, it locally oneself is calculated based on the code key generating algorithm in certificate in node, the private key being calculated is stored in node sheet Ground, and public key then uploads alliance's chain, such as: merchant node generates the trade company's private key and therewith of oneself after accessing alliance's chain Trade company's public key is uploaded alliance's chain later by corresponding trade company's public key;And user terminal is then to access alliance by client node Chain, user terminal not as alliance's chain a node, but from client node downloading alliance's chain certificate and generate use Family private key and corresponding client public key, then client public key is uploaded to alliance's chain by client node, and private key for user It is stored in user terminal local.This formal node not as alliance's chain of user terminal accesses, but still obtains in alliance's chain Identity and distribution " public-private key " mode, can be referred to as " light node ".
In the present embodiment, " public-private key " of each node distribution, it is understood that be a kind of asymmetric code key, example As: shown in Fig. 2 a, private key A- public key A is generated after A node access alliance's chain in alliance's chain, wherein private key A is stored in node The local of A, public key A upload alliance's chain.A node encrypts data by private key A, and encryption data is uploaded, Zhi Houtong Know B node;B node downloads the public key A and encryption data of A node, and decrypts encryption data with public key A, obtains data clear text.I.e. The data of public key encryption are decrypted by corresponding private key, and the data of private key encryption are by corresponding public key decryptions, public affairs Key-private key is asymmetric code key, and the code key of enciphering/deciphering is different.
In the present embodiment, to being symmetrical code key used by encrypted transaction data, symmetrical code key refers to identical Code key * 2, it is the same to the code key of transaction data encryption and decryption.In the present embodiment, symmetrical code key is generated by user terminal, is used Trade company's public key of family terminal merchant node encrypts symmetrical code key, or by the trade company of client node merchant node Public key encrypts symmetrical code key, in a word by the symmetrical code key of trade company's public key encryption, i.e., as the code key data,
Code key data are uploaded to alliance's chain later, merchant node downloads code key data, and merchant node is recycled locally to deposit Trade company's private key decryption code key data of storage obtain symmetrical code key.Generally speaking, in the present embodiment, it is encrypted and is handed over by symmetrical code key Alliance's chain is uploaded after easy data, then uploads alliance's chain after the symmetrical code key of public key encryption for passing through node.
The embodiment of the present invention provides a kind of verification method of transaction data based on block chain, and this method specifically may be implemented On the user terminal in system architecture as shown in Figure 1.Such as: client-side program can be installed on user terminal, and run Client-side program access client node, and from data information needed for client node acquisition access alliance's chain, such as: user For terminal by app, network etc. obtains the private key for user of alliance's chain distribution and the certificate of alliance's chain in the Node registry.
The process realized on the subscriber terminal can specifically be divided into information and upload stage and information source tracing stage.Wherein:
The information upload stage refers to: user passes through operation user terminal and generates phase when carrying out transaction with trade company The transaction data answered, and transaction data encrypt the process for being finally uploaded to alliance's chain;
The information source tracing stage refers to: user completes the transaction carried out in the information upload stage with trade company, transaction It needs to recall trading situation after the completion of activity, needs to be loaded in information at this time under in alliance's chain and upload what the stage was uploaded The confirmation message that transaction data and merchant node upload, and be decrypted by symmetrical secret key pair transaction data and confirmation message To plaintext, to realize processing, the negotiation etc. of the plaintext progress Transaction Disputes of later use transaction data and confirmation message.
It is specific as shown in Figure 2 b, this method comprises:
S101, the stage is uploaded in information, by the client node in alliance's chain, Xiang Suoshu alliance chain uploads encrypted Transaction data and symmetrical code key.
Wherein, the transaction data is encrypted by user terminal by symmetrical code key, and the client node is used In the access for receiving the user terminal.In the present embodiment, the node of composition alliance's chain has included at least 2 seed types: client Node and merchant node, such as: alliance's chain includes multiple merchant nodes and at least one client node.Merchant node can be with As the ordinary node for the chain that coalizes, client node is a kind of special joint of alliance's chain, the use for the chain that do not coalize Family (in actual application, these users would generally have trading activity with the trade company for the chain that coalizes) can be by operation certainly Oneself user terminal accesses the client node, such as: by the app run on user terminal, by network in client's end segment Point registration, and obtain the certificate of private key for user and alliance's chain.
In the present embodiment, user terminal is not intended as a node in alliance's chain, does not protect locally in user terminal The account book in alliance's chain is deposited, the account book in alliance's chain is only stored in merchant node and client node.In every user and quotient In the transaction at family, user terminal locally generates transaction data, and transaction data can specifically include: the disbursement letter generated in transaction The particular content of the data such as breath, the photo of commodity, merchandise news, transaction data can be set according to specific application scenarios, This is not repeated them here.
