CN109614813A - Privacy method of commerce, device and its application method, device based on block chain - Google Patents

Privacy method of commerce, device and its application method, device based on block chain Download PDF

Info

Publication number
CN109614813A
CN109614813A CN201811283623.9A CN201811283623A CN109614813A CN 109614813 A CN109614813 A CN 109614813A CN 201811283623 A CN201811283623 A CN 201811283623A CN 109614813 A CN109614813 A CN 109614813A
Authority
CN
China
Prior art keywords
user
block chain
data information
secret protection
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811283623.9A
Other languages
Chinese (zh)
Other versions
CN109614813B (en
Inventor
潘冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Chain Technology Co ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811283623.9A priority Critical patent/CN109614813B/en
Priority to TW108110027A priority patent/TWI727284B/en
Publication of CN109614813A publication Critical patent/CN109614813A/en
Priority to PCT/CN2019/103572 priority patent/WO2020088074A1/en
Application granted granted Critical
Publication of CN109614813B publication Critical patent/CN109614813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

One or more embodiments of this specification provide application method, the device of privacy method of commerce, device and the privacy transaction of the block chain based on block chain; the privacy method of commerce based on block chain; node device applied to trusted user; it include: the first message for receiving the block chain user and sending; the first message includes the first data information of non-secret protection and the second data information by secret protection; wherein, second data information by secret protection is the first data information conversion gained by the non-secret protection;First data information is stored in the local data base of the node device of the trusted user;The second transaction is sent to the block chain, second transaction includes second data information, so that second transaction is embodied in the distributed data base of the block chain after being verified.

