CN109754250B - Data transaction method and system, platform and storage medium - Google Patents

Data transaction method and system, platform and storage medium Download PDF

Info

Publication number
CN109754250B
CN109754250B CN201811611365.2A CN201811611365A CN109754250B CN 109754250 B CN109754250 B CN 109754250B CN 201811611365 A CN201811611365 A CN 201811611365A CN 109754250 B CN109754250 B CN 109754250B
Authority
CN
China
Prior art keywords
data
transaction
supplier
demander
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811611365.2A
Other languages
Chinese (zh)
Other versions
CN109754250A (en
Inventor
李佳
袁一
潘晓良
颜卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shigengjian Data Technology Shanghai Co ltd
Original Assignee
Shigengjian Data Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shigengjian Data Technology Shanghai Co ltd filed Critical Shigengjian Data Technology Shanghai Co ltd
Priority to CN201811611365.2A priority Critical patent/CN109754250B/en
Priority to US16/366,043 priority patent/US10459990B1/en
Priority to US16/409,822 priority patent/US11546348B2/en
Publication of CN109754250A publication Critical patent/CN109754250A/en
Priority to US16/726,777 priority patent/US10725744B2/en
Priority to US16/746,868 priority patent/US11509637B2/en
Application granted granted Critical
Publication of CN109754250B publication Critical patent/CN109754250B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

A data transaction method, a system, a platform and a storage medium are provided, wherein the data transaction method comprises the following steps: authenticating transaction data of a data supplier; when the authentication is passed, receiving ciphertext data obtained by encrypting the transaction data by the data supplier, and confirming the data demand party; creating an intelligent contract according to the transaction requirement of the data demand party and issuing the intelligent contract to a block chain; when the intelligent contract is monitored to lock the trading fund of the data demand party, sending a trading request to the data supply party; when the data supplier is confirmed to agree with the transaction request and receive the re-encryption key, re-encrypting the ciphertext data to obtain re-encrypted data; and triggering the intelligent contract to send the trading fund of the data demand party to the data supplier, and informing the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the trading data. By adopting the data transaction method, the efficiency and the safety of data transaction can be improved.