In the present embodiment, user terminal can use symmetrical secret key pair transaction data and be encrypted.Institute in the present embodiment The symmetric key stated, and be properly termed as private key or shared key, that is, send and receive data both sides must use it is identical Operation is encrypted and decrypted in key pair in plain text.Symmetric key encryption algorithm specifically includes that DES (Data Encryption Standard, data encryption standards), 3DES (or be Triple DES, be triple data encryption algorithm (TDEA, Triple Data Encryption Algorithm) block encryption common name), IDEA (International Data Encryption Algorithm, international data encryption algorithm), FEAL (Fast Data Encipherment Algorithm, a set of similar beauty The block encryption algorithm of state DES), BLOWFISH (being Bruce Shi Naier in the block encryption algorithm of exploitation in 1993) etc.).
S102, in the information source tracing stage, be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, Obtain the plaintext of the transaction data and the confirmation message.
Wherein, symmetrical code key used in user and trade company both sides during each transaction, all upload alliance's chain, so as to In obtaining symmetrical code key from alliance's chain using respective private key in information source tracing stage merchant node and user terminal.Symmetrical secret Key needs to be encrypted before uploading alliance's chain.
What user terminal and merchant node were directly acquired from alliance's chain is code key data, and code key data are to pass through private key for user It is obtained after being encrypted to symmetrical code key.Such as: as shown in Figure 2 c, symmetrical code key is local with unencryption in user terminal The form of plaintext stores, and user terminal encrypts symmetrical code key by private key for user to upload alliance's chain after obtaining code key data.? Trade company is clearly the user known as counterpart in process of exchange, therefore merchant node is according to the identity mark of user terminal Know (such as: the pet name, account ID, cell-phone number, order number of this transaction etc. can be used in identifying one side of user in this transaction Identification information), download the client public key of the user terminal from alliance's chain, merchant node utilizes user after obtaining code key data Public key is decrypted code key data to obtain symmetrical code key.
Wherein, the confirmation message is generated after it confirmed the transaction data by the merchant node in alliance's chain 's.The confirmation message is encrypted before being uploaded to alliance's chain by the merchant node.
User can upload alliance for relevant transaction data in the future as the evidence traced after carrying out each transaction Chain is confirmed to trade company, while the confirmation message that merchant node issues also uploads alliance's chain, in retrospect trading situation after sale When, convenient for tracing to the source and obtaining evidence.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data Secrecy.
Specifically, the present embodiment further include:
Access request is issued to the client node.
Wherein, the trading object of the user terminal is determined as according to the access request by the client node Merchant node.Specifically, access request at least have recorded the account ID of both parties, the pet name, cell-phone number, in alliance's chain Letter of identity information, this order number traded etc. (for example including the character for indicating businessman and user identity in order number), It can be used in identifying the identification information of the businessman and user both sides in this transaction.Client node can be according in access request Identity, determine merchant node corresponding with user terminal in this process of exchange.
It is described to upload encrypted symmetrical code key to alliance's chain, comprising:
S1001, after issuing access request to the client node, the symmetrical code key is carried out by private key for user Encryption obtains code key data;
S1002, the code key data are uploaded by the client node to alliance's chain.
Wherein, the private key for user is stored in the user terminal.In the present embodiment, user terminal needs to access first Client node accesses alliance's chain by client node, obtains account of the user terminal in alliance's chain, and obtains user's private Key and corresponding client public key, wherein private key for user be stored in user terminal local, corresponding client public key then on Reach alliance's chain.Such as shown in Fig. 2 d, user terminal downloads client app is carried out in alliance's chain by client node Registration, and obtains private key and certificate, to obtain account of the user terminal in alliance's chain, and obtains private key for user and right therewith The client public key answered, wherein private key for user is stored in user terminal local, and corresponding client public key is then uploaded to alliance's chain.
After user's operation user terminal buys the commodity of trade company, symmetrical code key is generated at random, is submitted after encrypting transactions data Onto alliance's chain.Code key data are obtained by private key for user cryptographic symmetrical code key simultaneously, upload to connection also by client node On alliance's chain.
After merchant node takes transaction data and code key data from alliance's chain, the client public key pair of user terminal is first downloaded Code key data are decrypted, and obtain symmetrical code key;Again with symmetrical code key decrypted transaction data, the plaintext of transaction data is obtained.Quotient Family read transaction data plaintext after to transaction data carry out confirmation operation, merchant node generate confirmation message, then by pair It is submitted on alliance's chain after claiming secret key pair confirmation message to be encrypted.At this point, the save location of symmetrical code key includes at least two: On user terminal local and alliance's chain, wherein what user terminal locally saved is the plaintext of symmetrical code key, is saved on alliance's chain Be the private key data obtained after being encrypted by private key for user.