Description

Privacy method of commerce, device and its application method, device based on block chain
Technical field
This specification is related to technical field of data processing more particularly to a kind of privacy method of commerce based on block chain, dress It sets and its application method, device.
Background technique
Block chain technology is also referred to as distributed account book technology, is that one kind is participated in " remembering jointly by several calculating equipment Account ", the emerging technology of common a complete distributed data base of maintenance.Since block chain technology has decentralization, openly Transparent, every calculating equipment can participate in data-base recording and respectively calculate that data synchronization can be rapidly performed by between equipment Characteristic so that block chain technology is widely applied in numerous fields.
But in current mainstream block chain framework, each node saves identical data;In some actual scenes, Block chain node participant is not intended to the data of oneself to be known by other nodes.
Summary of the invention
It is one or more real according to this specification for the status and problem of block chain flow chart of data processing set forth above Apply example in a first aspect, proposes a kind of privacy method of commerce based on block chain, applied to the node device of trusted user, Wherein, the trust setting transaction that the trusted user is stored by the distributed data base of block chain determines that the trust is arranged Transaction includes the mark of the corresponding all trusted users of the block chain user;The described method includes:
The first message that the block chain user sends is received, the first message includes the first data of non-secret protection Information and the second data information by secret protection, wherein second data information by secret protection is by described not hidden First data information of private protection converts gained;
First data information is stored in the local data base of the node device of the trusted user;
The second transaction is sent to the block chain, second transaction includes second data information, so that described the Two transaction are embodied in the distributed data base of the block chain after being verified.
According to the second aspect of this specification one or more embodiment, a kind of privacy transaction based on block chain is proposed Application method, comprising:
The second transaction sent by the node device of trusted user, institute are obtained from the distributed data base of the block chain Stating the second transaction includes the second data information by secret protection, wherein the trusted user by block chain distributed number Determine that the trust setting transaction includes the corresponding all trusteds of the block chain user according to the trust setting transaction of library storage The mark of user;
Receive the first data information of the non-secret protection of the node device transmission of the trusted user, first number It is believed that breath is saved in the local data base of the node device of the trusted user;
Whether verifying second data information by secret protection is turned by the first data information of the non-secret protection Change gained, if so, executing the application logic to second transaction.
According to the third aspect of this specification one or more embodiment, a kind of privacy transaction based on block chain is proposed Device, the node device applied to trusted user, wherein the trusted user is stored by the distributed data base of block chain Trust setting transaction determine, it is described trust setting transaction include the corresponding all trusted users of the block chain user mark Know;Described device includes:
Receiving unit, receives the first message that the block chain user sends, and the first message includes non-secret protection The first data information and the second data information by secret protection, wherein second data information by secret protection is Gained is converted by the first data information of the non-secret protection;
First data information is stored in the local data of the node device of the trusted user by storage unit Library;
Transmission unit, Xiang Suoshu block chain send the second transaction, and second transaction includes second data information, with It is embodied in the distributed data base of the block chain after being verified second transaction.
According to the fourth aspect of this specification one or more embodiment, a kind of privacy transaction based on block chain is proposed Application apparatus, comprising:
Acquiring unit obtains the sent by the node device of trusted user from the distributed data base of the block chain Two transaction, second transaction include the second data information by secret protection, wherein the trusted user is by block chain The trust setting transaction of distributed data base storage determines that the trust setting transaction includes the corresponding institute of the block chain user There is the mark of trusted user;
Receiving unit receives the first data information of the non-secret protection of the node device transmission of the trusted user, First data information is saved in the local data base of the node device of the trusted user;
Whether authentication unit, verifying second data information by secret protection are counted by the first of the non-secret protection It is believed that breath conversion gained;
Applying unit executes the application logic to second transaction.
This specification additionally provides a kind of computer equipment, comprising: memory and processor;It is stored on the memory The computer program that can be run by processor;When the processor runs the computer program, execute above-mentioned based on block chain Privacy method of commerce described in step.
This specification additionally provides a kind of computer equipment, comprising: memory and processor;It is stored on the memory The computer program that can be run by processor;When the processor runs the computer program, execute above-mentioned based on block chain Private data application method described in step.
By above technical scheme as it can be seen that the privacy method of commerce and device based on block chain that this specification provides, user Its user trusty is set on block chain by trusting setting transaction, and the first data information for being intended to privacy can to it Trust user to disclose, and its trusted user is by the second data being converted by above-mentioned first data information, by secret protection Information is uploaded in the distributed data base of block chain, so that the above-mentioned quilt on block chain of the second data information by secret protection Common recognition verifying.Using privacy method of commerce provided by this specification, the first data of the non-secret protection of user were both can protect The privacy of information prevents any other node on block chain from obtaining first data information, and can be by the first data information number Card protection is deposited on block chain according to the second data information that conversion obtains;Arbitrary node needs to apply or verify to be somebody's turn to do afterwards When the second data information, above-mentioned first data information can be obtained from the trusted node of above-mentioned user setting, and verify first The corresponding relationship of data information and the second data information, to both complete testing to the second data information for depositing card on block chain Card can get the original text of the first data information again to be applied to.
The above-mentioned technical proposal that this specification provides, based on the distributed data base memory mechanism of block chain technology, user The second data information by decentralization be recorded in all nodes, safeguarded jointly by the node of all participants, in real time into Row synchronizes, and all records can recall.Moreover, the common recognition mechanism based on block chain, the second data information that each user provides is not It can be tampered after the supply, to ensure that the authenticity and safety of the second data information of user.Based on being appointed to credible The trust at family provides the first data information by trusted user in the first data information corresponding using the second data information Original text, to ensure that authenticity, safety and the accuracy of above-mentioned first data.
Detailed description of the invention
Fig. 1 is node device execution that one exemplary embodiment of this specification provides, trusted user based on block The flow chart of the privacy method of commerce of chain;
Fig. 2 is one exemplary embodiment of this specification the provides, node device of trusted user credible to be appointed to other The node device at family transmits the flow chart of non-privacy message;
Fig. 3 is protecting to by privacy for any node equipment execution for the block chain that one exemplary embodiment of this specification provides The flow chart of the application method of the transaction of shield;
Fig. 4 is the privacy method of commerce based on block chain that the another embodiment of this specification provides and to by secret protection The flow chart of the application method of transaction;
Fig. 5 is the schematic diagram for the privacy the transaction device based on block chain that an embodiment provided by this specification provides;
Fig. 6 is the signal for the privacy transaction application device based on block chain that an embodiment provided by this specification provides Figure;
Fig. 7 is privacy the transaction device embodiment or privacy transaction application based on block chain provided by operation this specification A kind of hardware structure diagram of device.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with this specification one or more embodiment.Phase Instead, they are only some aspects phases with the one or more embodiments of as detailed in the attached claim, this specification The example of consistent device and method.
It should be understood that the sequence that might not show and describe according to this specification in other embodiments executes The step of correlation method.In some other embodiments, step included by method can than described in this specification more It is more or less.In addition, single step described in this specification, may be broken down into other embodiments multiple steps into Row description;And multiple steps described in this specification, it may also be merged into single step progress in other embodiments Description.
As shown in Figure 1, one illustrative examples of this specification provide a kind of privacy method of commerce based on block chain.This Block chain described in embodiment, specifically can refer to it is that each node device is reached by common recognition mechanism, deposited with distributed data The P2P network system of storage structure, data distribution in the block chain connected in time " block (block) " one by one it Interior, latter block includes the data summarization of previous block, and according to specific common recognition mechanism (such as POW, POS, DPOS or PBFT Deng) difference, reach the data full backup of all or part of node device.Those skilled in the art is known, due to block chain System is run under corresponding common recognition mechanism, has been included to the data in block chain database and has been difficult to be usurped by arbitrary node device Change, for example, by using the block chain of Pow common recognition, the attack at least needing the whole network 51% to calculate power is possible to distort data with existing, because This block catenary system have other centralization Database Systems institute's methods compare guarantee data security, the characteristic that attack protection is distorted.