Description

Data transaction method and system, platform and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a data transaction method, a data transaction system, a data transaction platform and a data transaction storage medium.
Background
With the development of the internet, online transactions are prevalent, and the internet transactions become a preferred mode for more and more people. The internet transaction provides great convenience for people's life, especially data transaction.
At present, in the whole transaction process, because the two transaction parties can not establish a trust relationship, transaction data is transferred by a centralized transaction platform, and usually, after the transaction is completed, the transfer is carried out by a centralized service platform.
However, the data transaction is performed by adopting a centralized service platform, so that the security of the transaction is difficult to ensure, and the transaction efficiency is low.
Disclosure of Invention
The problem solved by the embodiment of the invention is how to improve the efficiency and the safety of data transaction.
To solve the above technical problem, an embodiment of the present invention provides a data transaction method, including: authenticating the transaction data of the data supplier to obtain an authentication result; when the authentication result is that the transaction data pass, receiving ciphertext data of the data supplier, wherein the ciphertext data is obtained by encrypting the transaction data by the data supplier; confirming a data demand side; creating an intelligent contract according to the transaction demand of the data demand party, wherein the intelligent contract comprises transaction information which comprises transaction money; issuing the intelligent contract to a blockchain; when the intelligent contract is monitored to lock the trading fund of the data demand party, sending a trading request to the data supply party; when the data supplier is confirmed to agree with the transaction request and a re-encryption key generated by the data supplier is received, re-encrypting the ciphertext data to obtain re-encrypted data; triggering the data supplier to make transaction payment with the data demander on the blockchain, comprising: triggering the intelligent contract to send the trading money of the data demand party to the data supply party; and informing the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the transaction data.
Optionally, the authenticating the transaction data of the data supplier to obtain an authentication result includes: acquiring a signature of transaction data of the data supplier, wherein the signature of the transaction data is generated based on a private key of data acquisition equipment for acquiring the transaction data; and acquiring the public key of the data acquisition equipment, and verifying the signature of the transaction data by using the public key of the data acquisition equipment to obtain the authentication result.
Optionally, the confirming the data demander includes: receiving the transaction requirement of the data demander; inquiring to obtain a data range meeting the transaction requirement of the data demander; sending the data range to the data demander; and when receiving the response confirmation of the data demand party to the data range, confirming the data demand party as the data demand party of the transaction.
Optionally, the confirming the data demander includes: creating a data range and releasing the data range to a network; and when receiving the response confirmation of the data demand party to the data range, confirming the data demand party as the data demand party of the transaction.
Optionally, the method further includes: the transaction information also comprises a transaction deadline, and when the data supplier does not agree with the transaction request, the transaction fund in the intelligent contract is triggered to return to the data demand side after the transaction deadline is over.
Optionally, the transaction information further includes a transaction duration, the data supplier includes a plurality of data suppliers, and the intelligent contract relates to the transaction information of the data demander and each data supplier and the data amount of the corresponding transaction data.
Optionally, the intelligent contract comprises a plurality of sub-contracts, each sub-contract corresponding to the data demander and one data supplier.
Optionally, after receiving the ciphertext data of the data provider, the method further includes: and sending the corresponding incentive to the data supplier.
Optionally, before performing re-encryption on the ciphertext data, the method includes: and verifying the re-encryption key.
An embodiment of the present invention further provides a data transaction system, including: the authentication unit is configured to authenticate the transaction data of the data supplier to obtain an authentication result; a first receiving unit configured to receive ciphertext data of the data supplier when the authentication result is pass, the ciphertext data being obtained by encrypting the transaction data by the data supplier; a confirmation unit configured to confirm the data demander; a creating unit configured to create an intelligent contract according to a transaction demand of the data demand party, the intelligent contract including transaction information including a transaction amount; a publishing unit configured to publish the smart contract onto a blockchain; a first sending unit configured to send a transaction request to the data supplier when it is monitored that the smart contract locks the transaction amount of the data supplier; the re-encryption unit is configured to re-encrypt the ciphertext data to obtain re-encrypted data when the data supplier is confirmed to approve the transaction request and a re-encryption key generated by the data supplier is received; a first triggering unit configured to trigger the data supplier to make a transaction payment with the data demander on the blockchain, including: triggering the intelligent contract to send the trading money of the data demand party to the data supply party; and the notification unit is configured to notify the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the transaction data.
Optionally, the authentication unit includes: a first acquisition subunit configured to acquire a signature of transaction data of the supplier, the signature being generated based on a private key of a data acquisition device that acquires the transaction data; and the second acquisition subunit is configured to acquire the public key of the data acquisition device, and verify the signature of the transaction data by using the public key of the data acquisition device to obtain the authentication result.
Optionally, the confirming unit includes: a first receiving subunit configured to receive a transaction requirement of the data demander; the query subunit is configured to query a data range meeting the transaction requirement of the data demander; a first sending subunit configured to send the data range to the data demander; a second receiving subunit configured to, upon receiving a confirmation of a response of the data demander to the data range, confirm the data demander as a data demander of the transaction.
Optionally, the confirming unit includes: a creation subunit configured to create a data range and publish the data range onto a network; a third receiving subunit configured to, upon receiving a confirmation of a response of the data demander to the data range, confirm the data demander as a data demander of the transaction.
Optionally, the transaction information further includes a transaction duration, and the data transaction system further includes: and the second triggering unit is configured to trigger the trading fund in the intelligent contract to return to the data demand side after the trading deadline is over when the data supplier does not agree with the trading request.
Optionally, the method further includes: and the incentive money sending unit is configured to send the corresponding incentive money to the data supplier after receiving the ciphertext data of the data supplier.
Optionally, the method includes: a re-encryption key verification unit configured to verify the re-encryption key before re-encrypting the ciphertext data.
The embodiment of the invention also provides a data transaction platform, which comprises a memory and a processor, wherein the memory stores computer instructions capable of running on the processor, and the processor executes the steps of any data transaction method when the processor runs the computer instructions.
The embodiment of the invention also provides a computer readable storage medium, wherein computer instructions are stored on the computer readable storage medium, and the computer instructions execute the steps of any data transaction method when running.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following beneficial effects:
by adopting the data transaction method of the embodiment of the invention, the transaction data of the data supplier is authenticated, when the authentication result is passed, the ciphertext data of the data supplier is received, the ciphertext data is obtained by encrypting the transaction data by the data supplier, then the data demanding party is confirmed, then the intelligent contract is created according to the transaction demand of the data demanding party, the intelligent contract is issued to the block chain, when the intelligent contract is monitored to lock the transaction fund of the data demanding party, the transaction request is sent to the data supplier, the data supplier agrees the transaction request and receives the re-encryption key generated by the data supplier, the ciphertext data is re-encrypted to obtain the re-encryption data, and then the data supplier and the data demanding party are triggered to carry out transaction payment on the block chain, and the intelligent contract sends the transaction money of the data demand party to the data supply party, and finally informs the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the transaction data. In the data transaction process, the transaction data is authenticated before the transaction, the transaction of the data supplier and the data demander automatically executes the data transaction process through the intelligent contract operated on the block chain, decentralized data transaction is realized, the data supplier and the data demander are automatically triggered to carry out transaction payment on the block chain after the re-encrypted data are obtained, the transfer of transaction money is completed based on the intelligent contract, the occurrence of transaction errors caused by transaction fraud, transaction damage or network reasons can be avoided, and the safety and the transaction efficiency of the data transaction can be improved.
Further, by acquiring the signature of the transaction data of the data supplier and then acquiring the public key of the data acquisition device, the signature of the transaction data is generated based on the private key of the data acquisition device which acquires the transaction data, so that the signature of the transaction data is verified by using the public key of the data acquisition device to obtain an authentication result, and if the signature of the transaction data is not generated from the private key of the data acquisition device, a forged signature can be identified, thereby avoiding the occurrence of network fraud and improving the security of data transaction.
Furthermore, the data range meeting the transaction requirement of the data demand party is obtained through query, the response confirmation of the data demand party is obtained, the data demand party can be quickly confirmed, and the efficiency of data transaction can be improved.
Furthermore, the data range of the data supplier is created and issued to the network, and when the response confirmation of the data demander to the data range is received, the data demander is used as the data demander of the transaction, so that the data demander can claim the data range independently, the data demander can be confirmed more quickly and widely, and the efficiency of data transaction can be improved.
Furthermore, the transaction information also comprises a transaction deadline, and when the data supplier does not agree with the transaction request, the transaction fund in the intelligent contract is automatically returned to the data demand side after the transaction deadline of the intelligent contract is finished, so that the execution of the whole transaction is not hindered even if the data supplier does not agree with the transaction request, and the data transaction efficiency can be improved; and after the transaction deadline of the intelligent contract is finished, the transaction fund is automatically returned to the data demand party, so that the transaction flow can be simplified, and the property safety of the data demand party can be ensured.
Further, after receiving the ciphertext data of the data supplier, the data supplier is sent with a corresponding incentive fee, and the data supplier can be encouraged to provide the data for the data transaction platform again by rewarding the incentive of the data supplier sending the ciphertext data, so that the utilization rate of the data can be improved.
Furthermore, before the ciphertext data is re-encrypted, the re-encryption key is verified, so that the re-encryption by using an error re-encryption key can be avoided, further, the transaction can be avoided under the condition that the re-encryption key is maliciously tampered, further, transaction fraud can be avoided, transaction disputes can be reduced, and the security of data transaction can be further improved.
Drawings
FIG. 1 is a flow chart of a data transaction method in an embodiment of the invention;
FIG. 2 is a flow chart of a transaction data authentication method in an embodiment of the invention;
FIG. 3 is a flow chart of a method for validating a data requestor in an embodiment of the invention;
FIG. 4 is a flow chart of another method for validating a data requestor in accordance with an embodiment of the present invention;
FIG. 5 is a flow chart of another data transaction method in an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a data transaction system according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an authentication unit according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of a validation unit according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of another acknowledgment unit according to an embodiment of the present invention.
Detailed Description
As described in the background art, the existing data transaction method generally adopts a centralized service platform to perform data transaction, and has some disadvantages. For example, once the centralized service platform is attacked, the security of the transaction data and the transaction amount is threatened; and generally, after the transaction is completed, the transfer is carried out by the centralized service platform, so that the efficiency is low. From the above, the current data trading method needs to be optimized.
In the embodiment of the invention, the situation that the transaction process is damaged or unsafe transaction data is used for carrying out the transaction is avoided through the intelligent contract running on the block chain and the authentication of the transaction data before the transaction, so that the safety of the data transaction can be ensured, and the efficiency of the data transaction is improved.
In order to make the above objects, features and advantages of the embodiments of the present invention more comprehensible, specific embodiments accompanied with figures are described in detail below.
Fig. 1 is a flowchart of a data transaction method in the embodiment of the present invention, and in the following embodiments of the present invention, a method for implementing data transaction by using a data transaction platform is exemplified, it should be understood that other network nodes may also be used for implementation as long as data transaction in the embodiment of the present invention can be implemented.
The following is detailed by the specific steps:
and S11, authenticating the transaction data of the data supplier to obtain an authentication result.
In particular implementations, the transaction data of the data supplier may be authenticated in a number of ways. In an embodiment of the present invention, in order to implement the authentication of the transaction data, a data acquisition device with authorization authentication may be used to perform acquisition and encryption, where the data acquisition device may include an encryption chip with authorization authentication.
And S12, when the authentication result is pass, receiving ciphertext data of the data supplier, wherein the ciphertext data is obtained by encrypting the transaction data by the data supplier.
In specific implementation, in order to prevent the data from being stolen by a third party other than the transaction parties, the data supplier may encrypt the transaction data to obtain ciphertext data, and then send the ciphertext data to the data transaction platform.
In a specific implementation, the data provider may encrypt the collected transaction data by using its own public key to obtain the ciphertext data.
In particular implementations, upon receiving ciphertext data of a data supplier, a hash value of the transaction data may be uploaded onto the blockchain.
In specific implementation, the data supplier may encrypt the transaction data by using one or more preset encryption algorithms to obtain ciphertext data, where the encryption algorithm may be any preset asymmetric encryption algorithm such as an elliptic curve encryption algorithm, a digital signature algorithm, and the like.
In particular implementations, the data transaction platform may store the ciphertext data in cloud storage.
In a specific implementation, after receiving the ciphertext data of the data supplier, the data transaction platform may send the corresponding incentive to the data supplier. By exciting and rewarding the data supplier sending the ciphertext data, the data supplier can be excited to provide data for the data transaction platform again, so that the generated data is utilized as much as possible to create value again, and the utilization rate of the data is improved.
And S13, confirming the data demand side.
In particular implementations, the data consumers may be identified in a variety of ways.
In order to quickly confirm the data demand party, the data demand party can autonomously provide a transaction demand to the data transaction platform, the data transaction platform inquires a data range according with the transaction demand, and the data demand party confirms and responds; alternatively, the data transaction platform may create the data range of the data supplier in advance, and then the data demander claims the data range.