It is as shown in Figure 2 e, when dispute occurs, merchant node can be obtained from alliance's chain encryption transaction data and Code key data include encrypted symmetrical code key in code key data, to obtain locally identical symmetrically secret with user terminal Key;User terminal obtains the transaction data of encryption from alliance's chain.Then trade company and user both sides' decrypted transaction data.Wherein, It ensure that code key data will not be modified by block chain, code key data can be saved in the local account book of multiple trade companies.
Optionally, as shown in figure 2f, merchant node is by symmetrical secret key pair confirmation message after being encrypted, can also be with Symmetrical code key encrypt and be also uploaded on alliance's chain using the trade company's private key of itself, user terminal can then pass through client End node downloads the code key data encrypted by trade company from alliance's chain, and trade company's public key is recycled to be decrypted to obtain to code key data Symmetrical code key.In this process, trade company is used further to the encryption to confirmation message after being updated to symmetrical code key, thus A sub-symmetry code key is changed, safety is further increased.
Specifically, private key for user described in code key data is stored in the user terminal, use corresponding with the private key for user Family public key uploads alliance's chain, and the client public key is used for the encryption that the merchant node decrypts the user terminal uploads Data;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, with trade company's private key Corresponding trade company's public key uploads alliance's chain, and trade company's public key is used for: described in the node decryption for accessing alliance's chain The encryption data that merchant node uploads.
In the present embodiment, the client node by alliance's chain, Xiang Suoshu alliance chain upload encrypted friendship The concrete mode of easy data and symmetrical code key, comprising: after receiving the triggering message that the client node is sent, Xiang Suoshu Client node uploads encrypted transaction data.
Wherein, after the confirmation message after encryption is uploaded to alliance's chain, the client node is to the use Family terminal issues triggering message, and confirmation message at this time has already passed through merchant node encryption.I.e. by client after trade company's confirmation Node notifies user terminal, and user terminal uploads encrypted transaction data to the client node again later.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.Such as: the Xian Xia entity trade company of retail trade forms alliance's chain, each node as independent merchant node Save complete account book information.With these trade companies carry out off-line transaction user can operate user terminal (such as smart phone, Tablet computer etc.) application access alliance's chain, and distribute corresponding account.The account of user's application, is not involved in the guarantor of whole account books It deposits, the transaction data for only saving oneself is local to user terminal.After transaction data is submitted on alliance's chain by user manually, trade company It comes into force after being confirmed, by block chain technology, by multiple merchant nodes of this synchronizing information alliance chain.
Since there are multiple trade companies to save complete account book for alliance's chain, have recorded businessman's all in alliance's chain in account book Transaction data can accomplish that transaction data is difficult to be tampered, unless modify the account book information of all trade companies, while user's conduct Light node, each user terminal is local only to save transaction data involved in the user terminal oneself, to reduce user The resource occupation of terminal.
It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data all saves the decryption code key of ciphertext as the trade company of both parties and client when being traced (trade company's private key and private key for user) allows and only checks the plaintext of transaction data as the trade company of both parties and client, Other trade companies can not check that other trade companies can only view transaction, but cannot view specific information, to reach friendship The secrecy of easy data.
The verification method of transaction data the embodiment of the invention provides another kind based on block chain, this method specifically can be with It realizes in the equipment as merchant node in system architecture as shown in Figure 1.
The process realized in merchant node can also specifically be divided into information and upload stage and information source tracing stage.Its In:
The information upload stage refers to: trade company needs to confirm what user terminal issued when carrying out transaction with user Transaction data.And to for confirming the confirmation message of the transaction data, carry out encrypting the process for being finally uploaded to alliance's chain;
The information source tracing stage refers to: trade company completes the transaction carried out in the information upload stage with user, transaction It needs to recall trading situation after the completion of activity, needs to be loaded in information at this time under in alliance's chain and upload what the stage was uploaded The confirmation message that transaction data and merchant node upload, and be decrypted by symmetrical secret key pair transaction data and confirmation message To plaintext, to realize processing, the negotiation etc. of the plaintext progress Transaction Disputes of later use transaction data and confirmation message.
It is specific as shown in Figure 3, this method comprises:
The stage is uploaded in information:
S201, acquisition have accessed the transaction data and code key data that the user terminal of alliance's chain issues.
Wherein, the user terminal accesses alliance's chain, the transaction by the client node in alliance's chain Data are encrypted by user terminal by symmetrical code key, and the client node is used to receive the access of the user terminal.