Transaction (transaction) described in this specification refers to that user is created by the node device of block chain The data built, and need finally to be distributed in the distributed data base of block chain.Wherein, the transaction in block chain, exists Point of the transaction of the transaction and broad sense of narrow sense.The transaction of narrow sense refers to the value Transfer that user issues to block chain;Example Such as, in traditional bit coin block chain network, transaction can be one that user initiates in block chain and transfer accounts.And broad sense Transaction refers to the arbitrary data that user issues to block chain: for example, operator can be taken based on actual business demand Build alliance's chain, rely on alliance's chain dispose it is some it is unrelated with value Transfer it is other types of in line service (for example, renting a house Business, vehicle scheduling business, settlement of insurance claim business, credit services, medical services etc.), and in this kind of alliance's chain, transaction can be with It is the service message or service request with business intention that user issues in alliance's chain;For another example, in account type In block chain, which can also be that user sends to block chain, data (such as account of account status to change user Remaining sum etc.).Therefore, as long as the arbitrary data that user issues to the distributed data base of block chain, no matter the arbitrary data quilt It is stored in the block body, block head or other positions of block, can each belong to " transaction " of the present invention.
Moreover, it is noted that node device described in this specification, not only may include the distribution that backup has block chain The full node device of the full dose data of formula database may also include the partial data for backing up the distributed data base for having block chain Light node device, and other terminal devices or client, in the present specification without limitation.
Privacy method of commerce shown in FIG. 1 based on block chain is applied to the node device of trusted user, wherein described The trust setting transaction that trusted user is stored by the distributed data base of block chain determines that the trust setting transaction includes institute The mark for stating all trusted users that block chain user determines, such as the account address of trusted user, the public affairs of trusted user Key or trusted user.name etc. can uniquely determine the information of trusted user.Block chain user can be based on itself To the trust of other users, chooses and set its corresponding trusted user, such as the higher financial institution of credit, certification can be selected Mechanism, supervisory organ user or other mechanisms.Above-mentioned trust setting transaction can directly be issued to block chain from block chain user, Statement can also be called to have the intelligent contract of trusted user setting logic to issue by block chain user, it is not limited here.
Method shown in FIG. 1 includes: step 102, receives the first message that the block chain user sends, described first disappears Breath includes the first data information of non-secret protection and the second data information by secret protection, wherein described by secret protection The second data information be by the non-secret protection the first data information conversion gained.
The first message that the reception block chain user sends described in step 102, is the node of above-mentioned trusted user Equipment, which is communicated with block chain user by chain outer tunnel, to be received.The chain outer tunnel refers to not with to block chain The form of transaction is sent in distributed data base but is led to point-to-point communication privately or by the network of other relay nodes Letter mode.First data information of non-secret protection included by above-mentioned first message and by secret protection the second data believe Breath can both be received in primary communication and be obtained, and can also be received and be obtained in multiple communication.On it is worth noting that, Identical data content format can be had with the transaction issued on block chain by stating first message, why be referred to here as " message " rather than " transaction " are to be sent by non-into the distributed data base of block chain due to above-mentioned first message, but outside chain Channel is sent.First data information of non-secret protection refers to that first data information is the information without secret protection encryption Original text.
Above-mentioned the second data information by secret protection is the first data information conversion gained by non-secret protection, specifically Data transformation rule can be set by the underlying protocol of the block chain, can also be by block chain user's sets itself.Above-mentioned turn Change process can be by the encryption of above-mentioned first data information or encoding operation to obtain above-mentioned second data information.Shown in one In embodiment, to guarantee that the second data information only can uniquely correspond to above-mentioned first data information, the second data information can be with For the Hash digest of the first data information.
Step 104, first data information is stored in the local data base of the node device of the trusted user.
The local data base of the node device of above-mentioned trusted user is the node device for being different from trusted user For block chain distributed data base, the first data information for being stored in the local data base of node device will not be by block chain On other node devices know, hereby it is ensured that the privacy of the first data information.
It, can also be preparatory for the legitimacy for the content that the above-mentioned first message of guarantee is included in the another embodiment shown Proof rule is set, above-mentioned first message is verified by the node device of above-mentioned trusted user, and in preset verifying After being verified as defined in rule, first data information is stored in the local number of the node device of the trusted user According to library.Above-mentioned preset proof rule at least may include verifying it is described by the second data information of secret protection be by described not hidden First data information of private protection converts gained, to guarantee the reciprocal correspondence property of the first data information and the second data information.
In the another embodiment shown, to prevent other terminal devices from above-mentioned block chain user being pretended to be to send above-mentioned the One message, or the first message that above-mentioned block chain user sends is distorted, so that the node device of trusted user receives illegally The first data information and the second data information generated, which further includes the block chain user at least to described not hidden First digital signature and the block chain user made by first data information of private protection are at least to described by secret protection Second digital signature made by second data information;Or the first message further include the block chain user at least to it is described not Third digital signature made by first data information of secret protection and the second data information by secret protection.Above-mentioned block chain The node device of user passes through respectively to the content for including at least the first data information and including at least in the second data information Appearance is digitally signed, or is digitally signed to the content for including at least the first data information and the second data information, is both prevented Stopped other terminal devices and pretended to be above-mentioned block chain user, but prevent the first data information included by above-mentioned first message and Second data information is distorted by other terminal devices.
Correspondingly, it is by the block chain that above-mentioned preset proof rule, which should also include: verifying first digital signature, User at least makees the first data information of the non-secret protection, and verifying second digital signature is by the block chain User at least makees second data information by secret protection;Alternatively, verifying the third digital signature is by described Block chain user at least makees first data information and second data information.
Step 106, Xiang Suoshu block chain sends the second transaction, and second transaction includes second data information, with Point of the block chain is embodied in after making second transaction that there is the node device verifying of common recognition permission in the block chain In cloth database.
Arbitrary node equipment on the block chain can be by way of accessing the distributed data base of block chain, in acquisition State the second data information in the second transaction;Since the second data information is in by the state of secret protection, in addition to above-mentioned transmission The trusted user that the block chain user itself of first message and above-mentioned block chain user are trusted, other use on the block chain Corresponding first data information of second data information cannot be known per family, to be effectively protected the hidden of the first data information Private.
It is included second transaction described in above-described embodiment detailed into the distributed data base of the block chain Thin process, can according to the block chain common recognition mechanism and proof rule and specifically set.In the embodiment shown in one, institute The specific steps that the second transaction is admitted in the distributed data base of the block chain are stated, may include:
There is the node device of book keeping operation permission second transaction is added to candidate block in the block chain;
The common recognition book keeping operation section for meeting the block chain common recognition mechanism is determined from the node device with book keeping operation permission Point device;
The common recognition accounting nodes equipment broadcasts the candidate block to the node device of the block chain;
After meeting the verifying approval of the node device of preset quantity by the block chain in the candidate block, the time Constituency block is considered as newest block, is added in the distributed data base of the block chain.
In the above-described embodiment, the node device with book keeping operation permission refers to the node for generating candidate block permission Equipment, it may include the node device with higher credit customer and other node devices in above-mentioned block chain.According to the area The common recognition mechanism of block chain can have determining common recognition accounting nodes in the node device of book keeping operation permission to the candidate block from above-mentioned Equipment, above-mentioned common recognition mechanism may include that proof of work mechanism (PoW) or right prove mechanism (PoS) or share warrant The PBFT etc. that bright mechanism (DPoS) etc. or alliance's chain generally use.
It usually may include the verifying to the data content format of the second transaction about the verifying to above-mentioned second transaction, or The verifying of all or part of the content of second transaction, or to the verifying of digital signature etc. that the second exchange includes.Show one In embodiment out, set to guarantee that the node device for sending the trusted user that above-mentioned second trades belongs to above-mentioned block chain user Fixed trusted user, the node device of block chain should verify above-mentioned trusted user identify whether be included in above-mentioned block chain Client-initiated is trusted in setting transaction;If so, showing that the initiation user of second transaction is legal initiation user.
In the another embodiment shown, the node to prevent any other node device from pretending to be above-mentioned trusted user is set Preparation plays above-mentioned second transaction, and above-mentioned second transaction further includes the trusted user at least to described by the second of secret protection 4th digital signature made by data information;It is initially to embody and depositing the second data information demonstrate,proved and include in above-mentioned second transaction It is made by the node device generation of above-mentioned block chain user, above-mentioned second transaction may also include included by above-mentioned first message , the block chain user is at least to the second digital signature made by second data information by secret protection.Correspondingly, The verifying of node device in block chain to above-mentioned second transaction at least should include the public key based on above-mentioned block chain user to the The verifying of two digital signature and verifying of the public key to the 4th digital signature based on trusted user will with after being verified Above-mentioned second transaction is embodied in the distributed data base of block chain.
