CN110020951A - A kind of transaction data authentication method, apparatus and storage medium based on block chain - Google Patents
A kind of transaction data authentication method, apparatus and storage medium based on block chain Download PDFInfo
- Publication number
- CN110020951A CN110020951A CN201910286296.0A CN201910286296A CN110020951A CN 110020951 A CN110020951 A CN 110020951A CN 201910286296 A CN201910286296 A CN 201910286296A CN 110020951 A CN110020951 A CN 110020951A
- Authority
- CN
- China
- Prior art keywords
- data
- transaction data
- verified
- compared
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/08—Auctions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
This application provides a kind of transaction data authentication method, apparatus and storage medium based on block chain, wherein this method comprises: obtaining transaction data to be verified;It is handled using the to be verified transaction data of the pre-defined algorithm to acquisition, obtains the corresponding data to be compared of the transaction data to be verified;Normal data corresponding with the transaction data to be verified is obtained from block chain, and whether the determination data to be compared match with the normal data;When the data to be compared and the normal data mismatch, the transaction data authentication failure to be verified is determined.Since the data being stored in block chain have the characteristics that not distorting, and the storage record of the data of each deposit can all be traced, therefore the normal data of the storage in block chain is accurate, data to be compared are matched with normal data, it is ensured that authenticity and accuracy more accurate, that completely verify transaction data to be verified.
Description
Technical field
This application involves Internet technical field, more particularly, to a kind of transaction data authentication method based on block chain,
Device and storage medium.
Background technique
Bidding industry is related to that interests are big, and the requirement to data safety and confidentiality is no less than financial industry.With bid
The extensive use of area of procurement whole process e-transaction, at the same generate data by big data technology deepen continuously excavation with
Good application, everybody is more and more to the query of data authenticity and integrity.
In the prior art, electronic transaction data system, the credible storage of key business data and data fidelity may be deposited
It is inaccurate, complete to the verifying of the authenticity and accuracy of data itself in problem.
Summary of the invention
In view of this, the application be designed to provide a kind of transaction data authentication method, apparatus based on block chain and
Storage medium, the transaction data to be verified that will acquire are handled using pre-defined algorithm, obtain data to be compared;Again from block
The corresponding normal data of the transaction data to be verified is obtained in chain, data to be compared is matched with normal data, to test
Demonstrate,prove the authenticity and accuracy of transaction data to be verified.
In a first aspect, the embodiment of the present application provides a kind of transaction data authentication method based on block chain, the method
Include:
Obtain transaction data to be verified;
It is handled using the to be verified transaction data of the pre-defined algorithm to acquisition, obtains the transaction data to be verified
Corresponding data to be compared;
Normal data corresponding with the transaction data to be verified, and the determination data to be compared are obtained from block chain
Whether matched with the normal data;
When the data to be compared and the normal data mismatch, determine that the transaction data authentication to be verified loses
It loses.
In a kind of possible embodiment, the method is when determining the transaction data authentication to be verified failure, also
Include:
Generate and show the information warning of the transaction data authentication failure to be verified;
Mark is distorted to the transaction data addition to be verified.
In a kind of possible embodiment, the normal data is obtained according to following steps:
It obtains to store transaction data;
It is handled to store transaction data using the pre-defined algorithm described in acquisition, obtains handing over described wait store
The corresponding normal data of easy data.
In a kind of possible embodiment, using the pre-defined algorithm to the store transaction data of acquisition at
Reason, and in the data deposit block chain that processing is obtained, comprising:
Operation is carried out to store transaction data to described using pre-defined algorithm, obtains the identity to store transaction data
Identification information;
Based on the storage parameter to store transaction data and the identification information to store transaction data, really
It is fixed described to the corresponding information to be stored of store transaction data;
Operation is carried out to the information to be stored using pre-defined algorithm, is obtained described to the corresponding standard of store transaction data
Data;
It will be in a block to the corresponding normal data deposit block chain of store transaction data.
In a kind of possible embodiment, the method also includes generating the identity of each block in block chain letter
The step of breath:
The identification information of the previous block of normal data and the block based on the block, generates the body of the block
Part identification information.
In a kind of possible embodiment, whether the determination data to be compared match with the normal data,
Include:
Using the corresponding inverse algorithms of the pre-defined algorithm, the normal data is handled, obtains standard comparing number
According to;
The data to be compared and the standard comparing data are compared, in the data to be compared and the standard
Compare data it is identical when, the data to be compared are matched with the normal data, in the data to be compared and the standard ratio
When not identical compared with data, the data to be compared and the normal data are mismatched.