S202, the symmetrical code key is obtained to the code key data deciphering by client public key, and by described symmetrical secret The transaction data is decrypted in key.
S203, it generates confirmation message and uploads alliance's chain.
In the information source tracing stage:
S204, the symmetrical code key is obtained from alliance's chain.
S205, it is decrypted by the transaction data of the symmetrical secret key pair confirmation message and the user terminal uploads.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data Secrecy.
In the present embodiment, the acquisition in S201 has accessed the transaction data and secret that the user terminal of alliance's chain issues Key data, specifically include:
S2011 receives the identification information that the client node issues.
S2012 sends feedback information to the client node.
S2013 downloads the transaction data and institute when determining the user terminal is trading object, from alliance's chain State code key data.
Wherein, the feedback information is or is not trading object for indicating the user terminal.User terminal be or Person is not that trading object can be judged by trade company, and the equipment for operating merchant node is written in feedback information.
In the present embodiment, confirmation message is generated in S203 and uploads alliance's chain, is specifically included:
S2021, the operation according to the user of merchant node, generate the confirmation message.
S2022, code key data are obtained from alliance's chain, and are decrypted described in the code key data obtain by client public key Symmetrical code key;
S2023, it is encrypted by confirmation message described in the symmetrical secret key pair and is uploaded to alliance's chain.
Wherein, after the confirmation message after encryption is uploaded to alliance's chain, the client node is to the use Family terminal issues triggering message, after the user terminal receives the triggering message that the client node is sent, to the visitor Family end node uploads encrypted transaction data.
In the present embodiment, the symmetrical code key is obtained from alliance's chain described in S204, specifically included:
S2041, code key data are obtained from alliance's chain.
S2042, the code key data are decrypted by client public key obtaining the symmetrical code key, trade company's private key is stored in The merchant node of alliance's chain.
Wherein, the private key for user is stored in the user terminal, and client public key corresponding with the private key for user uploads Alliance's chain;Trade company's private key is stored in the merchant node of the trading object as the user terminal, with the trade company The corresponding trade company's public key of private key uploads alliance's chain, and trade company's public key is used for: accessing the node decryption of alliance's chain The encryption data that the merchant node uploads.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.Such as: the Xian Xia entity trade company of retail trade forms alliance's chain, each node as independent merchant node Save complete account book information.With these trade companies carry out off-line transaction user can operate user terminal (such as smart phone, Tablet computer etc.) application access alliance's chain, and distribute corresponding account.The account of user's application, is not involved in the guarantor of whole account books It deposits, the transaction data for only saving oneself is local to user terminal.After transaction data is submitted on alliance's chain by user manually, trade company It comes into force after being confirmed, by block chain technology, by multiple merchant nodes of this synchronizing information alliance chain.
Since there are multiple trade companies to save complete account book for alliance's chain, have recorded businessman's all in alliance's chain in account book Transaction data can accomplish that transaction data is difficult to be tampered, unless modify the account book information of all trade companies, while user's conduct Light node, each user terminal is local only to save transaction data involved in the user terminal oneself, to reduce user The resource occupation of terminal.
It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data all saves the decryption code key of ciphertext as the trade company of both parties and client when being traced (trade company's private key and private key for user) allows and only checks the plaintext of transaction data as the trade company of both parties and client, Other trade companies can not check that other trade companies can only view transaction, but cannot view specific information, to reach friendship The secrecy of easy data.
The embodiment of the present invention provides a kind of user terminal, as shown in Figure 4, comprising:
First uploading module, for by the client node in alliance's chain, Xiang Suoshu alliance chain to upload encrypted friendship Easy data and symmetrical code key, wherein the transaction data is encrypted by user terminal by the symmetrical code key, the client End node is used to receive the access of the user terminal.
First enquiry module, for obtaining the symmetrical code key, the transaction data and the confirmation from alliance's chain Information.
First processing module is decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtains institute State the plaintext of transaction data and the confirmation message, wherein the confirmation message is existed by the merchant node in alliance's chain It confirmed to generate after the transaction data, the confirmation message is before being uploaded to alliance's chain, by the merchant node It is encrypted.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data Secrecy.
The embodiment of the present invention provides a kind of equipment for merchant node, as shown in Figure 4, comprising:
Second enquiry module has accessed the transaction data and code key data that the user terminal of alliance's chain issues for obtaining, Wherein, the user terminal accesses alliance's chain by the client node in alliance's chain, the transaction data by with Family terminal is encrypted by symmetrical code key, and the client node is used to receive the access of the user terminal, the code key Data are encrypted by private key for user to the symmetrical code key by the user terminal.