In a specific implementation, the data transaction platform may receive the public key provided by the data demander when confirming the data demander.
And S14, creating an intelligent contract according to the transaction requirement of the data demand party, wherein the intelligent contract comprises transaction information, and the transaction information comprises transaction money.
In particular implementations, the data trading platform may create smart contracts based on trading needs of data demanders. The intelligent contract can comprise transaction information, wherein the transaction information can comprise information such as transaction data volume, identity information abstracts of both data exchange parties, transaction funds required by a data demand party for transaction payment, data use specifications to be complied by both parties, and penalty measures in default.
In specific implementation, the intelligent contract can automatically execute corresponding rules according to preset terms, and the judgment of the execution process is accurate and timely, so that the efficiency of data transaction can be improved.
And S15, issuing the intelligent contract to the block chain.
In an embodiment of the invention, the data trading platform may publish the smart contracts onto the blockchain. The block chain has the characteristics of decentralization, non-tampering and the like, so that once the intelligent contract is issued to the block chain, the intelligent contract cannot be tampered, the automatic execution of the intelligent contract cannot be interfered, and the two parties of the data transaction can check the execution condition of the intelligent contract in real time, so that the safety of the data transaction can be improved.
And S16, when it is monitored that the intelligent contract locks the trading fund of the data demand party, sending a trading request to the data supply party.
In a specific implementation, when the data trading platform monitors that the intelligent contract locks the trading fund of the data demand party, the data trading platform can send a trading request to the data supplier contained in the intelligent contract. Because the trading fund of the data demand party appears in the intelligent contract, the data trading platform can determine that the data demand party agrees with the corresponding clause in the intelligent contract, and then the data trading platform can send a trading request to the data supplier in the intelligent contract, so that the efficiency of data trading can be improved.
In a specific implementation, the data transaction platform may poll the smart contract, where the polling time interval may be 10 seconds, 20 seconds, 30 seconds, or the like, and in a specific implementation, the polling time interval is not particularly limited, and may be set by the user as needed.
And S17, when the data supplier agrees to the transaction request and receives the re-encryption key generated by the data supplier, re-encrypting the ciphertext data to obtain re-encrypted data.
In specific implementation, before the data transaction platform re-encrypts the ciphertext data, the data transaction platform may verify the re-encryption key, so as to avoid re-encryption using an incorrect re-encryption key, and further avoid a transaction occurring under a condition that the re-encryption key is maliciously tampered, thereby avoiding transaction fraud, reducing transaction disputes, and further improving security of data transaction.
In the embodiment of the invention, when the data transaction platform receives a transaction agreement request of a data supplier and a re-encryption key generated by the data supplier, the re-encryption key is used for re-encrypting ciphertext data uploaded on the data transaction platform by the data supplier to obtain the re-encrypted data.
In a specific implementation, when the data transaction platform sends a transaction request to the data supplier, the data supplier may also send a public key of the data demander, where the data supplier may generate a re-encryption key using its own private key and the public key of the data demander.
In particular implementations, the data trafficking platform may store the generated re-encrypted data in cloud storage.
In specific implementation, the transaction information in the intelligent contract further comprises a transaction deadline, and when the data supplier does not agree with the transaction request, after the transaction deadline of the intelligent contract is finished, the transaction fund of the data demand party in the intelligent contract can be triggered to automatically return to the data demand party, so that the execution of the whole transaction is not hindered even if the data supplier does not agree with the transaction request, and the data transaction efficiency can be improved; and after the transaction deadline of the intelligent contract is finished, the transaction fund is automatically returned to the data demand party, so that the transaction flow can be simplified, and the property safety of the data demand party can be ensured.
In other embodiments, the trading of the data consumer may be refunded when the data supplier refuses to sell the data.
S18, triggering the data supplier and the data demander to pay for the transaction on the blockchain, including: and triggering the intelligent contract to send the trading money of the data demand party to the data supply party.
In specific implementation, after the data transaction platform generates the re-encrypted data, the intelligent contract is triggered to update the state, and according to a state machine in the intelligent contract, the intelligent contract can automatically send the transaction money of the data demand party to a data supply party in the intelligent contract.
And S19, informing the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the transaction data.
In specific implementation, after the data demand party extracts the re-encrypted data from the data transaction platform, the re-encrypted data can be decrypted by using a private key of the data demand party, so that transaction data is obtained.
By adopting the embodiment, the transaction data is authenticated before the transaction, the data transaction process is automatically executed by the transaction of the data supplier and the data demand party through the intelligent contract operated on the block chain, the decentralized data transaction is realized, the data supplier and the data demand party are automatically triggered to carry out transaction payment on the block chain after the re-encrypted data is obtained, and the transfer of the transaction fund is completed based on the intelligent contract, so that the occurrence of transaction errors caused by transaction fraud, transaction damage or network reasons can be avoided, and the safety and the transaction efficiency of the data transaction can be improved.
In order to make the embodiment of the present invention better understood and realized by those skilled in the art, a transaction data authentication method adopted by the embodiment of the present invention is further described in detail through specific steps with reference to fig. 2.
As shown in FIG. 2, in one embodiment of the invention, the following steps may be taken to authenticate the transaction data:
and S111, acquiring a signature of the transaction data of the data supplier, wherein the signature of the transaction data is generated based on a private key of data acquisition equipment for acquiring the transaction data.
In a specific implementation, the data acquisition device may generate a pair of public and private keys in advance, and when the data acquisition device is acquiring transaction data, a signature of the transaction data may be generated on the acquired transaction data by using the private key generated in advance by the data acquisition device.
And S112, acquiring the public key of the data acquisition equipment, and verifying the signature of the transaction data by using the public key of the data acquisition equipment to obtain the authentication result.
In specific implementation, the data transaction platform may obtain a public key of the data acquisition device in advance, verify a signature of the acquired transaction data by using the public key of the data acquisition device, and identify a forged signature if the signature of the transaction data is not generated by a private key of the data acquisition device.
In an embodiment of the present invention, the data acquisition device includes an encryption chip, the encryption chip may generate a public and private key pair of the data acquisition device, generate a signature of the transaction data based on a private key of the data acquisition device, and may send a public key of the data acquisition device to the data transaction platform in advance. The data transaction platform can adopt the public key of the data acquisition equipment to verify whether the received signature comes from the data acquisition equipment, so that the forged signature can be identified, and the data security can be enhanced.
As can be seen from the above, by obtaining the signature of the transaction data of the data supplier and then obtaining the public key of the data acquisition device, since the signature of the transaction data is generated based on the private key of the data acquisition device that acquires the transaction data, the public key of the data acquisition device is used to verify the signature of the transaction data, and an authentication result is obtained, and if the signature of the transaction data is not generated from the private key of the data acquisition device, a counterfeit signature can be identified, so that the occurrence of network fraud can be avoided, and the security of data transaction is improved.