It is described to be carried out using the to be verified transaction data of the pre-defined algorithm to acquisition in a kind of possible embodiment
Processing, obtains the corresponding data to be compared of the transaction data to be verified, comprising:
Operation is carried out to the transaction data to be verified using pre-defined algorithm, obtains the identity of the transaction data to be verified
Identification information;
Storage parameter and the identification information based on the transaction data to be verified, determine the transaction to be verified
The corresponding data to be compared of data.
In a kind of possible embodiment, the storage parameter and the identity based on the transaction data to be verified
Identification information determines the corresponding data to be compared of the transaction data to be verified, comprising:
The storage parameter of the transaction data to be verified is encrypted;
Based on encrypted storage parameter and the identification information, determine the transaction data to be verified it is corresponding to
Compare data.
Second aspect, the embodiment of the present application provide a kind of transaction data authentication device based on block chain, comprising:
Data acquisition module, for obtaining transaction data to be verified;
First data processing module, for being handled using the to be verified transaction data of the pre-defined algorithm to acquisition,
Obtain the corresponding data to be compared of the transaction data to be verified;
Second data processing module, for obtaining criterion numeral corresponding with the transaction data to be verified from block chain
According to, and determine whether the data to be compared match with the normal data;
Data Verification module, for determining described to be tested when the data to be compared and the normal data mismatch
Demonstrate,prove transaction data authentication failure.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage medium
Computer program is stored in matter, the computer program execute the embodiment of the present application when being run by processor in a first aspect, and
Step in first aspect in any possible embodiment.
A kind of transaction data authentication method, apparatus and storage medium based on block chain provided by the embodiments of the present application,
Method will acquire compared with inaccurate with the verifying of accuracy to the authenticity of transaction data itself, complete in the prior art
To transaction data to be verified handled using pre-defined algorithm, obtain data to be compared;Obtained from block chain again it is described to
The corresponding normal data of transaction data is verified, data to be compared are matched with normal data.Due to what is be stored in block chain
Data have the characteristics that not distorting, and the storage record of the data of each deposit can all be traced, therefore in block chain
The normal data data of storage are accurately, data to be compared to be matched with normal data, it is ensured that more accurate, complete
Site preparation verifies the authenticity and accuracy of transaction data to be verified.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of flow chart of transaction data authentication method provided by the embodiment of the present application;
Fig. 2 shows in another kind transaction data authentication method provided by the embodiment of the present application, by transaction to be stored
Data are stored to the flow chart in block chain;
Fig. 3 is shown in another kind transaction data authentication method provided by the embodiment of the present application, is obtained from block chain
Normal data corresponding with the transaction data to be verified, and determine whether the data to be compared match with the normal data
Flow chart;
Fig. 4 shows the flow chart of another kind transaction data authentication method provided by the embodiment of the present application;
Fig. 5 shows a kind of structural schematic diagram of transaction data authentication square law device provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real
The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings
The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application
Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work
There are other embodiments, shall fall in the protection scope of this application.
In view of in the prior art, electronic transaction data system, the credible storage of key business data and data fidelity
There may be problem, can not verify data itself authenticity and integrality, be based on this, the embodiment of the present application provides a kind of base
In the transaction data authentication method, apparatus and storage medium of block chain, it is described below by embodiment.
For convenient for understanding the present embodiment, first to a kind of transaction data authentication side disclosed in the embodiment of the present application
Method describes in detail.
Embodiment one
The embodiment of the present invention one proposes a kind of transaction data authentication method based on block chain, as shown in Figure 1, it is specific
Process is as described below:
Step 101, transaction data to be verified is obtained.
Under the application scenarios of bid transaction, server obtains transaction data to be verified from bid and purchase transaction platform.
Step 102, server by utilizing pre-defined algorithm handles the transaction data to be verified of acquisition, obtains described
The corresponding data to be compared of transaction data to be verified.
The pre-defined algorithm includes hash algorithm and certificate granting (Certificate Authority, CA) signature algorithm,
The transaction data to be verified is calculated using hash algorithm, obtains cryptographic Hash;Cryptographic Hash is as transaction data to be verified
Identification information, the transaction data to be verified can be uniquely determined.
The data to be compared, identification information and storage parameter including the transaction data to be verified.