Feedback module for obtaining the symmetrical code key to the code key data deciphering by client public key, and passes through institute Transaction data described in symmetrical secret key pair is stated to be decrypted.
Second uploading module, for being encrypted the confirmation message of generation and uploading alliance's chain.
Second processing module, for obtaining the symmetrical code key, the transaction data and the confirmation from alliance's chain Information, and be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtain the transaction data and institute State the plaintext of confirmation message.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data Secrecy.
A kind of verifying system of transaction data based on block chain is also provided in the present embodiment, as illustrated in figure 1 or 4, The verifying system includes merchant node and client node, merchant node and client node composition in the verifying system Alliance's chain;
The client node, for receiving the access of user terminal, and after receiving the encryption of the user terminal uploads Transaction data and symmetrical code key, wherein the transaction data is encrypted by the user terminal by the symmetrical code key;
The merchant node has accessed the transaction data and code key data that the user terminal issues for obtaining, described Code key data are encrypted by private key for user to the symmetrical code key by the user terminal;
The merchant node is also used to obtain the symmetrical code key to the code key data deciphering by client public key, and It is decrypted by transaction data described in the symmetrical secret key pair;
The merchant node is also used to generate confirmation message and uploads alliance's chain, and the confirmation message is being uploaded to Before alliance's chain, encrypted by the merchant node;
The merchant node is also used to obtain the symmetrical code key from alliance's chain, and passes through the symmetrical secret key pair The transaction data of the confirmation message and the user terminal uploads is decrypted, and the user terminal then passes through described symmetrical secret The transaction data and confirmation message is decrypted in key, obtains the plaintext of the transaction data and the confirmation message.
Specifically, the private key for user is stored in the user terminal, on client public key corresponding with the private key for user Alliance's chain is passed, the client public key is used for the encryption data that the merchant node decrypts the user terminal uploads;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, corresponding with trade company's private key Trade company's public key upload alliance's chain, trade company's public key is used for: accessing trade company described in the node decryption of alliance's chain The encryption data that node uploads.
The present embodiment is by alliance's chain technology in application block chain technology, by the transaction data of the off-line transaction of user, It is submitted on line, while ensure that transaction data, in order to tracing for the subsequent after-sale service of user.It is reliable to provide after sale Fix duty foundation.It, will using the cipher mode of symmetrical code key in order to guarantee facilitating retrospect and can not distorting for transaction record simultaneously Encrypted transaction data allows and only checks the plaintext of transaction data, other trade companies as the trade company of both parties and client It can not check, other trade companies can only view transaction, but cannot view specific information, to reach transaction data Secrecy.
The above-mentioned integrated module realized in the form of software function module, can store and computer-readable deposit at one In storage media.Above-mentioned software function module is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the portion of each embodiment the method for the present invention Step by step.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc. are various can store The medium of program code.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for equipment reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.The above description is merely a specific embodiment, but protection scope of the present invention is not limited to This, anyone skilled in the art in the technical scope disclosed by the present invention, the variation that can readily occur in or replaces It changes, should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claim Subject to enclosing.

Claims (12)

1. a kind of verification method of the transaction data based on block chain characterized by comprising
By the client node in alliance's chain, Xiang Suoshu alliance chain uploads encrypted transaction data and symmetrical code key, wherein The transaction data is encrypted by user terminal by the symmetrical code key, and the client node is for receiving the user The access of terminal;
Be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtain the transaction data and it is described really Recognize the plaintext of information, wherein the confirmation message is to confirmed the transaction data by the merchant node in alliance's chain It generates afterwards, the confirmation message is encrypted before being uploaded to alliance's chain by the merchant node.
2. the method according to claim 1, wherein further include:
Access request is issued to the client node, wherein by the client node according to the access request, is determined and is made For the merchant node of the trading object of the user terminal;
It is described to upload encrypted symmetrical code key to alliance's chain, comprising: to issue access request to the client node Afterwards, the symmetrical code key is encrypted to obtain code key data by private key for user;
The code key data are uploaded by the client node to alliance's chain.
3. method according to claim 1 or 2, which is characterized in that the client node by alliance's chain, to institute It states alliance's chain and uploads encrypted transaction data, comprising:
After receiving the triggering message that the client node is sent, Xiang Suoshu client node uploads encrypted number of deals According to, wherein after the confirmation message after encryption is uploaded to alliance's chain, the client node is to the user terminal Issue triggering message.
4. the method according to claim 1, wherein the private key for user is stored in the user terminal, with institute It states the corresponding client public key of private key for user and uploads alliance's chain, the client public key is used for described in the merchant node decryption The encryption data of user terminal uploads;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, corresponding with trade company's private key Trade company's public key upload alliance's chain, trade company's public key is used for: accessing trade company described in the node decryption of alliance's chain The encryption data that node uploads.