Multiple trusted users can be set when trusted user is arranged in block chain user.Block chain user can be from upper One trusted user of selection in multiple trusted users is stated, above-mentioned first message is sent;Correspondingly, said one is credible appoints It family, should also be by above-mentioned area except the privacy method of commerce based on block chain completed as described in step 102 to 106 in above-described embodiment The above-mentioned first message that block chain user sends is transmitted at the node device of other trusted users, so that other trusteds User backs up the first data information of the non-secret protection for including in the first message in the local data base of its node device. Particularly, as shown in Fig. 2, the above-mentioned first message that above-mentioned block chain user sends is transmitted to other trusted users' The step of at node device may include:
Step 202, the trust setting transaction is obtained from the distributed data base of the block chain;
Step 204, based on other trusteds user for trusting block chain users to trust described in setting trade confirmation;
It step 206, can by other for being transmitted to the users to trust outside the first message chain of block chain user transmission The node device of user is trusted, so that first data information is saved in the node device of other trusteds user In local data base.
As described in above-described embodiment, trusting setting transaction includes all trusted users that the block chain user determines Mark, such as the account address of trusted user, the public key of trusted user or trusted user.name can uniquely really Determine the information of trusted user.Therefore, the block chain user letter in addition to itself can be confirmed based on the setting transaction of above-mentioned trust Other trusteds user appointed.
The first data information to prevent first message from being included is known and lost by the arbitrary node equipment on block chain The node device of privacy, above-mentioned trusted user is transmitted to other trusteds by the first message that chain outer tunnel is obtained The node device of user.The outer transmission mode of above-mentioned chain includes but is not limited to the forms such as chain outer point-to-point communication, broadcast.
Similarly, the node device of other trusteds user may be based on preset proof rule verifying described first and disappear Breath, first data information to be stored in the sheet of the node device of other trusteds user after described be verified Ground database, wherein the preset proof rule include verifying it is described by the second data information of secret protection be by it is described not First data information of secret protection converts gained, and verifying first digital signature is by the block chain user at least to institute The first data information for stating non-secret protection is made, and verifying second digital signature is by the block chain user at least to institute It states and is made by the second data information of secret protection, etc., details are not described herein.
It is worth noting that, after the node device of each other trusteds user receives above-mentioned first message, it is each The node device of other trusteds user can transmit first message to above-mentioned trusted user and receive or disappear to described first Breath is verified or agrees to the replies such as the above-mentioned first message of storage.In the another embodiment shown, it is above-mentioned it is each other The node device of trusted user sends other each trusted users at least to described by secret protection to above-mentioned trusted user The second data information made by each digital signature, above-mentioned each digital signature can both express to above-mentioned trusted user The node device of each other trusteds user indicates or has stored the first data information to being verified for above-mentioned first message Prompt, above-mentioned each digital signature can also be included in its distributed number to block chain by the node device of above-mentioned trusted user According in the second transaction of library publication, so that the 4th electronic signature made with the node device of above-mentioned trusted user is together, it is Any other node device of block chain makes support to the legitimate verification for the second data information that the second exchange includes.
Provided by this specification above examples provide performed by the node device of trusted user based on block The privacy method of commerce of chain, by store non-secret protection in the local data base of the node device of trusted user first Data information, the node device of trusted user send the second data by secret protection into the distributed data base of block chain Information has reached secret protection so that the node device of block chain can back up above-mentioned the second data information by secret protection The effect of above-mentioned first data information.
Correspondingly, this specification additionally provides a kind of application method of privacy transaction based on block chain.As shown in figure 3, When any node equipment of block chain is needed using the above-mentioned second transaction, which can be performed following steps:
Step 302, the sent by the node device of trusted user is obtained from the distributed data base of the block chain Two transaction, second transaction include the second data information by secret protection, the trusted user by block chain distribution The trust setting transaction of formula database purchase determines, trusts setting transaction including the block chain user it is corresponding it is all can Trust the mark of user.
Step 304, the first data information of the non-secret protection of the node device transmission of the trusted user, institute are received State the local data base that the first data information is saved in the node device of the trusted user.Any node of the block chain Equipment, which passes through, communicate outside chain with the node device for the trusted user for sending above-mentioned second transaction, be can get this and credible is appointed The first data information that the node device at family stores in the local database.
Step 306, whether verifying second data information by secret protection is counted by the first of the non-secret protection It is believed that breath conversion gained.
If so,
Step 308, the application logic to second transaction is executed.
About above-mentioned trust setting transaction set-up mode, the first data information and the second data information transformation rule or Mode, selection mode of trusted user etc., multiple implementations described in the above-mentioned privacy method of commerce based on block chain It was described in example, details are not described herein.The above-mentioned application logic to the second transaction, including obtain in the second transaction by secret protection The second data information corresponding to non-secret protection the first data information or based on first data information carry out data Using or service application etc.;The application be may include that data application outside block chain may also comprise data application on block chain, The transaction based on first data information is such as issued, is not construed as limiting in the present specification.
Compared to general setting parameter state or publication by the transaction of the data information of secret protection, in block chain Money transfer transactions have some exclusive spies due to needing to be related to the account balance state generation linkage variation of at least two users Levy step.Hereinafter, this specification elaborates this explanation so that block chain user A sends money transfer transactions to block chain user B as an example Privacy method of commerce provided by book.Considered based on the personal secrets to itself account, block chain user A cooperates with its credible to appoint Family SA is set the remaining sum (being assumed to be 100) in its account status to by method described in said one or multiple embodiments By the state (for example, Hash digest value hash (100) corresponding to remaining sum 100) of secret protection.
As shown in figure 4, the process that the remaining sum 100 in block chain user's A account status is set as hash (100) can be wrapped It includes:
Step 401, the node device of block chain user A sends trust setting into the distributed data base of block chain and hands over Easily, its trusted user is set by user SA.
Step 402, the node device of block chain user A is sent by chain outer tunnel to the node device of trusted user SA First message, the first message can include: the first data information --- remaining sum 100, the second data information --- by protection remaining sum The digital signature Sign 1 of hash (100), user A to the first data information, digital signature of the user A to the second data information Sign2。
Step 403, it is by that the node device of trusted user SA, which verifies the second data information according to data transformation rule, One data information is converted and is obtained, and verifies above-mentioned Sign 1, Sign 2.
Step 404, after the verifying described in step 403 all passes through, the node device of trusted user SA is by first message The first data information for being included --- remaining sum 100 saves in the local database.Optionally, the node of trusted user SA is set It is standby that a mapping form can be set in the local database, to record above-mentioned first data information and the second data information.
Step 405, the node device of trusted user SA is digitally signed the second data information by verifying Sign 4。
Step 406, the node device of trusted user SA sends the second transaction to block chain, which includes second Data information --- by protection remaining sum hash (100), user A is to the digital signature Sign2 of the second data information, and user SA is to The digital signature Sign 4 of two data informations.
Step 407, according to the consensus rules of the block chain, the common recognition node on block chain tests above-mentioned second transaction Card, above-mentioned verifying include verifying user SA whether to belong to user A by trusting the determining trusted user of setting transaction, verifying the The digital signature that two transaction include is the trusted user SA of user A and user A confirmation respectively to made by the second data information 's.
Step 408, after all verifyings described in the step 407 pass through, the common recognition node of the block chain (has common recognition power The node of limit) it will include that the above-mentioned second block traded is indexed in the distributed data base of above-mentioned block chain, on the block chain All nodes the balance status of user A is updated to hash (100) in its database.
Similarly, user B can also get up the balance status secret protection in its account, specific method can with step 401 to 408 is similar, and details are not described herein.
It is worth noting that, when the privacy method of commerce provided by this specification is privacy money transfer transactions, to guarantee to turn The account balance of square user and the account balance of the side of being transferred to user can be verified by the node device of trusted user out, and phase occurs The remaining sum answered changes, and the side of producing user should at least believe any one identical trusted user, that is, the side of producing with the side of being transferred to user It should include the mark of at least one identical trusted user in the trust setting transaction that user sends with the side of being transferred to user, at this In embodiment, trusted user SA is the trusted user of user A, is also the trusted user of user B.
User A completes to may particularly include to the process that user B transfers accounts:
Step 409, the node device of user A by the user A transaction message Txab to transfer accounts to user B be sent to user A with The node device of user B common trusted user SA;Above-mentioned transaction message Txab includes the account identification of user A, user B The Hash digest hash (10) of (account address or public key), transfer amounts 10, transfer amounts 10, user A is to transfer amounts 10 Digital signature Sign (hash of the digital signature Sign (10) and user A to the Hash digest hash (10) of transfer amounts 10 (10))。
Step 410, the node device of trusted user SA, which verifies Hash digest hash (10) according to data transformation rule, is Whether the account balance 100 for being converted by transfer amounts 10 and being obtained, verify user A, which is enough to pay this, is transferred accounts, verifies above-mentioned Sign (10)、Sign(hash(10))。
Step 411, after the verifying described in step 410 all passes through, the node device of trusted user SA is transferred accounts above-mentioned Transfer amounts 10 in message save in the local database;It is transferred accounts based on this, the node device of trusted user SA is also answered The account balance of user A and user B are changed in the local database.