In the specific implementation, the transaction data to be verified is packaged into file, set the file file name and
Reference number of a document;The storage parameter of the transaction data to be verified can be the file name and reference number of a document of packaging file, can also
Think that other can indicate other important parameters of the transaction data to be verified.
In the specific implementation, the storage parameter can be that can indicate the transaction data to be verified without encryption
Other important parameters, for example, the corresponding file name of the transaction data to be verified and reference number of a document without encryption;Institute
Stating storage parameter may be other important parameters that can indicate the transaction data to be verified encrypted.
In the specific implementation, if encrypted to the storage parameter, under the application scenarios of bid transaction, can make
The storage parameter is encrypted with the digital certificate on bid and purchase transaction platform.
Step 103, server obtains normal data corresponding with the transaction data to be verified from block chain, and determines
Whether the data to be compared match with the normal data.
The normal data refers to the data having stored in block chain, due to the storing data in block chain, has
The characteristic that can not be distorted, because of referred to herein as normal data;When carrying out Data Matching, need to obtain and the transaction data to be verified
Corresponding normal data, by the normal data by special algorithm be calculated as a result, and by the result with it is described
Transaction data to be verified is matched compared with.
Step 104, server determines the friendship to be verified when the data to be compared and the normal data mismatch
Easy data verification failure.
Obtained after the normal data is calculated by algorithm as a result, be compared with the transaction data to be verified,
When the two result is not identical, then regard as that it fails to match;
After it fails to match, the information warning of the transaction data authentication failure to be verified is generated, information warning includes
Now abnormal time, the normal data stored in block chain are being called for bid by the end value that obtains after algorithm calculating
Purchase transaction platform shown, meanwhile, mark is distorted to the transaction data addition to be verified;
Embodiment two
The embodiment of the present invention two, as shown in Fig. 2, should first be stored transaction data to be stored before above-mentioned steps 110
Into block chain, store as described below to the detailed process in block chain:
Step 201, server is obtained to store transaction data.
Under the application scenarios of bid transaction, directly acquire from bid and purchase transaction platform to store transaction data, it is described
It can be for without the original transaction data Jing Guo data processing to store transaction data.
Step 202, pre-defined algorithm described in server by utilizing is handled to store transaction data described in acquisition, is obtained
With described to the corresponding normal data of store transaction data.
Operation is carried out to store transaction data to described using pre-defined algorithm, obtains the identity to store transaction data
Identification information;The pre-defined algorithm can be hash algorithm, can add random number using by the store transaction data, pass through
Hash algorithm is calculated, and obtains cryptographic Hash, the cryptographic Hash is the identification information to store transaction data, described
Identification information can uniquely determine described to store transaction data;
Step 203, server is based on the storage parameter to store transaction data and described to store transaction data
Identification information determines described to the corresponding information to be stored of store transaction data.
The storage parameter is the important parameter that can be indicated Suo Shu to store transaction data, in the specific implementation, by institute
It states transaction data to be verified and is packaged into file, set the file name and reference number of a document of the file;The number of deals to be verified
According to storage parameter can be packaging file file name and reference number of a document, or other can indicate described to be verified
Other important parameters of transaction data.
Step 204, server by utilizing pre-defined algorithm carries out operation to the information to be stored, and obtains described to store transaction
The corresponding normal data of data.
The pre-defined algorithm can be hash algorithm, the use of information hash algorithm to be stored be calculated, obtained meter
It calculates result and completes the time of Hash calculation together as the normal data.
Step 205, server is by a block to store transaction data corresponding normal data deposit block chain
In.
The normal data is signed, the normal data that server completes signature carries out signature verification.It is right
All onblock executings common recognition algorithm in block chain, including proof of work, equity prove, after block is by common recognition algorithmic procedure
It is formally included in block chain and is stored, it is exactly by the block that the whole network node, which indicates to receive the block, and indicates the method received
Random hash value be considered as newest block hashed value, the manufacture of new block will be extended based on the block chain, thus
The correct stable operation for guaranteeing bid and purchase transaction block chain ensures that transaction data can not be distorted, be can be traced.
After normal data is deposited into block, the block is added in block chain;It is added to by the block
Before in block chain, need first to generate identification information to the block;The block generates identification information by the area
The identification information of the previous block of the normal data and block of block is calculated by special algorithm, the calculation
Method can be hash algorithm.