5. a kind of verification method of the transaction data based on block chain characterized by comprising
Obtain the transaction data and code key data for having accessed that the user terminal of alliance's chain issues, wherein the user terminal passes through Client node in alliance's chain accesses alliance's chain, and the transaction data is carried out by user terminal by symmetrical code key Encryption, the client node are used to receive the access of the user terminal, and the code key data are led to by the user terminal Cross what private key for user encrypted the symmetrical code key;
The symmetrical code key is obtained to the code key data deciphering by client public key, and by handing over described in the symmetrical secret key pair Easy data are decrypted;
It generates confirmation message and uploads alliance's chain;
The symmetrical code key is obtained from alliance's chain, and whole by confirmation message described in the symmetrical secret key pair and the user The transaction data that end uploads is decrypted.
6. according to the method described in claim 5, it is characterized in that, what the user terminal that the acquisition has accessed alliance's chain issued Transaction data and code key data, comprising:
Receive the identification information that the client node issues;
To the client node send feedback information, the feedback information for indicate the user terminal be or be not hand over Easy object;
When determining the user terminal is trading object, the transaction data and the code key number are downloaded from alliance's chain According to.
7. according to the method described in claim 6, wrapping it is characterized in that, the generation confirmation message and upload alliance's chain It includes:
According to the operation of the user of merchant node, the confirmation message is generated;
It is encrypted by confirmation message described in the symmetrical secret key pair and is uploaded to alliance's chain, wherein after encryption After the confirmation message is uploaded to alliance's chain, the client node issues triggering message to the user terminal, described After user terminal receives the triggering message that the client node is sent, Xiang Suoshu client node uploads encrypted transaction Data.
8. the method according to any one of claim 5-7, which is characterized in that described from described in alliance's chain acquisition Symmetrical code key, comprising:
Obtain code key data from alliance's chain, and by the client public key decrypt the code key data obtain it is described symmetrically secret Key;
Wherein, the private key for user is stored in the user terminal, described in client public key upload corresponding with the private key for user Alliance's chain;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, corresponding with trade company's private key Trade company's public key upload alliance's chain, trade company's public key is used for: accessing trade company described in the node decryption of alliance's chain The encryption data that node uploads.
9. a kind of user terminal characterized by comprising
First uploading module, for by the client node in alliance's chain, Xiang Suoshu alliance chain to upload encrypted number of deals According to symmetrical code key, wherein the transaction data is encrypted by user terminal by the symmetrical code key, client's end segment Put the access for receiving the user terminal;
First enquiry module, for obtaining the symmetrical code key, the transaction data and the confirmation message from alliance's chain;
First processing module is decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtains the friendship The plaintext of easy data and the confirmation message, wherein the confirmation message is being confirmed by the merchant node in alliance's chain It is generated after the transaction data, the confirmation message carries out before being uploaded to alliance's chain by the merchant node Encryption.
10. a kind of equipment for merchant node characterized by comprising
Second enquiry module has accessed the transaction data and code key data that the user terminal of alliance's chain issues for obtaining, wherein The user terminal accesses alliance's chain by the client node in alliance's chain, and the transaction data is by user terminal It is encrypted by symmetrical code key, the client node is used to receive the access of the user terminal, and the code key data are The symmetrical code key is encrypted by private key for user by the user terminal;
Feedback module, for obtaining the symmetrical code key to the code key data deciphering by client public key, and by described right Transaction data described in secret key pair is claimed to be decrypted;
Second uploading module, for being encrypted the confirmation message of generation and uploading alliance's chain;
Second processing module, for obtaining the symmetrical code key, the transaction data and the confirmation message from alliance's chain, And be decrypted by transaction data described in the symmetrical secret key pair and confirmation message, obtain the transaction data and the confirmation The plaintext of information.
11. a kind of verifying system of the transaction data based on block chain, which is characterized in that the verifying system includes merchant node And client node, merchant node and client node in the verifying system form alliance's chain;
The client node for receiving the access of user terminal, and receives the encrypted friendship of the user terminal uploads Easy data and symmetrical code key, wherein the transaction data is encrypted by the user terminal by the symmetrical code key;
The merchant node has accessed the transaction data and code key data that the user terminal issues, the code key for obtaining Data are encrypted by private key for user to the symmetrical code key by the user terminal;
The merchant node is also used to obtain the symmetrical code key to the code key data deciphering by client public key, and passes through Transaction data described in the symmetrical secret key pair is decrypted;
The merchant node is also used to generate confirmation message and uploads alliance's chain, the confirmation message be uploaded to it is described Before alliance's chain, encrypted by the merchant node;
The merchant node is also used to obtain the symmetrical code key from alliance's chain, and by described in the symmetrical secret key pair The transaction data of confirmation message and the user terminal uploads is decrypted, and the user terminal then passes through the symmetrical secret key pair The transaction data and confirmation message are decrypted, and obtain the plaintext of the transaction data and the confirmation message.