Step 412, the node device of trusted user SA is to the transfer amounts hash by secret protection by verifying (10) Sign 4 (hash (10)) are digitally signed;And it is generated for the account balance of user A and user B after the completion of transferring accounts new Hash digest hash (account A), hash (account B) be digitally signed Sign (hash (account A)), Sign(hash(account B))。
Step 413, the node device of trusted user SA sends the second transaction to block chain, which includes hidden The transfer amounts hash (10) of private protection, the account balance of user A and user B after the completion of transferring accounts generate new Hash digest Hash (account A) and hash (account B), user A are signed to by the number of the transfer amounts hash (10) of secret protection Name Sign (hash (10)) and the digital signature Sign 4 (hash (10)) of user SA, Sign (hash (account A)), Sign(hash(account B))。
Step 414, according to the consensus rules of the block chain, the common recognition node on block chain tests above-mentioned second transaction Card, above-mentioned verifying include whether verifying user SA belongs to credible the appointing that transaction determination is arranged by trusting by user A and user B Family, digital signature Sign (hash (10)), the Sign 4 (hash (10)) that the second transaction of verifying includes are user A and user respectively The trusted user SA of A confirmation is to made by the Hash digest hash (10) of above-mentioned transfer amounts and the number of user SA is signed Name Sign (hash (account A)), Sign (hash (account B)) are user SA respectively to the new of user A and user B Made by Hash digest hash (account A), the hash (account B) of account balance.
Step 415, after all verifyings described in the step 414 pass through, the common recognition node of the block chain (has common recognition power The node of limit) it will include that the above-mentioned second block traded is indexed in the distributed data base of above-mentioned block chain, on the block chain All nodes the balance status of user A is updated to hash (account A) in its database, by the remaining sum shape of user B State is updated to hash (account B).
Optionally, account of the node device to user A and user B after generation of transferring accounts to guarantee above-mentioned trusted user SA The approval of user A and user B are passed through in the update of remaining sum, and user A and user B can also be respectively to the nodes of above-mentioned trusted user SA Equipment sends the Hash digest of itself updated account balance and updated account balance and/or to above-mentioned updated The digital signature of the Hash digest of account balance and updated account balance.The above specific process and each reality of this specification The trusted user that applies the selection of user described in example stored in the distributed data base of block chain user by secret protection The process of second data information is similar, and details are not described herein.
Corresponding with the realization of above-mentioned process, the embodiment of this specification additionally provides a kind of privacy transaction dress based on block chain Set the application apparatus with a kind of privacy transaction based on block chain.Above-mentioned apparatus can be by software realization, can also be by hard The mode of part or software and hardware combining is realized.It taking software implementation as an example, is by place equipment as the device on logical meaning CPU (Central Process Unit, central processing unit) corresponding computer program instructions are read into memory operation It is formed.For hardware view, other than CPU shown in Fig. 7, memory and memory, the realization of network risks business Equipment where device also typically includes other hardware such as chip for carrying out wireless signal transmitting-receiving, and/or for realizing net Other hardware such as board of network communication function.
Fig. 5 show a kind of privacy the transaction device 50 based on block chain, applied to the node device of trusted user, In, the trust setting transaction that the trusted user is stored by the distributed data base of block chain determines that the trust setting is handed over It easily include the mark of the corresponding all trusted users of the block chain user;Described device includes:
Receiving unit 502, receives the first message that the block chain user sends, and the first message is protected including non-privacy The first data information protected and the second data information by secret protection, wherein second data information by secret protection It is the first data information conversion gained by the non-secret protection;
First data information is stored in the local number of the node device of the trusted user by storage unit 504 According to library;
Transmission unit 506, Xiang Suoshu block chain send the second transaction, and second transaction includes that second data are believed Breath, so that second transaction is embodied in the distributed data base of the block chain after being verified.
In the another embodiment shown, described device 50 further include:
Authentication unit 508 verifies the first message based on preset proof rule, with after described be verified by institute The local data base that the first data information is stored in the node device of the trusted user is stated, wherein the preset verifying rule It then include described in verifying by the first data information conversion institute that the second data information of secret protection is by the non-secret protection ?.
In the another embodiment shown, the first message includes that the block chain user at least protects the non-privacy First digital signature made by first data information of shield and the block chain user are at least to described by the second of secret protection Second digital signature made by data information;
The preset proof rule further include: verifying first digital signature is at least right by the block chain user First data information of the non-secret protection is made, and it is at least right by the block chain user for verifying second digital signature Second data information by secret protection is made.
In the another embodiment shown, the first message includes that the block chain user at least protects the non-privacy Third digital signature made by the first data information and second data information by secret protection of shield;
The preset proof rule further include: it is at least right by the block chain user for verifying the third digital signature First data information of the non-secret protection and second data information by secret protection are made.
In the another embodiment shown, second transaction further includes the trusted user at least to described by privacy 4th digital signature and the block chain user made by second data information of protection are at least to described by the of secret protection Second digital signature made by two data informations.
In the another embodiment shown, the device 50, further includes:
Acquiring unit 510 obtains the trust setting transaction from the distributed data base of the block chain;
Confirmation unit 512, based on other trusteds user for trusting users to trust described in setting trade confirmation;
The first message chain that the block chain user sends is transmitted to its of the users to trust by transmission unit 514 outside The node device of his trusted user, so that the node that first data information is saved in other trusteds user is set In standby local data base.
In the another embodiment shown, the receiving unit 502 of the device 50: other trusteds user is received At least based on digital signature made by second data information;
Second transaction further includes that other trusteds user is at least based on number made by second data information Word signature.
In the another embodiment shown, second data information by secret protection is the of the non-secret protection The data summarization of one data information.
In the another embodiment shown, the first message includes the block chain user to other blocks chain user Transfer amounts;Second transaction includes by the transfer amounts of secret protection and the block chain user and other described areas The account balance by secret protection of block chain user;
The trusted user is also other described block chain users corresponding trusted user in trusting setting transaction.
The application apparatus 60 for the privacy transaction based on block chain that Fig. 6 show that present description provides a kind of, comprising:
Acquiring unit 602 is obtained from the distributed data base of the block chain and is sent by the node device of trusted user The second transaction, second transaction includes the second data information by secret protection, wherein the trusted user is by block The trust setting transaction of the distributed data base storage of chain determines that the trust setting transaction includes that the block chain user is corresponding All trusted users mark;
Receiving unit 604 receives the first data letter of the non-secret protection of the node device transmission of the trusted user Breath, first data information are saved in the local data base of the node device of the trusted user;
Authentication unit 606, whether verifying second data information by secret protection is by the of the non-secret protection One data information conversion gained;
Applying unit 608 executes the application logic to second transaction.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus Realization process, the relevent part can refer to the partial explaination of embodiments of method, and details are not described herein.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics mould Block, it can it is in one place, or may be distributed on multiple network modules.It can be selected according to the actual needs In some or all of unit or module realize the purpose of this specification scheme.Those of ordinary skill in the art are not paying In the case where creative work, it can understand and implement.
Device that above-described embodiment illustrates, unit, module can specifically be realized, Huo Zheyou by computer chip or entity Product with certain function is realized.A kind of typically to realize that equipment is computer, the concrete form of computer can be a People's computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player, navigation It is any several in equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of kind equipment.
Corresponding with above method embodiment, the embodiment of this specification additionally provides a kind of computer equipment, the calculating Machine equipment includes memory and processor.Wherein, the computer program that can be run by processor is stored on memory;Processing For device in the computer program of operation storage, the privacy method of commerce based on block chain is each in execution this specification embodiment Step.Content before referring to the detailed description of each step of the privacy method of commerce based on block chain, is not repeated.
Corresponding with above method embodiment, the embodiment of this specification additionally provides a kind of computer equipment, the calculating Machine equipment includes memory and processor.Wherein, the computer program that can be run by processor is stored on memory;Processing Device executes the application method of the privacy transaction in this specification embodiment based on block chain in the computer program of operation storage Each step.In before being referred to the detailed description of each step of the application method of the privacy transaction based on block chain Hold, is not repeated.
The foregoing is merely the preferred embodiments of this specification, all in this explanation not to limit this specification Within the spirit and principle of book, any modification, equivalent substitution, improvement and etc. done should be included in the model of this specification protection Within enclosing.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to Herein defines, and computer-readable medium does not include temporary computer readable media (transitory media), such as modulation Data-signal and carrier wave.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program Product.Therefore, the embodiment of this specification can be used complete hardware embodiment, complete software embodiment or combine software and hardware side The form of the embodiment in face.Moreover, it wherein includes that computer is available that the embodiment of this specification, which can be used in one or more, It is real in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form for the computer program product applied.