In particular embodiments, as mentioned above, the data requester can be identified in various ways, and the following detailed description is provided by way of embodiments.
As shown in fig. 3, in an embodiment of the present invention, the following steps may be adopted to identify the data demander:
s131a, receiving the transaction requirement of the data demand party.
The data demand party can provide the data transaction platform with transaction demands according to the data required by the data demand party, wherein the transaction demands can be requirements or conditions of the data demand party for purchasing the data.
And S132a, inquiring to obtain a data range meeting the transaction requirement of the data demander.
In specific implementation, the data transaction platform can query according to the transaction requirements of the data demand party, and obtain a data range meeting the transaction requirements.
In a specific implementation, the data range may be attribute information of various types of real data records or virtual data. For example, for the field of car networking, the data requirement may be vehicle data such as a model, a travel section, mileage, a time period, etc. of the vehicle; for the medical health field, the data range may be the blood pressure, heart rate, blood concentration, etc. of the human body recorded by the medical device. For the field of internet of things such as smart home, the data range can be the data such as the temperature, the wind speed, the geographic position, the startup duration and the like of the air conditioner. In particular implementations, there is no particular limitation on the type of data range. Note that the data range contains only non-private data.
And S133a, sending the data range to the data demand side.
In a specific implementation, the data transaction platform may send the queried data range to the data demander.
S134a, when receiving the acknowledgement of the data range from the data demander, identifying the data demander as the data demander of the transaction.
In a specific implementation, the data demander may perform response confirmation on a data range sent by the data transaction platform, and when the data transaction platform receives the response confirmation of the data demander on the data range, the data demander may be confirmed as the data demander of the transaction.
By adopting the embodiment, the data range meeting the transaction requirement of the data demand party is obtained through inquiry, the response confirmation of the data demand party is obtained, the data demand party can be quickly obtained, and the efficiency of data transaction can be improved.
As shown in FIG. 4, in another embodiment of the present invention, the following steps may be taken to identify the data demander:
s131b, a data range is created and published onto the network.
In particular implementations, the data trafficking platform may create a data range from data from a data supplier and publish the data range to the network.
And S132b, when the response confirmation of the data demand side to the data range is received, the data demand side is confirmed as the data demand side of the transaction.
In a specific implementation, when a data range published on the network is queried by a data demander and the data range meets the data requirement of the data demander, the data demander can perform response confirmation on the data range, and when the data trading platform receives the response confirmation, the data demander can be confirmed as the data demander of the trade.
By adopting the embodiment, the data range of the data supplier is created and issued to the network, and when the response confirmation of the data demander to the data range is received, the data demander is confirmed as the data demander of the transaction, so that the data demander can independently claim the data range, the data demander can be rapidly and widely acquired, and the efficiency of data transaction can be improved.
In order to enable those skilled in the art to better understand and implement the embodiments of the present invention, the following detailed description is provided by way of specific application scenarios.
With the use of various sensors, a large amount of data is generated. Taking vehicle data as an example, during the running process of a vehicle, various sensors on the vehicle can generate a large amount of data in real time, such as tire pressure data, voltage data, oil consumption data and the like, and road condition information, maintenance records and the like recorded by a vehicle running recorder, and unexpected values can be created by mining and analyzing the generated large amount of data, so that the current demand for trading on various data exists. However, in the current transaction process, both parties of the transaction need to establish a trust relationship with each other or a third-party service platform is needed as an intermediary to implement the transaction of data, and the transaction process is not good at both security and efficiency of the transaction.
As shown in fig. 5, the following describes specific steps of implementing data transaction according to an embodiment of the present invention in detail:
s501, the data transaction platform C authenticates the transaction data.
In the embodiment of the invention, the data transaction platform C acquires the signature of the transaction data of the data supplier B and then acquires the public key of the data acquisition equipment A, and if the signature of the transaction data is generated based on the private key of the data acquisition equipment A which acquires the transaction data, the transaction data passes the authentication.
S502, the data supplier B uploads the ciphertext data to the data transaction platform C.
In the embodiment of the present invention, the data supplier B authorizes the data acquisition device a, so the transaction data acquired by the data acquisition device a may be named PlainB.
In particular implementations, data collection device A may have a cryptographic chip built therein that may generate a public-private key pair for data collection device A, including public key PkB and private key SkB (named here based on authorization processing by data collection device A by data provider B). The encryption chip can encrypt the collected transaction data PlainA by using the public key PkB to obtain ciphertext data encrypt tB.
And S503, uploading the hash value HashB to the block chain by the data transaction platform C.
In the embodiment of the present invention, the data supplier B may perform hash calculation on the transaction data PlainB by using a preset algorithm to obtain a hash value HashB, and upload the hash value HashB to the block chain D.
The transaction data PlainB is operated to generate irreversible hash values HashB which correspond to the transaction data one by one, and the data demand party E which obtains the hash values HashB cannot obtain the transaction data PlainB through the hash values HashB, for example, the hash values HashB of the transaction data PlainB can represent summary information and signatures of the transaction data PlainB and the data supply party B, so that the transaction data PlainB still belongs to the data supply party B, further the right of the transaction data PlainB can be ensured, and the data property safety can be ensured.
In a specific implementation, the hash algorithm may be a conventional hash algorithm, such as SHA256 or SHA 3. It should be noted that the hash algorithm is only an example, and in other embodiments, other hash operation methods may be used.
S504, the data transaction platform C sends incentive to the data supplier B.
In a specific implementation, after receiving the ciphertext data encrypt tb of the data supplier B, the data transaction platform C may send a corresponding incentive to the data supplier B.
And S505, the data demand party E puts forward a transaction demand to the data transaction platform C.
S506, the data transaction platform C queries a data range.
S507, the data transaction platform C sends a data range to the data demand party E.
S508, the data demand party E sends a response confirmation to the data transaction platform C.
In a specific implementation, the steps S505 to S508 can refer to the detailed description of the above embodiments, and are not repeated herein.
S509, the data transaction platform C creates an intelligent contract.
In implementation, the data transaction platform C may create an intelligent contract according to the transaction requirement of the data demander E, and the intelligent contract may automatically execute a corresponding rule according to a preset term.
In particular implementations, when a smart contract is created, the smart contract may include trade information, which may include a trade deadline and a desired trading fund.
S510, the data transaction platform C sends the intelligent contract to the block chain D.
In particular implementations, blockchain D may be an ethernet house (ETH), a commercial distributed design blockchain operating system (EOS), or other public, alliance, or private chain.
And S511, the data demand party E carries out transaction payment in the intelligent contract.
In particular implementations, a particular form of transaction payment may be a pass through quota.