12. verifying system according to claim 11, which is characterized in that it is whole that the private key for user is stored in the user End, client public key corresponding with the private key for user upload alliance's chain, and the client public key is used for the merchant node Decrypt the encryption data of the user terminal uploads;
Trade company's private key is stored in the merchant node of the trading object as the user terminal, quotient corresponding with trade company's private key Family public key uploads alliance's chain, and trade company's public key is used for: accessing merchant node described in the node decryption of alliance's chain The encryption data of upload.
CN201811276380.6A 2018-10-30 2018-10-30 A kind of verification method, the apparatus and system of the transaction data based on block chain Pending CN109523267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811276380.6A CN109523267A (en) 2018-10-30 2018-10-30 A kind of verification method, the apparatus and system of the transaction data based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811276380.6A CN109523267A (en) 2018-10-30 2018-10-30 A kind of verification method, the apparatus and system of the transaction data based on block chain

Publications (1)

Publication Number Publication Date
CN109523267A true CN109523267A (en) 2019-03-26

Family

ID=65774063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811276380.6A Pending CN109523267A (en) 2018-10-30 2018-10-30 A kind of verification method, the apparatus and system of the transaction data based on block chain

Country Status (1)

Country Link
CN (1) CN109523267A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188138A (en) * 2019-04-25 2019-08-30 阿里巴巴集团控股有限公司 Data synchronous system, method, apparatus and electronic equipment based on alliance's chain
CN110245945A (en) * 2019-05-20 2019-09-17 阿里巴巴集团控股有限公司 In conjunction with the receipt storage method and node of code mark and user type
CN110955909A (en) * 2019-10-12 2020-04-03 四川九洲电器集团有限责任公司 Personal data protection method and block link point
CN111523895A (en) * 2020-05-06 2020-08-11 杭州复杂美科技有限公司 Data delay publishing method, device and storage medium
CN111598574A (en) * 2020-05-12 2020-08-28 江苏大学 Intelligent service transaction oriented supervision method and supervision interface
CN112001717A (en) * 2020-10-27 2020-11-27 四川泰立科技股份有限公司 Method, system and storage medium for calculating encryption currency of digital television
CN112307500A (en) * 2020-11-02 2021-02-02 杭州甘道智能科技有限公司 Block chain-based vaccine circulation data encryption device and method
CN112418850A (en) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 Transaction method and device based on block chain and electronic equipment
CN112633858A (en) * 2021-01-05 2021-04-09 润联软件系统(深圳)有限公司 Process approval processing method and system
CN112685780A (en) * 2020-12-31 2021-04-20 杭州链化洞察科技有限公司 Data encryption and decryption method based on block chain
US10984417B2 (en) 2019-04-25 2021-04-20 Advanced New Technologies Co., Ltd. Blockchain-based data synchronization system, method, apparatus, and electronic device
CN112818412A (en) * 2021-01-25 2021-05-18 重庆川仪自动化股份有限公司 Block chain-based equipment data access method and system
CN113378192A (en) * 2021-06-02 2021-09-10 浙江数秦科技有限公司 Alliance link data encryption method
CN113657972A (en) * 2021-08-31 2021-11-16 卓尔智联(武汉)研究院有限公司 Article transaction method based on block chain, computer device and storage medium
CN113761543A (en) * 2020-06-01 2021-12-07 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine readable medium based on alliance chain
EP4156072A4 (en) * 2020-05-19 2024-05-29 Jingdong Technology Information Technology Co., Ltd. Transaction tracing method and apparatus based on blockchain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529951A (en) * 2016-12-30 2017-03-22 杭州云象网络技术有限公司 Node consensus verification method under league chain network through asynchronous mode
CN108200079A (en) * 2018-01-19 2018-06-22 深圳四方精创资讯股份有限公司 Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption
CN108566375A (en) * 2018-03-12 2018-09-21 深圳壹账通智能科技有限公司 The method, terminal and storage medium of message communicating between multiterminal based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529951A (en) * 2016-12-30 2017-03-22 杭州云象网络技术有限公司 Node consensus verification method under league chain network through asynchronous mode
CN108200079A (en) * 2018-01-19 2018-06-22 深圳四方精创资讯股份有限公司 Block chain method for secret protection and device based on symmetrical and asymmetric Hybrid Encryption
CN108566375A (en) * 2018-03-12 2018-09-21 深圳壹账通智能科技有限公司 The method, terminal and storage medium of message communicating between multiterminal based on block chain