Claims (22)

1. a kind of privacy method of commerce based on block chain, the node device applied to trusted user, wherein the trusted The trust setting transaction that user is stored by the distributed data base of block chain determines that the trust setting transaction includes the block The mark of the corresponding all trusted users of chain user;The described method includes:
The first message that the block chain user sends is received, the first message includes the first data information of non-secret protection With the second data information by secret protection, wherein second data information by secret protection is protected by the non-privacy First data information of shield converts gained;
First data information is stored in the local data base of the node device of the trusted user;
The second transaction is sent to the block chain, second transaction includes second data information, so that described second hands over It is embodied in the distributed data base of the block chain after being easily verified.
2. according to the method described in claim 1, further include:
The first message is verified based on preset proof rule, to protect first data information after described be verified There are the local data base of the node device of the trusted user, wherein the preset proof rule include verifying it is described by Second data information of secret protection is the first data information conversion gained by the non-secret protection.
3. according to the method described in claim 2, the first message includes the block chain user at least to the non-privacy First digital signature and the block chain user made by first data information of protection are at least to described by the of secret protection Second digital signature made by two data informations;
The preset proof rule further include: verifying first digital signature is by the block chain user at least to described First data information of non-secret protection is made, and verifying second digital signature is by the block chain user at least to described The second data information by secret protection is made.
4. according to the method described in claim 2, the first message includes the block chain user at least to the non-privacy Third digital signature made by the first data information and second data information by secret protection of protection;
The preset proof rule further include: verifying the third digital signature is by the block chain user at least to described First data information of non-secret protection and second data information by secret protection are made.
5. according to the method described in claim 3, second transaction further includes the trusted user at least to described by hidden 4th digital signature and the block chain user made by second data information of private protection are at least to described by secret protection Second digital signature made by second data information.
6. the method according to claim 1, further includes:
The trust setting transaction is obtained from the distributed data base of the block chain;
Based on other trusteds user for trusting users to trust described in setting trade confirmation;
The first message chain that the block chain user sends is transmitted to the section of other trusteds user of the users to trust outside Point device, so that first data information is saved in the local data base of the node device of other trusteds user In.
7. according to the method described in claim 6, further include:
It receives other trusteds user and is at least based on digital signature made by second data information;
Second transaction further includes that other trusteds user is at least based on the label of number made by second data information Name.
8. according to the method described in claim 1, second data information by secret protection is the non-secret protection The data summarization of first data information.
9. according to the method described in claim 1, the first message includes the block chain user to other blocks chain user Transfer amounts;It is described second transaction include by the transfer amounts of secret protection and the block chain user and it is described other The account balance by secret protection of block chain user;
The trusted user is also other described block chain users corresponding trusted user in trusting setting transaction.
10. a kind of application method based on the privacy transaction in block chain, comprising:
Obtain the second transaction sent by the node device of trusted user from the distributed data base of the block chain, described the Two transaction include the second data information by secret protection, wherein the trusted user by block chain distributed data base The trust setting transaction of storage determines that the trust setting transaction includes the corresponding all trusted users of the block chain user Mark;
Receive the first data information of the non-secret protection of the node device transmission of the trusted user, the first data letter Breath is saved in the local data base of the node device of the trusted user;
Whether verifying second data information by secret protection by the first data information of the non-secret protection converts institute , if so, executing the application logic to second transaction.
11. a kind of privacy the transaction device based on block chain, the node device applied to trusted user, wherein described credible It appoints the trust setting transaction that family is stored by the distributed data base of block chain and determines that the trust setting transaction includes the area The mark of the corresponding all trusted users of block chain user;Described device includes:
Receiving unit, receives the first message that the block chain user sends, and the first message includes the of non-secret protection One data information and the second data information by secret protection, wherein second data information by secret protection is by institute State the first data information conversion gained of non-secret protection;
First data information is stored in the local data base of the node device of the trusted user by storage unit;
Transmission unit, Xiang Suoshu block chain send the second transaction, and second transaction includes second data information, so that institute It states and is embodied in after the second transaction is verified in the distributed data base of the block chain.
12. device according to claim 11, further includes:
Authentication unit verifies the first message based on preset proof rule, with after described be verified by described first Data information is stored in the local data base of the node device of the trusted user, wherein the preset proof rule includes By the first data information conversion gained that the second data information of secret protection is by the non-secret protection described in verifying.
13. device according to claim 12, the first message includes the block chain user at least to described not hidden First digital signature and the block chain user made by first data information of private protection are at least to described by secret protection Second digital signature made by second data information;
The preset proof rule further include: verifying first digital signature is by the block chain user at least to described First data information of non-secret protection is made, and verifying second digital signature is by the block chain user at least to described The second data information by secret protection is made.
14. device according to claim 12, the first message includes the block chain user at least to described not hidden Third digital signature made by the first data information and second data information by secret protection of private protection;
The preset proof rule further include: verifying the third digital signature is by the block chain user at least to described First data information of non-secret protection and second data information by secret protection are made.
15. device according to claim 13, second transaction further include the trusted user at least to it is described by 4th digital signature made by second data information of secret protection and the block chain user are at least to described by secret protection The second data information made by the second digital signature.
16. device described in any claim in 1 to 15 according to claim 1, further includes:
Acquiring unit obtains the trust setting transaction from the distributed data base of the block chain;
Confirmation unit, based on other trusteds user for trusting users to trust described in setting trade confirmation;
The first message chain that the block chain user sends is transmitted to other trusteds of the users to trust by transmission unit outside The node device of user, so that first data information is saved in the local of the node device of other trusteds user In database.
17. device according to claim 16, further includes:
Receiving unit receives other trusteds user and is at least based on digital signature made by second data information;
Second transaction further includes that other trusteds user is at least based on the label of number made by second data information Name.
18. device according to claim 11, second data information by secret protection is the non-secret protection The first data information data summarization.
19. device according to claim 11, the first message includes that the block chain user uses to other block chains The transfer amounts at family;It is described second transaction include by the transfer amounts of secret protection and the block chain user and it is described its The account balance by secret protection of his block chain user;
The trusted user is also other described block chain users corresponding trusted user in trusting setting transaction.
20. a kind of application apparatus of the privacy transaction based on block chain, comprising:
Acquiring unit obtains the second friendship sent by the node device of trusted user from the distributed data base of the block chain Easily, second transaction includes the second data information by secret protection, wherein the trusted user by block chain distribution The trust setting transaction of formula database purchase determines, trusts setting transaction including the block chain user it is corresponding it is all can Trust the mark of user;
Receiving unit receives the first data information of the non-secret protection of the node device transmission of the trusted user, described First data information is saved in the local data base of the node device of the trusted user;
Whether authentication unit, verifying second data information by secret protection are believed by the first data of the non-secret protection Breath conversion gained;
Applying unit executes the application logic to second transaction.
21. a kind of computer equipment, comprising: memory and processor;Being stored on the memory can be by processor operation Computer program;When the processor runs the computer program, the side as described in claims 1 to 9 any one is executed Method.
22. a kind of computer equipment, comprising: memory and processor;Being stored on the memory can be by processor operation Computer program;When the processor runs the computer program, method as claimed in claim 10 is executed.
CN201811283623.9A 2018-10-31 2018-10-31 Privacy transaction method and device based on block chain and application method and device thereof Active CN109614813B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811283623.9A CN109614813B (en) 2018-10-31 2018-10-31 Privacy transaction method and device based on block chain and application method and device thereof
TW108110027A TWI727284B (en) 2018-10-31 2019-03-22 Block chain-based privacy transaction method, device and computer equipment, application method based on block chain privacy transaction and computer equipment
PCT/CN2019/103572 WO2020088074A1 (en) 2018-10-31 2019-08-30 Privacy transaction method and apparatus based on blockchain, and application method and apparatus therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811283623.9A CN109614813B (en) 2018-10-31 2018-10-31 Privacy transaction method and device based on block chain and application method and device thereof