Due to the block identification information by the normal data of the block and the previous block of the block body
Part identification information is calculated jointly, therefore when distorting the normal data in the block, need to distort this block it
Preceding all blocks, it is huge to distort cost.
Embodiment three
The embodiment of the present invention three, as shown in figure 3, above-mentioned steps 130 obtain and the number of deals to be verified from block chain
According to corresponding normal data, and determine whether the data to be compared match with the normal data, comprising:
Step 301, the corresponding inverse algorithms of pre-defined algorithm described in server by utilizing handle the normal data,
Obtain standard comparing data.
Normal data is to handle to obtain by pre-defined algorithm to store transaction data by described, it is therefore desirable to the standard
Data carry out the corresponding inverse algorithms processing of the pre-defined algorithm, can just obtain standard comparing data, the standard comparing data
It is identical as the data format to store transaction data.
Step 302, server compares the data to be compared and the standard comparing data.
The data to be compared include: the identification information and storage parameter of the transaction data to be verified;It is described to deposit
Parameter is stored up, can be the important parameter that can indicate the transaction data to be verified without encryption;Or encryption
It can indicate the important parameter of the transaction data to be verified.
The standard comparing data include: the identification information and storage parameter of the data to be stored;The storage
Parameter can be the important parameter that can indicate the data to be stored without encryption;Or encryption being capable of table
Show the important parameter of the data to be stored.
In the specific implementation, the identification information of the data to be compared and the standard comparing data;Compare
The storage parameter of the data to be compared and the standard comparing data can will be described when storing parameter without encryption
Storage parameter is directly compared, and when storage parameter is encrypted, the inverse operation that will first store parameter encryption is decrypted,
It is compared by the storage parameter after decryption;When the identification information and the comparison result for storing parameter are all correct, institute
State data to be compared and the normal data successful match.
Example IV
The embodiment of the present invention four proposes a kind of transaction data authentication method, as shown in figure 4, the following institute of its detailed process
It states:
Transaction platform of bidding and purchasing obtains transaction data to be verified, and utilizes transaction data to be verified described in pre-defined algorithm
It is handled, obtains the corresponding data to be compared of the transaction data to be verified.
The pre-defined algorithm can be hash algorithm, be calculated using hash algorithm the transaction data to be verified,
Obtain cryptographic Hash;Identification information of the cryptographic Hash as transaction data to be verified can uniquely determine the transaction to be verified
Data.
The data to be compared, identification information and storage parameter including the transaction data to be verified.
In the specific implementation, the storage parameter can be that can indicate the transaction data to be verified without encryption
Important parameter;Or the important parameter that can indicate the transaction data to be verified encrypted.
In the specific implementation, if encrypted to the storage parameter, under the application scenarios of bid transaction, can make
The storage parameter is encrypted with the digital certificate on bid and purchase transaction platform.
Bid and purchase transaction platform to data to be stored use data processing method identical with data to be verified at
Reason, obtains the corresponding information to be stored of the data to be stored.
Pre-defined algorithm processing, the pre-defined algorithm, Ke Yiwei are carried out to the information to be stored in block chain support platform
Hash algorithm calculates the use of information hash algorithm to be stored, obtained calculated result and the time for completing Hash calculation
Together as normal data, signature and sign test operation are carried out to described.
The normal data is signed, the normal data that server completes signature carries out signature verification.It is right
All onblock executings common recognition algorithm in block chain, including proof of work, equity prove, after block is by common recognition algorithmic procedure
It is formally included in block chain and is stored.
Normal data is to handle to obtain by pre-defined algorithm to store transaction data by described, it is therefore desirable to the standard
Data carry out the corresponding inverse algorithms processing of the pre-defined algorithm, can just obtain standard comparing data, the standard comparing data
It include: the identification information and storage parameter of the data to be stored;The storage parameter can be the energy without encryption
Enough indicate the important parameter of the data to be stored;Or the important ginseng that can indicate the data to be stored of encryption
Number.
In the specific implementation, the identification information of the data to be compared and the standard comparing data;Compare
The storage parameter of the data to be compared and the standard comparing data can will be described when storing parameter without encryption
Storage parameter is directly compared, and when storage parameter is encrypted, the inverse operation that will first store parameter encryption is decrypted,
It is compared by the storage parameter after decryption;When the identification information and the comparison result for storing parameter are all correct, institute
State data to be compared and the normal data successful match.