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188138A (en) * 2019-04-25 2019-08-30 阿里巴巴集团控股有限公司 Data synchronous system, method, apparatus and electronic equipment based on alliance's chain
US10984417B2 (en) 2019-04-25 2021-04-20 Advanced New Technologies Co., Ltd. Blockchain-based data synchronization system, method, apparatus, and electronic device
CN110245945A (en) * 2019-05-20 2019-09-17 阿里巴巴集团控股有限公司 In conjunction with the receipt storage method and node of code mark and user type
CN112418850A (en) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 Transaction method and device based on block chain and electronic equipment
CN110955909A (en) * 2019-10-12 2020-04-03 四川九洲电器集团有限责任公司 Personal data protection method and block link point
CN111523895A (en) * 2020-05-06 2020-08-11 杭州复杂美科技有限公司 Data delay publishing method, device and storage medium
CN111598574A (en) * 2020-05-12 2020-08-28 江苏大学 Intelligent service transaction oriented supervision method and supervision interface
EP4156072A4 (en) * 2020-05-19 2024-05-29 Jingdong Technology Information Technology Co., Ltd. Transaction tracing method and apparatus based on blockchain
CN113761543A (en) * 2020-06-01 2021-12-07 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine readable medium based on alliance chain
CN113761543B (en) * 2020-06-01 2024-04-02 菜鸟智能物流控股有限公司 Data processing method, device, equipment and machine-readable medium based on alliance chain
CN112001717A (en) * 2020-10-27 2020-11-27 四川泰立科技股份有限公司 Method, system and storage medium for calculating encryption currency of digital television
CN112307500A (en) * 2020-11-02 2021-02-02 杭州甘道智能科技有限公司 Block chain-based vaccine circulation data encryption device and method
CN112685780A (en) * 2020-12-31 2021-04-20 杭州链化洞察科技有限公司 Data encryption and decryption method based on block chain
CN112633858A (en) * 2021-01-05 2021-04-09 润联软件系统(深圳)有限公司 Process approval processing method and system
CN112818412A (en) * 2021-01-25 2021-05-18 重庆川仪自动化股份有限公司 Block chain-based equipment data access method and system
CN113378192B (en) * 2021-06-02 2022-06-10 浙江数秦科技有限公司 Alliance link data encryption method
CN113378192A (en) * 2021-06-02 2021-09-10 浙江数秦科技有限公司 Alliance link data encryption method
CN113657972A (en) * 2021-08-31 2021-11-16 卓尔智联(武汉)研究院有限公司 Article transaction method based on block chain, computer device and storage medium

Similar Documents

Publication Publication Date Title
CN109523267A (en) A kind of verification method, the apparatus and system of the transaction data based on block chain
CN107403303B (en) Signing method of electronic contract system based on block chain deposit certificate
Ramana et al. A three-level gateway protocol for secure m-commerce transactions using encrypted OTP
CN108564353A (en) Payment system based on block chain and method
CN101459517B (en) B2b data exchange system
CN106452775A (en) Method and apparatus for accomplishing electronic signing and signing server
US20180047011A1 (en) Authentication system
CA2808369A1 (en) System for protecting an encrypted information unit
CN101262332A (en) Method and system for mutual authentication between mobile and host devices
CN108965228B (en) Dispute relief system with KYC data mark of multiple keys and method thereof
CN112685760A (en) Financial data privacy processing and sharing method capable of authorizing on block chain
CN105022966A (en) Database data encryption and decryption method and system
CN102801730A (en) Information protection method and device for communication and portable devices
Shedid et al. Modified SET protocol for mobile payment: an empirical analysis
CN109241754A (en) A kind of cloud file data de-duplication method based on block chain
CN100530028C (en) Method and system for controlling the disclosure time of information
Khan et al. Buyer seller watermarking protocols issues and challenges–a survey
KR20130021774A (en) Method for providing security service based on digital certificate and system for providing security service based on digital certificate
Kisore et al. A secure SMS protocol for implementing digital cash system
KR20060130312A (en) A method and system thereof for delivery of issuer's key to a smart card chip issued by multi-institutions
CN106779645B (en) Information encryption method and device
Chang et al. Secure electronic coupons
CN115941773A (en) Project transaction method, system, terminal device and medium based on cloud service sharing
TWI430643B (en) Secure key recovery system and method
CN115423455A (en) Method for creating anonymous transaction on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190326

RJ01 Rejection of invention patent application after publication