S512, the data trading platform C monitors the occurrence of trading funds in the intelligent contract.
In a specific implementation, the data transaction platform C may poll the intelligent contract, so as to monitor the status shown by the intelligent contract, or the intelligent contract may send status update information to the data transaction platform C when the trading fund occurs.
S513, the data transaction platform C sends a transaction request to the data supplier B.
In particular implementations, the data trafficking platform C may send the public key PkE of the data consumer E at the same time as sending a traffic request to the data supplier B.
The data consumer E may generate the public key PkE and the private key SkE using a preset public-private key pair generator. In a specific implementation, the public and private key pair generator may be implemented in software, may also be implemented in a form of a hardware offline tool, or may be implemented in a form of a combination of software and hardware.
S514, the data supplier B approves the transaction request and sends the re-encryption key.
In a specific implementation, the data supplier B generates the re-encryption key RekeyBE using its own private key SkB and the received public key PkE of the data consumer E, and sends it to the data transaction platform C.
And S515, the data transaction platform B performs re-encryption.
In specific implementation, the data transaction platform B may use the received re-encryption key RekeyBE to re-encrypt the ciphertext data EncryptB to obtain re-encrypted data EncryptBE, and store the re-encrypted data EncryptBE in the cloud storage of the data transaction platform B.
And S516, updating the intelligent contract state.
In a specific implementation, after the data transaction platform B performs re-encryption, the intelligent contract in the blockchain D may perform state update, and automatically execute a preset instruction in the intelligent contract.
And S517, the data transaction platform C sends transaction payment.
In the implementation, after the state of the intelligent contract in the blockchain D is updated, the intelligent contract automatically sends the transaction fund of the data demand party E to the data supply party B.
S518, the data transaction platform C notifies extraction of the re-encrypted data.
In specific implementation, the data transaction platform C may notify the data demanding party E to extract the re-encrypted data EncryptBE in the cloud storage of the data transaction platform C, and enable the data demanding party E to decrypt the re-encrypted data EncryptBE by using its own private key SkE, so as to obtain the transaction data PlainB.
By adopting the embodiment, in the data transaction process, the intelligent contract under the blockchain and the authentication of the transaction data before the transaction are adopted, so that the condition of damage in the transaction process can be avoided, the use of unsafe transaction data for transaction is avoided, the security of the data transaction can be further ensured, and the efficiency of the data transaction is improved.
In a specific implementation, the data supplier may be multiple, that is, multiple data suppliers and data demanders may complete data transaction through one intelligent contract. In the transaction process, one intelligent contract comprises a plurality of sub-contracts, each sub-contract corresponds to the data demand party and one data supply party, and when one data supply party does not agree with a transaction request, the intelligent contracts under the block chain and the authentication of transaction data before the transaction are carried out, so that the situation that the transaction process is damaged can be avoided, the use of unsafe transaction data for carrying out the transaction is avoided, the safety of the data transaction can be ensured, and the efficiency of the data transaction is improved.
To enable those skilled in the art to better understand and implement the embodiments of the present invention, a data transaction system is described with reference to fig. 6.
Referring to fig. 6, in a specific embodiment, an embodiment of the present invention provides a system 60 for data transaction, including:
an authentication unit 611 configured to authenticate transaction data of a data supplier, resulting in an authentication result;
a first receiving unit 612, configured to receive ciphertext data of the data provider when the authentication result is pass, where the ciphertext data is obtained by encrypting the transaction data by the data provider;
a validation unit 613 configured to validate the data demander;
a creating unit 614 configured to create an intelligent contract according to the transaction demand of the data demand party, the intelligent contract including transaction information, the transaction information including a transaction fund;
a publishing unit 615 configured to publish the smart contract onto a blockchain;
a first sending unit 616 configured to send a transaction request to the data supplier when it is monitored that the smart contract locks the transaction amount of the data demander;
a re-encryption unit 617 configured to re-encrypt the ciphertext data to obtain re-encrypted data when it is confirmed that the data supplier agrees with the transaction request and a re-encryption key generated by the data supplier is received;
a first triggering unit 618 configured to trigger the data supplier to make transaction payment with the data demander on the blockchain, including: triggering the intelligent contract to send the trading money of the data demand party to the data supply party;
a notification unit 619 configured to notify the data consumer to extract and decrypt the re-encrypted data to obtain the transaction data.
By adopting the data transaction system, as the transaction parties in the system automatically execute the data transaction process through the intelligent contract running on the block chain, decentralized data transaction is realized, and after the re-encrypted data is obtained, the data supplier and the data demand party are automatically triggered to carry out transaction payment on the block chain, and the transfer of transaction money is completed based on the intelligent contract, so that the occurrence of transaction errors can be avoided, and the security and the transaction efficiency of the data transaction can be improved.
In a specific implementation, as shown in fig. 7, the authentication unit 611 may include:
a first obtaining sub-unit 6111 configured to obtain a signature of transaction data of the supplier, the signature being generated based on a private key of a data collecting device that collects the transaction data;
the second obtaining subunit 6112 is configured to obtain the public key of the data acquisition device, and verify the signature of the transaction data by using the public key of the data acquisition device, so as to obtain the authentication result.
In a specific implementation, as shown in fig. 8, the confirming unit 613 may include:
a first receiving subunit 6131a configured to receive the transaction requirement of the data demanding party;
the query subunit 6132a is configured to query to obtain a data range meeting the transaction requirement of the data demander;
a first sending subunit 6133a configured to send the data range to the data demander;
a second receiving sub-unit 6134a, configured to, when receiving the acknowledgement of the response of the data demander to the data range, acknowledge the data demander as the data demander of the transaction.
In another specific implementation, as shown in fig. 9, the confirming unit 613 may include:
a create sub-unit 6131b configured to create and publish the data range onto the network;
a third receiving subunit 6132b, configured to, when receiving the acknowledgement of the response of the data demander to the data range, acknowledge the data demander as the data demander of the transaction.
With continued reference to fig. 6, in particular implementations, the data trafficking system 60 may further include: and an incentive money transmitting unit 620 configured to transmit an incentive money to the data provider after receiving the ciphertext data of the data provider.
In particular implementations, the data trafficking system 60 may further include: a second triggering unit 621, configured to trigger the return of the trading fund of the data demand side in the intelligent contract to the data demand side after the trading deadline set by the intelligent contract is over when the data supplier does not agree with the trading request.
In particular implementations, the data trafficking system 60 may further include: a re-encryption key verification unit 622 configured to verify the re-encryption key before re-encrypting the ciphertext data.
An embodiment of the present invention further provides a data transaction platform, which includes a memory and a processor, where the memory may store a computer instruction capable of being executed on the processor, and the processor executes the steps of the data transaction method according to any one of the embodiments when executing the computer instruction.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer instruction is stored, and when the computer instruction runs, the steps of the data transaction method according to any of the above embodiments are executed. The computer storage medium may include: ROM, RAM, magnetic or optical disks, and the like.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (18)