Embodiment five
Based on the same technical idea, the embodiment of the present invention five proposes a kind of transaction data authentication device, as shown in figure 5,
The device includes: data acquisition module 401, the first data processing module 402, the second data processing module 403, data verification mould
Block 404;
Data acquisition module 401, for obtaining transaction data to be verified;
First data processing module 402, for using pre-defined algorithm to the transaction data to be verified of acquisition at
Reason, obtains the corresponding data to be compared of the transaction data to be verified;
Second data processing module 403, for obtaining standard corresponding with the transaction data to be verified from block chain
Data;
Data Verification module 404, for when the data to be compared and the normal data mismatch, determine it is described to
Verify transaction data authentication failure.
First data processing module 402 is specifically used for, and is calculated by pre-defined algorithm the transaction data to be verified,
The identification information of transaction data to be verified is obtained, the identification information can uniquely determine the number of deals to be verified
According to;The transaction data to be verified is packaged into file, is handled by second of pre-defined algorithm, storage parameter is obtained, it is described to deposit
Storing up parameter is the important parameter that can indicate the transaction data to be verified.
Second data processing module 403 is specifically used for, to what is stored in the corresponding block chain of the transaction data to be verified
To store transaction data, by the calculating of pre-defined algorithm, obtain stating the corresponding normal data of transaction data to be verified;Said standard
Data include: the identification information to store transaction data, the storage parameter to store transaction data.
Data Verification module 404 is specifically used for, the identity mark of the data to be compared and the standard comparing data
Know information;Compare the storage parameter of the data to be compared and the standard comparing data;The identification information and storage
When the comparison result of parameter is all correct, the data to be compared and the normal data successful match.
The computer program product of transaction data authentication method is carried out provided by the embodiment of the present application, including stores place
The computer readable storage medium of the executable non-volatile program code of device is managed, the instruction that said program code includes can be used for
Previous methods method as described in the examples is executed, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit,
Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can
To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect
Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words
The form of product embodies, which is stored in a storage medium, including some instructions use so that
One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application
State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only
Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit
Store up the medium of program code.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application
Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen
It please be described in detail, those skilled in the art should understand that: anyone skilled in the art
Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application
Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
Claims (10)
1. a kind of transaction data authentication method based on block chain, which is characterized in that the described method includes:
Obtain transaction data to be verified;
It is handled using the to be verified transaction data of the pre-defined algorithm to acquisition, it is corresponding to obtain the transaction data to be verified
Data to be compared;
Normal data corresponding with the transaction data to be verified, and the determination data to be compared and institute are obtained from block chain
State whether normal data matches;
When the data to be compared and the normal data mismatch, the transaction data authentication failure to be verified is determined.
2. transaction data authentication method according to claim 1, which is characterized in that the method determine it is described to be verified
When transaction data authentication fails, further includes:
Generate and show the information warning of the transaction data authentication failure to be verified;
Mark is distorted to the transaction data addition to be verified.
3. transaction data authentication method according to claim 1, which is characterized in that obtain the standard according to following steps
Data:
It obtains to store transaction data;
It is handled to store transaction data using the pre-defined algorithm described in acquisition, is obtained with described to store transaction number
According to corresponding normal data.
4. transaction data authentication method according to claim 3, which is characterized in that using the pre-defined algorithm to acquisition
The store transaction data are handled, and in the data deposit block chain that processing is obtained, comprising:
Operation is carried out to store transaction data to described using pre-defined algorithm, obtains the identity to store transaction data
Information;
Based on the storage parameter to store transaction data and the identification information to store transaction data, institute is determined
It states to the corresponding information to be stored of store transaction data;
Operation is carried out to the information to be stored using pre-defined algorithm, is obtained described to the corresponding criterion numeral of store transaction data
According to;
It will be in a block to the corresponding normal data deposit block chain of store transaction data.
5. transaction data authentication method according to claim 4, which is characterized in that the method also includes generating block chain
In each block identification information the step of:
The identification information of the previous block of normal data and the block based on the block, generates the identity mark of the block
Know information.
6. transaction data authentication method according to claim 4, which is characterized in that the determination data to be compared with
Whether the normal data matches, comprising:
Using the corresponding inverse algorithms of the pre-defined algorithm, the normal data is handled, obtains standard comparing data;
The data to be compared and the standard comparing data are compared, in the data to be compared and the standard comparing
When data are identical, the data to be compared are matched with the normal data, in the data to be compared and the standard comparing number
According to it is not identical when, the data to be compared and the normal data mismatch.