Publications (2)

Publication Number Publication Date
CN109614813A true CN109614813A (en) 2019-04-12
CN109614813B CN109614813B (en) 2020-06-23

Family

ID=66002147

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811283623.9A Active CN109614813B (en) 2018-10-31 2018-10-31 Privacy transaction method and device based on block chain and application method and device thereof

Country Status (3)

Country Link
CN (1) CN109614813B (en)
TW (1) TWI727284B (en)
WO (1) WO2020088074A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110197082A (en) * 2019-05-31 2019-09-03 联想(北京)有限公司 Data processing method, data processing equipment and computer system
CN110210238A (en) * 2019-05-31 2019-09-06 联想(北京)有限公司 A kind of data processing method, data processing equipment and computer system
CN110309672A (en) * 2019-07-01 2019-10-08 北京理工大学 A kind of controlled data management method of the secret protection based on block chain
CN110838064A (en) * 2019-10-12 2020-02-25 华中科技大学 Method and system for realizing asset tracing based on Fabric Block Link platform
WO2020088074A1 (en) * 2018-10-31 2020-05-07 阿里巴巴集团控股有限公司 Privacy transaction method and apparatus based on blockchain, and application method and apparatus therefor
WO2020088109A1 (en) * 2018-10-31 2020-05-07 阿里巴巴集团控股有限公司 Blockchain-based private transactions and usage method and apparatus therefor
CN112395642A (en) * 2020-11-20 2021-02-23 湖南智慧政务区块链科技有限公司 Secure multi-party privacy calculation method, device, equipment and storage medium
CN113691633A (en) * 2021-03-30 2021-11-23 支付宝(杭州)信息技术有限公司 Method and device for communication between block chain and equipment under block chain