1. A method of data transaction, comprising:
authenticating the transaction data of the data supplier to obtain an authentication result;
when the authentication result is that the transaction data pass, receiving ciphertext data of the data supplier, wherein the ciphertext data is obtained by encrypting the transaction data by the data supplier;
confirming a data demand side;
creating an intelligent contract according to the transaction requirement of the data demand party, wherein the intelligent contract comprises transaction information, and the transaction information comprises transaction fund information required by the data demand party for transaction payment;
issuing the intelligent contract to a blockchain;
when the intelligent contract is monitored to lock the trading fund of the data demand party, sending a trading request to the data supply party;
when the data supplier is confirmed to agree with the transaction request and a re-encryption key generated by the data supplier is received, re-encrypting the ciphertext data to obtain re-encrypted data;
triggering the data supplier to make transaction payment with the data demander on the blockchain, comprising: triggering the intelligent contract to send the trading money of the data demand party to the data supply party;
and informing the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the transaction data.
2. The data transaction method of claim 1, wherein the authenticating the transaction data of the data supplier to obtain the authentication result comprises:
acquiring a signature of transaction data of the data supplier, wherein the signature of the transaction data is generated based on a private key of data acquisition equipment for acquiring the transaction data;
and acquiring the public key of the data acquisition equipment, and verifying the signature of the transaction data by using the public key of the data acquisition equipment to obtain the authentication result.
3. The data transaction method of claim 1, wherein said validating the data requestor comprises:
receiving the transaction requirement of the data demander;
inquiring to obtain a data range meeting the transaction requirement of the data demander;
sending the data range to the data demander;
and when receiving the response confirmation of the data demand party to the data range, confirming the data demand party as the data demand party of the transaction.
4. The data transaction method of claim 1, wherein said validating the data requestor comprises:
creating a data range and releasing the data range to a network;
and when receiving the response confirmation of the data demand party to the data range, confirming the data demand party as the data demand party of the transaction.
5. The data transaction method of claim 1, further comprising:
the transaction information also comprises a transaction deadline, and when the data supplier does not agree with the transaction request, the transaction fund in the intelligent contract is triggered to return to the data demand side after the transaction deadline is over.
6. The data transaction method of claim 1, wherein the transaction information further includes a transaction term, the data supplier includes a plurality of data suppliers, and the smart contract relates to the transaction information of the data demander and each data supplier and a data amount of the corresponding transaction data.
7. A data transaction method according to claim 6, wherein the intelligent contract comprises a plurality of sub-contracts, each sub-contract corresponding to the data requiring party and one data supplying party.
8. The data transaction method of claim 1, further comprising, after receiving ciphertext data of the data supplier: and sending the corresponding incentive to the data supplier.
9. The data transaction method according to claim 1, wherein before re-encrypting the ciphertext data, the method comprises: and verifying the re-encryption key.
10. A data transaction system, comprising:
the authentication unit is configured to authenticate the transaction data of the data supplier to obtain an authentication result;
a first receiving unit configured to receive ciphertext data of the data supplier when the authentication result is pass, the ciphertext data being obtained by encrypting the transaction data by the data supplier;
a confirmation unit configured to confirm the data demander;
the creating unit is configured to create an intelligent contract according to the transaction requirement of the data demand party, the intelligent contract comprises transaction information, and the transaction information comprises transaction fund information required by the data demand party for transaction payment;
a publishing unit configured to publish the smart contract onto a blockchain;
a first sending unit configured to send a transaction request to the data supplier when it is monitored that the smart contract locks the transaction amount of the data supplier;
the re-encryption unit is configured to re-encrypt the ciphertext data to obtain re-encrypted data when the data supplier is confirmed to approve the transaction request and a re-encryption key generated by the data supplier is received;
a first triggering unit configured to trigger the data supplier to make a transaction payment with the data demander on the blockchain, including: triggering the intelligent contract to send the trading money of the data demand party to the data supply party;
and the notification unit is configured to notify the data demand party to extract the re-encrypted data and decrypt the re-encrypted data to obtain the transaction data.
11. The data transaction system of claim 10, wherein the authentication unit comprises:
a first acquisition subunit configured to acquire a signature of transaction data of the supplier, the signature being generated based on a private key of a data acquisition device that acquires the transaction data;
and the second acquisition subunit is configured to acquire the public key of the data acquisition device, and verify the signature of the transaction data by using the public key of the data acquisition device to obtain the authentication result.
12. The data transaction system of claim 10, wherein the confirmation unit comprises:
a first receiving subunit configured to receive a transaction requirement of the data demander;
the query subunit is configured to query a data range meeting the transaction requirement of the data demander;
a first sending subunit configured to send the data range to the data demander;
a second receiving subunit configured to, upon receiving a confirmation of a response of the data demander to the data range, confirm the data demander as a data demander of the transaction.
13. The data transaction system of claim 10, wherein the confirmation unit comprises:
a creation subunit configured to create a data range and publish the data range onto a network;
a third receiving subunit configured to, upon receiving a confirmation of a response of the data demander to the data range, confirm the data demander as a data demander of the transaction.
14. The data trafficking system of claim 10, wherein the traffic information further includes a traffic deadline, the data trafficking system further comprising:
and the second triggering unit is configured to trigger the trading fund in the intelligent contract to return to the data demand side after the trading deadline is over when the data supplier does not agree with the trading request.
15. The data transaction system of claim 10, further comprising:
and the incentive money sending unit is configured to send the corresponding incentive money to the data supplier after receiving the ciphertext data of the data supplier.
16. The data transaction system of claim 10, comprising:
a re-encryption key verification unit configured to verify the re-encryption key before re-encrypting the ciphertext data.
17. A data trafficking platform comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, wherein the processor executes the computer instructions to perform the steps of the data trafficking method of any of claims 1 through 9.
18. A computer readable storage medium having stored thereon computer instructions, wherein the computer instructions when executed perform the steps of the data transaction method of any of claims 1 to 9.
CN201811611365.2A 2018-12-27 2018-12-27 Data transaction method and system, platform and storage medium Active CN109754250B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201811611365.2A CN109754250B (en) 2018-12-27 2018-12-27 Data transaction method and system, platform and storage medium
US16/366,043 US10459990B1 (en) 2018-12-27 2019-03-27 Data processing method and device, medium and terminal thereof
US16/409,822 US11546348B2 (en) 2018-12-27 2019-05-12 Data service system
US16/726,777 US10725744B2 (en) 2018-12-27 2019-12-24 Method for adapting to blockchain and device, terminal and medium performing the same
US16/746,868 US11509637B2 (en) 2018-12-27 2020-01-18 Data transmission method, system and platform using blockchain, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811611365.2A CN109754250B (en) 2018-12-27 2018-12-27 Data transaction method and system, platform and storage medium