7. transaction data authentication method according to claim 1, which is characterized in that it is described using pre-defined algorithm to acquisition
The transaction data to be verified is handled, and the corresponding data to be compared of the transaction data to be verified are obtained, comprising:
Operation is carried out to the transaction data to be verified using pre-defined algorithm, obtains the identity of the transaction data to be verified
Information;
Storage parameter and the identification information based on the transaction data to be verified, determine the transaction data to be verified
Corresponding data to be compared.
8. transaction data authentication method according to claim 7, which is characterized in that described to be based on the number of deals to be verified
According to storage parameter and the identification information, determine the corresponding data to be compared of the transaction data to be verified, comprising:
The storage parameter of the transaction data to be verified is encrypted;
Based on encrypted storage parameter and the identification information, determine that the transaction data to be verified is corresponding to be compared
Data.
9. a kind of transaction data authentication device based on block chain characterized by comprising
Data acquisition module, for obtaining transaction data to be verified;
First data processing module is obtained for being handled using the transaction data to be verified of the pre-defined algorithm to acquisition
The corresponding data to be compared of the transaction data to be verified;
Second data processing module, for obtaining normal data corresponding with the transaction data to be verified from block chain, and
Determine whether the data to be compared match with the normal data;
Data Verification module, for determining the friendship to be verified when the data to be compared and the normal data mismatch
Easy data verification failure.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer journey on the computer readable storage medium
Sequence, the computer program execute the method for verifying transaction data as described in any of the claims 1 to 8 when being run by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910286296.0A CN110020951A (en) | 2019-04-10 | 2019-04-10 | A kind of transaction data authentication method, apparatus and storage medium based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910286296.0A CN110020951A (en) | 2019-04-10 | 2019-04-10 | A kind of transaction data authentication method, apparatus and storage medium based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110020951A true CN110020951A (en) | 2019-07-16 |
Family
ID=67190971
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910286296.0A Pending CN110020951A (en) | 2019-04-10 | 2019-04-10 | A kind of transaction data authentication method, apparatus and storage medium based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110020951A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200741A (en) * | 2020-04-02 | 2020-05-26 | 上海商魁信息科技有限公司 | Video processing method and device and machine-readable storage medium |
CN111475865A (en) * | 2020-04-13 | 2020-07-31 | 北京新能源汽车技术创新中心有限公司 | Automobile data verification method and verification device |
CN111861734A (en) * | 2020-07-31 | 2020-10-30 | 重庆富民银行股份有限公司 | Test evaluation system and method for three-party data source |
CN113515579A (en) * | 2021-06-17 | 2021-10-19 | 自然资源部地图技术审查中心 | Boundary peak data screening method and device |
CN113761585A (en) * | 2020-06-17 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Data processing method, device and system |
CN116401718A (en) * | 2023-06-08 | 2023-07-07 | 科大讯飞股份有限公司 | Block chain-based data protection method and device, electronic equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506146A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | Based on the Transaction Information method of calibration of block chain technology, apparatus and system |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN106548330A (en) * | 2016-10-27 | 2017-03-29 | 上海亿账通区块链科技有限公司 | Transaction verification method and system based on block chain |
CN107545181A (en) * | 2017-08-16 | 2018-01-05 | 上海策赢网络科技有限公司 | Program operating method, terminal and computer-readable recording medium |
CN109101572A (en) * | 2018-07-17 | 2018-12-28 | 何晓行 | Card method, apparatus and server, storage medium are deposited based on block chain |
CN109408319A (en) * | 2018-08-30 | 2019-03-01 | 中国地质大学(武汉) | A kind of software running technology method for monitoring state based on block chain |
CN109447631A (en) * | 2018-09-19 | 2019-03-08 | 平安科技(深圳)有限公司 | Client, server, method of commerce and storage medium based on block chain |
CN109543459A (en) * | 2018-11-22 | 2019-03-29 | 中国联合网络通信集团有限公司 | A kind of data deposit card method and apparatus |
CN109583896A (en) * | 2018-11-30 | 2019-04-05 | 元灵通智能科技(深圳)有限公司 | Transaction verification method, block chain node and storage medium |
-
2019
- 2019-04-10 CN CN201910286296.0A patent/CN110020951A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN106506146A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | Based on the Transaction Information method of calibration of block chain technology, apparatus and system |
CN106548330A (en) * | 2016-10-27 | 2017-03-29 | 上海亿账通区块链科技有限公司 | Transaction verification method and system based on block chain |
CN107545181A (en) * | 2017-08-16 | 2018-01-05 | 上海策赢网络科技有限公司 | Program operating method, terminal and computer-readable recording medium |
CN109101572A (en) * | 2018-07-17 | 2018-12-28 | 何晓行 | Card method, apparatus and server, storage medium are deposited based on block chain |
CN109408319A (en) * | 2018-08-30 | 2019-03-01 | 中国地质大学(武汉) | A kind of software running technology method for monitoring state based on block chain |
CN109447631A (en) * | 2018-09-19 | 2019-03-08 | 平安科技(深圳)有限公司 | Client, server, method of commerce and storage medium based on block chain |
CN109543459A (en) * | 2018-11-22 | 2019-03-29 | 中国联合网络通信集团有限公司 | A kind of data deposit card method and apparatus |
CN109583896A (en) * | 2018-11-30 | 2019-04-05 | 元灵通智能科技(深圳)有限公司 | Transaction verification method, block chain node and storage medium |
Non-Patent Citations (1)
Title |
---|
中国财务公司协会: "《互联网+建筑 数字经济下的智慧建筑行业变革》", 31 December 2018 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200741A (en) * | 2020-04-02 | 2020-05-26 | 上海商魁信息科技有限公司 | Video processing method and device and machine-readable storage medium |
CN111475865A (en) * | 2020-04-13 | 2020-07-31 | 北京新能源汽车技术创新中心有限公司 | Automobile data verification method and verification device |
CN113761585A (en) * | 2020-06-17 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Data processing method, device and system |
CN111861734A (en) * | 2020-07-31 | 2020-10-30 | 重庆富民银行股份有限公司 | Test evaluation system and method for three-party data source |
CN111861734B (en) * | 2020-07-31 | 2024-05-03 | 重庆富民银行股份有限公司 | Test evaluation system and method for three-party data source |
CN113515579A (en) * | 2021-06-17 | 2021-10-19 | 自然资源部地图技术审查中心 | Boundary peak data screening method and device |
CN113515579B (en) * | 2021-06-17 | 2024-01-19 | 自然资源部地图技术审查中心 | Method and device for screening boundary peak data |
CN116401718A (en) * | 2023-06-08 | 2023-07-07 | 科大讯飞股份有限公司 | Block chain-based data protection method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110020951A (en) | A kind of transaction data authentication method, apparatus and storage medium based on block chain | |
CN111989893B (en) | Method, system and computer readable device for generating and linking zero knowledge proofs | |
AU2019295815C1 (en) | Blockchain-based data verification method and apparatus, and electronic device | |
CN108111314B (en) | Method and equipment for generating and verifying digital certificate | |
CN105574435B (en) | Electronic contract on-line signing, verification method, apparatus and system | |
WO2019144612A1 (en) | Zero-knowledge multi-account-book exchange transfer method and apparatus based on blockchain, and storage medium | |
JP5710075B2 (en) | Certificate validation | |
CN107612697B (en) | Digital certificate application method and device | |
CN105701372A (en) | Block chain identity construction and verification method | |
US20200097950A1 (en) | Privileged entity consensus for digital asset creation | |
TW202013930A (en) | A method and apparatus for authenticate user identity in a network | |
CN109818730B (en) | Blind signature acquisition method and device and server | |
US20180158058A1 (en) | Apparatus and method to prevent execution of an unauthorized transaction via a distributed database | |
CN105227319A (en) | A kind of method of authentication server and device | |
CN110048851B (en) | Method and device for generating and verifying multilayer linkable ring signature in block chain | |
CN108292341A (en) | Method for the execution integrality for verifying the application in destination apparatus | |
CN110363509A (en) | A kind of information protecting method and device | |
JP2020536473A5 (en) | ||
CN114201781A (en) | Block chain-based storage verification method and device, computer equipment and medium | |
CN113656497A (en) | Data verification method and device based on block chain | |
WO2022205961A1 (en) | Method and apparatus for updating blockchain domain name configuration | |
CN109698750A (en) | Block generation method, device, equipment and the readable storage medium storing program for executing of block chain | |
WO2019203790A1 (en) | Workflow transactions | |
CN114387137A (en) | Block chain-based electronic contract signing method, device, equipment and storage medium | |
CN107743066B (en) | Monitorable anonymous signature method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190716 |