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI748490B (en) * 2020-05-29 2021-12-01 鴻海精密工業股份有限公司 Privacy protection method, blockchain node device and storage medium for blockchain transfer transactions
CN112883419B (en) * 2021-02-03 2024-04-19 李才美 Data consensus method and device among nodes in distributed network and node equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934715A (en) * 2017-01-23 2017-07-07 天津米游科技有限公司 A kind of high frequency method of commerce and system based on block chain
CN107395557A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of processing method and processing device of service request
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN108632381A (en) * 2018-05-14 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of environment measure of supervision and system based on block chain

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016210327A1 (en) * 2015-06-25 2016-12-29 Websafety, Inc. Management and control of mobile computing device using local and remote software agents
US10417188B2 (en) * 2016-05-27 2019-09-17 Mastercard International Incorporated Method and system for transferring trust across block chain segments
CN106549749B (en) * 2016-12-06 2019-12-24 杭州趣链科技有限公司 Block chain privacy protection method based on addition homomorphic encryption
CN107018125B (en) * 2017-02-17 2019-08-09 阿里巴巴集团控股有限公司 A kind of block catenary system, date storage method and device
CN107729770A (en) * 2017-10-09 2018-02-23 深圳市轱辘车联数据技术有限公司 The management method and system of a kind of vehicle data
CN107682337B (en) * 2017-10-11 2020-09-29 深圳市轱辘汽车维修技术有限公司 Vehicle data processing method and system
TWM565853U (en) * 2018-02-05 2018-08-21 美勢科技有限公司 Asset trading module
CN109584066B (en) * 2018-10-31 2020-09-01 阿里巴巴集团控股有限公司 Privacy transaction based on block chain and application method and device thereof
CN109614813B (en) * 2018-10-31 2020-06-23 阿里巴巴集团控股有限公司 Privacy transaction method and device based on block chain and application method and device thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106934715A (en) * 2017-01-23 2017-07-07 天津米游科技有限公司 A kind of high frequency method of commerce and system based on block chain
CN107395557A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of processing method and processing device of service request
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system
CN108632381A (en) * 2018-05-14 2018-10-09 济南浪潮高新科技投资发展有限公司 A kind of environment measure of supervision and system based on block chain

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020088074A1 (en) * 2018-10-31 2020-05-07 阿里巴巴集团控股有限公司 Privacy transaction method and apparatus based on blockchain, and application method and apparatus therefor
WO2020088109A1 (en) * 2018-10-31 2020-05-07 阿里巴巴集团控股有限公司 Blockchain-based private transactions and usage method and apparatus therefor
CN110197082A (en) * 2019-05-31 2019-09-03 联想(北京)有限公司 Data processing method, data processing equipment and computer system
CN110210238A (en) * 2019-05-31 2019-09-06 联想(北京)有限公司 A kind of data processing method, data processing equipment and computer system
CN110210238B (en) * 2019-05-31 2021-05-18 联想(北京)有限公司 Data processing method, data processing device and computer system
CN110309672A (en) * 2019-07-01 2019-10-08 北京理工大学 A kind of controlled data management method of the secret protection based on block chain
CN110838064A (en) * 2019-10-12 2020-02-25 华中科技大学 Method and system for realizing asset tracing based on Fabric Block Link platform
CN110838064B (en) * 2019-10-12 2022-05-20 华中科技大学 Method and system for tracing assets based on Fabric block chain platform
CN112395642A (en) * 2020-11-20 2021-02-23 湖南智慧政务区块链科技有限公司 Secure multi-party privacy calculation method, device, equipment and storage medium
CN112395642B (en) * 2020-11-20 2024-02-13 湖南智慧政务区块链科技有限公司 Secure multiparty privacy computing method, device, equipment and storage medium
CN113691633A (en) * 2021-03-30 2021-11-23 支付宝(杭州)信息技术有限公司 Method and device for communication between block chain and equipment under block chain

Also Published As

Publication number Publication date
CN109614813B (en) 2020-06-23
TW202018567A (en) 2020-05-16
TWI727284B (en) 2021-05-11
WO2020088074A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
CN109584066A (en) Privacy transaction and its application method and device based on block chain
CN109614813A (en) Privacy method of commerce, device and its application method, device based on block chain
TWI716140B (en) Data processing method and device based on blockchain
CN108681898A (en) A kind of data trade method and system based on block chain
CN107145768A (en) Copyright managing method and system
CN101978646B (en) For performing the system and method for file distributing and purchase
CN110046996A (en) The generation method and device of block chain transaction
CN109583887A (en) A kind of method of commerce and device of block chain
CN109327528A (en) A kind of node administration method and device based on block chain
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN112602083A (en) Multi-blockchain digital transaction information isolation system
CN110009340A (en) Card method and apparatus are deposited based on block chain
CN109951498A (en) A kind of block chain access control method and device based on ciphertext policy ABE encryption
CN109377363B (en) Block chain-based Internet of things data transaction architecture and transaction security method thereof
CN111125756B (en) Zero-trust data right-determining system and method for protecting data privacy
CN111160998B (en) Comment data processing method and device based on block chain and comment system
CN110175208A (en) Rent method and device based on block chain
CN110009339A (en) Data processing method and device based on block chain
CN112801778A (en) Federated bad asset blockchain
KR102205765B1 (en) Method And Apparatus for Providing Wallet for Enhancing Security And keeping Crypto-currency
WO2015122311A1 (en) Payment settlement system, payment settlement device, transaction terminal, payment management method, and program
CN102082815B (en) Terminal-based stepwise anti-counterfeiting verification and identity authentication system and method
CN110458541A (en) Object permutation method and device based on block chain
CN115809440A (en) Method and device for managing copyrighted works based on block chain
CN109858903A (en) A kind of comment information credibility evaluation method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40006848

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240913

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Ant Chain Technology Co.,Ltd.

Country or region after: Singapore

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands

TR01 Transfer of patent right