Publications (2)

Publication Number Publication Date
CN109754250A CN109754250A (en) 2019-05-14
CN109754250B true CN109754250B (en) 2021-06-08

Family

ID=66403037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811611365.2A Active CN109754250B (en) 2018-12-27 2018-12-27 Data transaction method and system, platform and storage medium

Country Status (1)

Country Link
CN (1) CN109754250B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263089B (en) * 2019-05-20 2021-05-04 创新先进技术有限公司 Receipt storage method and node combining conditional restrictions of transaction and event types
CN110225032B (en) * 2019-06-11 2019-12-24 北京艾摩瑞策科技有限公司 Business data transaction method and equipment
CN110210861A (en) * 2019-06-11 2019-09-06 北京艾摩瑞策科技有限公司 Data trade method and its equipment on block chain
CN110493335B (en) * 2019-08-15 2022-07-01 京东方科技集团股份有限公司 Sharing method and system of biological characteristic data and computer equipment
CN110503560A (en) * 2019-09-27 2019-11-26 深圳市网心科技有限公司 Data trade method, data trade apparatus and system based on block chain
CN111212125A (en) * 2019-12-27 2020-05-29 成都商通数治科技有限公司 Data exchange method and system based on block chain
CN113111355A (en) * 2020-01-13 2021-07-13 华控清交信息科技(北京)有限公司 Authority management method, device, system and storage medium
CN112566047B (en) * 2020-11-25 2022-07-12 中国联合网络通信集团有限公司 Method, device and system for determining authority of V2X interaction information based on alliance chain
CN113379465A (en) * 2021-06-29 2021-09-10 北京百度网讯科技有限公司 Block chain-based site selection method, device, equipment and storage medium
CN113744856B (en) * 2021-08-29 2024-03-19 上海舵衔数字科技中心 Medicine payment method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107464118A (en) * 2017-08-16 2017-12-12 济南浪潮高新科技投资发展有限公司 A kind of data trade method based on block chain intelligence contract
CN108615154A (en) * 2018-05-01 2018-10-02 王锐 A kind of block chain digital signature system and process for using based on hardware encipherment protection
CN108647964A (en) * 2018-05-02 2018-10-12 郑杰骞 A kind of block chain data processing method, device and computer readable storage medium
CN109064324A (en) * 2018-06-15 2018-12-21 重庆金融资产交易所有限责任公司 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10079682B2 (en) * 2015-12-22 2018-09-18 Gemalto Sa Method for managing a trusted identity
US10755230B2 (en) * 2017-05-19 2020-08-25 Zest Labs, Inc. Process and condition recording and validation using a blockchain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107464118A (en) * 2017-08-16 2017-12-12 济南浪潮高新科技投资发展有限公司 A kind of data trade method based on block chain intelligence contract
CN108615154A (en) * 2018-05-01 2018-10-02 王锐 A kind of block chain digital signature system and process for using based on hardware encipherment protection
CN108647964A (en) * 2018-05-02 2018-10-12 郑杰骞 A kind of block chain data processing method, device and computer readable storage medium
CN109064324A (en) * 2018-06-15 2018-12-21 重庆金融资产交易所有限责任公司 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链和同态加密的电子健康记录隐私保护方案;徐文玉 等;《计算机研究与发展》;20181015;第55卷(第10期);第2233-2243页 *

Also Published As

Publication number Publication date
CN109754250A (en) 2019-05-14

Similar Documents

Publication Publication Date Title
CN109754250B (en) Data transaction method and system, platform and storage medium
Baza et al. Privacy-preserving blockchain-based energy trading schemes for electric vehicles
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
Li et al. A privacy-preserving charging scheme for electric vehicles using blockchain and fog computing
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
CN107274139B (en) Bill data management method and computer-readable medium
CN109035014B (en) Data transaction system
JP7296596B2 (en) Distributed Consensus Algorithm, Device and Computer Readable Storage Medium for Rapid Generation of Blocks
CN111209334B (en) Power terminal data security management method based on block chain
US8312276B2 (en) Method for sending and receiving an evaluation of reputation in a social network
JP2023509340A (en) Methods and systems for confirmation and transfer of property rights, electronic devices and storage media
CN111415157A (en) Block chain-based data asset safety circulation method
JP2020526069A (en) Controlled cryptographic private key release
CN106503098A (en) It is built in the block chain cloud service frame system of Paas service layers
CN110933125A (en) Block chain entity, down-link entity, authentication device and method for performing collaboration
US11509637B2 (en) Data transmission method, system and platform using blockchain, and storage medium
WO2019140199A1 (en) Systems and methods for key exchange in blockchain
CN110599342B (en) Block chain-based identity information authorization method and device
CN109523045B (en) Method and equipment for providing travel service
CN109034796A (en) Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN115114658B (en) Verifiable data transaction method, device, equipment and medium based on blockchain
CN111027981B (en) Method and device for multi-party joint training of risk assessment model for IoT (Internet of things) machine
CN114401268A (en) Cross-link data sharing method, system, equipment and readable storage medium
CN110992032A (en) Method and device for evaluating credible users by combining multiple parties
Baza et al. A blockchain-based energy trading scheme for electric vehicles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant