CN110020951A - A kind of transaction data authentication method, apparatus and storage medium based on block chain - Google Patents

A kind of transaction data authentication method, apparatus and storage medium based on block chain Download PDF

Info

Publication number
CN110020951A
CN110020951A CN201910286296.0A CN201910286296A CN110020951A CN 110020951 A CN110020951 A CN 110020951A CN 201910286296 A CN201910286296 A CN 201910286296A CN 110020951 A CN110020951 A CN 110020951A
Authority
CN
China
Prior art keywords
data
transaction data
verified
compared
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910286296.0A
Other languages
Chinese (zh)
Inventor
吴英礼
罗俊良
郑凯
张鹏飞
陈健顺
陈翔
杜霖霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dragon Information Technology LLC
Original Assignee
Beijing Dragon Information Technology LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dragon Information Technology LLC filed Critical Beijing Dragon Information Technology LLC
Priority to CN201910286296.0A priority Critical patent/CN110020951A/en
Publication of CN110020951A publication Critical patent/CN110020951A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

This application provides a kind of transaction data authentication method, apparatus and storage medium based on block chain, wherein this method comprises: obtaining transaction data to be verified;It is handled using the to be verified transaction data of the pre-defined algorithm to acquisition, obtains the corresponding data to be compared of the transaction data to be verified;Normal data corresponding with the transaction data to be verified is obtained from block chain, and whether the determination data to be compared match with the normal data;When the data to be compared and the normal data mismatch, the transaction data authentication failure to be verified is determined.Since the data being stored in block chain have the characteristics that not distorting, and the storage record of the data of each deposit can all be traced, therefore the normal data of the storage in block chain is accurate, data to be compared are matched with normal data, it is ensured that authenticity and accuracy more accurate, that completely verify transaction data to be verified.

Description

A kind of transaction data authentication method, apparatus and storage medium based on block chain
Technical field
This application involves Internet technical field, more particularly, to a kind of transaction data authentication method based on block chain, Device and storage medium.
Background technique
Bidding industry is related to that interests are big, and the requirement to data safety and confidentiality is no less than financial industry.With bid The extensive use of area of procurement whole process e-transaction, at the same generate data by big data technology deepen continuously excavation with Good application, everybody is more and more to the query of data authenticity and integrity.
In the prior art, electronic transaction data system, the credible storage of key business data and data fidelity may be deposited It is inaccurate, complete to the verifying of the authenticity and accuracy of data itself in problem.
Summary of the invention
In view of this, the application be designed to provide a kind of transaction data authentication method, apparatus based on block chain and Storage medium, the transaction data to be verified that will acquire are handled using pre-defined algorithm, obtain data to be compared;Again from block The corresponding normal data of the transaction data to be verified is obtained in chain, data to be compared is matched with normal data, to test Demonstrate,prove the authenticity and accuracy of transaction data to be verified.
In a first aspect, the embodiment of the present application provides a kind of transaction data authentication method based on block chain, the method Include:
Obtain transaction data to be verified;
It is handled using the to be verified transaction data of the pre-defined algorithm to acquisition, obtains the transaction data to be verified Corresponding data to be compared;
Normal data corresponding with the transaction data to be verified, and the determination data to be compared are obtained from block chain Whether matched with the normal data;
When the data to be compared and the normal data mismatch, determine that the transaction data authentication to be verified loses It loses.
In a kind of possible embodiment, the method is when determining the transaction data authentication to be verified failure, also Include:
Generate and show the information warning of the transaction data authentication failure to be verified;
Mark is distorted to the transaction data addition to be verified.
In a kind of possible embodiment, the normal data is obtained according to following steps:
It obtains to store transaction data;
It is handled to store transaction data using the pre-defined algorithm described in acquisition, obtains handing over described wait store The corresponding normal data of easy data.
In a kind of possible embodiment, using the pre-defined algorithm to the store transaction data of acquisition at Reason, and in the data deposit block chain that processing is obtained, comprising:
Operation is carried out to store transaction data to described using pre-defined algorithm, obtains the identity to store transaction data Identification information;
Based on the storage parameter to store transaction data and the identification information to store transaction data, really It is fixed described to the corresponding information to be stored of store transaction data;
Operation is carried out to the information to be stored using pre-defined algorithm, is obtained described to the corresponding standard of store transaction data Data;
It will be in a block to the corresponding normal data deposit block chain of store transaction data.
In a kind of possible embodiment, the method also includes generating the identity of each block in block chain letter The step of breath:
The identification information of the previous block of normal data and the block based on the block, generates the body of the block Part identification information.
In a kind of possible embodiment, whether the determination data to be compared match with the normal data, Include:
Using the corresponding inverse algorithms of the pre-defined algorithm, the normal data is handled, obtains standard comparing number According to;
The data to be compared and the standard comparing data are compared, in the data to be compared and the standard Compare data it is identical when, the data to be compared are matched with the normal data, in the data to be compared and the standard ratio When not identical compared with data, the data to be compared and the normal data are mismatched.
It is described to be carried out using the to be verified transaction data of the pre-defined algorithm to acquisition in a kind of possible embodiment Processing, obtains the corresponding data to be compared of the transaction data to be verified, comprising:
Operation is carried out to the transaction data to be verified using pre-defined algorithm, obtains the identity of the transaction data to be verified Identification information;
Storage parameter and the identification information based on the transaction data to be verified, determine the transaction to be verified The corresponding data to be compared of data.
In a kind of possible embodiment, the storage parameter and the identity based on the transaction data to be verified Identification information determines the corresponding data to be compared of the transaction data to be verified, comprising:
The storage parameter of the transaction data to be verified is encrypted;
Based on encrypted storage parameter and the identification information, determine the transaction data to be verified it is corresponding to Compare data.
Second aspect, the embodiment of the present application provide a kind of transaction data authentication device based on block chain, comprising:
Data acquisition module, for obtaining transaction data to be verified;
First data processing module, for being handled using the to be verified transaction data of the pre-defined algorithm to acquisition, Obtain the corresponding data to be compared of the transaction data to be verified;
Second data processing module, for obtaining criterion numeral corresponding with the transaction data to be verified from block chain According to, and determine whether the data to be compared match with the normal data;
Data Verification module, for determining described to be tested when the data to be compared and the normal data mismatch Demonstrate,prove transaction data authentication failure.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage medium Computer program is stored in matter, the computer program execute the embodiment of the present application when being run by processor in a first aspect, and Step in first aspect in any possible embodiment.
A kind of transaction data authentication method, apparatus and storage medium based on block chain provided by the embodiments of the present application, Method will acquire compared with inaccurate with the verifying of accuracy to the authenticity of transaction data itself, complete in the prior art To transaction data to be verified handled using pre-defined algorithm, obtain data to be compared;Obtained from block chain again it is described to The corresponding normal data of transaction data is verified, data to be compared are matched with normal data.Due to what is be stored in block chain Data have the characteristics that not distorting, and the storage record of the data of each deposit can all be traced, therefore in block chain The normal data data of storage are accurately, data to be compared to be matched with normal data, it is ensured that more accurate, complete Site preparation verifies the authenticity and accuracy of transaction data to be verified.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of flow chart of transaction data authentication method provided by the embodiment of the present application;
Fig. 2 shows in another kind transaction data authentication method provided by the embodiment of the present application, by transaction to be stored Data are stored to the flow chart in block chain;
Fig. 3 is shown in another kind transaction data authentication method provided by the embodiment of the present application, is obtained from block chain Normal data corresponding with the transaction data to be verified, and determine whether the data to be compared match with the normal data Flow chart;
Fig. 4 shows the flow chart of another kind transaction data authentication method provided by the embodiment of the present application;
Fig. 5 shows a kind of structural schematic diagram of transaction data authentication square law device provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall in the protection scope of this application.
In view of in the prior art, electronic transaction data system, the credible storage of key business data and data fidelity There may be problem, can not verify data itself authenticity and integrality, be based on this, the embodiment of the present application provides a kind of base In the transaction data authentication method, apparatus and storage medium of block chain, it is described below by embodiment.
For convenient for understanding the present embodiment, first to a kind of transaction data authentication side disclosed in the embodiment of the present application Method describes in detail.
Embodiment one
The embodiment of the present invention one proposes a kind of transaction data authentication method based on block chain, as shown in Figure 1, it is specific Process is as described below:
Step 101, transaction data to be verified is obtained.
Under the application scenarios of bid transaction, server obtains transaction data to be verified from bid and purchase transaction platform.
Step 102, server by utilizing pre-defined algorithm handles the transaction data to be verified of acquisition, obtains described The corresponding data to be compared of transaction data to be verified.
The pre-defined algorithm includes hash algorithm and certificate granting (Certificate Authority, CA) signature algorithm, The transaction data to be verified is calculated using hash algorithm, obtains cryptographic Hash;Cryptographic Hash is as transaction data to be verified Identification information, the transaction data to be verified can be uniquely determined.
The data to be compared, identification information and storage parameter including the transaction data to be verified.
In the specific implementation, the transaction data to be verified is packaged into file, set the file file name and Reference number of a document;The storage parameter of the transaction data to be verified can be the file name and reference number of a document of packaging file, can also Think that other can indicate other important parameters of the transaction data to be verified.
In the specific implementation, the storage parameter can be that can indicate the transaction data to be verified without encryption Other important parameters, for example, the corresponding file name of the transaction data to be verified and reference number of a document without encryption;Institute Stating storage parameter may be other important parameters that can indicate the transaction data to be verified encrypted.
In the specific implementation, if encrypted to the storage parameter, under the application scenarios of bid transaction, can make The storage parameter is encrypted with the digital certificate on bid and purchase transaction platform.
Step 103, server obtains normal data corresponding with the transaction data to be verified from block chain, and determines Whether the data to be compared match with the normal data.
The normal data refers to the data having stored in block chain, due to the storing data in block chain, has The characteristic that can not be distorted, because of referred to herein as normal data;When carrying out Data Matching, need to obtain and the transaction data to be verified Corresponding normal data, by the normal data by special algorithm be calculated as a result, and by the result with it is described Transaction data to be verified is matched compared with.
Step 104, server determines the friendship to be verified when the data to be compared and the normal data mismatch Easy data verification failure.
Obtained after the normal data is calculated by algorithm as a result, be compared with the transaction data to be verified, When the two result is not identical, then regard as that it fails to match;
After it fails to match, the information warning of the transaction data authentication failure to be verified is generated, information warning includes Now abnormal time, the normal data stored in block chain are being called for bid by the end value that obtains after algorithm calculating Purchase transaction platform shown, meanwhile, mark is distorted to the transaction data addition to be verified;
Embodiment two
The embodiment of the present invention two, as shown in Fig. 2, should first be stored transaction data to be stored before above-mentioned steps 110 Into block chain, store as described below to the detailed process in block chain:
Step 201, server is obtained to store transaction data.
Under the application scenarios of bid transaction, directly acquire from bid and purchase transaction platform to store transaction data, it is described It can be for without the original transaction data Jing Guo data processing to store transaction data.
Step 202, pre-defined algorithm described in server by utilizing is handled to store transaction data described in acquisition, is obtained With described to the corresponding normal data of store transaction data.
Operation is carried out to store transaction data to described using pre-defined algorithm, obtains the identity to store transaction data Identification information;The pre-defined algorithm can be hash algorithm, can add random number using by the store transaction data, pass through Hash algorithm is calculated, and obtains cryptographic Hash, the cryptographic Hash is the identification information to store transaction data, described Identification information can uniquely determine described to store transaction data;
Step 203, server is based on the storage parameter to store transaction data and described to store transaction data Identification information determines described to the corresponding information to be stored of store transaction data.
The storage parameter is the important parameter that can be indicated Suo Shu to store transaction data, in the specific implementation, by institute It states transaction data to be verified and is packaged into file, set the file name and reference number of a document of the file;The number of deals to be verified According to storage parameter can be packaging file file name and reference number of a document, or other can indicate described to be verified Other important parameters of transaction data.
Step 204, server by utilizing pre-defined algorithm carries out operation to the information to be stored, and obtains described to store transaction The corresponding normal data of data.
The pre-defined algorithm can be hash algorithm, the use of information hash algorithm to be stored be calculated, obtained meter It calculates result and completes the time of Hash calculation together as the normal data.
Step 205, server is by a block to store transaction data corresponding normal data deposit block chain In.
The normal data is signed, the normal data that server completes signature carries out signature verification.It is right All onblock executings common recognition algorithm in block chain, including proof of work, equity prove, after block is by common recognition algorithmic procedure It is formally included in block chain and is stored, it is exactly by the block that the whole network node, which indicates to receive the block, and indicates the method received Random hash value be considered as newest block hashed value, the manufacture of new block will be extended based on the block chain, thus The correct stable operation for guaranteeing bid and purchase transaction block chain ensures that transaction data can not be distorted, be can be traced.
After normal data is deposited into block, the block is added in block chain;It is added to by the block Before in block chain, need first to generate identification information to the block;The block generates identification information by the area The identification information of the previous block of the normal data and block of block is calculated by special algorithm, the calculation Method can be hash algorithm.
Due to the block identification information by the normal data of the block and the previous block of the block body Part identification information is calculated jointly, therefore when distorting the normal data in the block, need to distort this block it Preceding all blocks, it is huge to distort cost.
Embodiment three
The embodiment of the present invention three, as shown in figure 3, above-mentioned steps 130 obtain and the number of deals to be verified from block chain According to corresponding normal data, and determine whether the data to be compared match with the normal data, comprising:
Step 301, the corresponding inverse algorithms of pre-defined algorithm described in server by utilizing handle the normal data, Obtain standard comparing data.
Normal data is to handle to obtain by pre-defined algorithm to store transaction data by described, it is therefore desirable to the standard Data carry out the corresponding inverse algorithms processing of the pre-defined algorithm, can just obtain standard comparing data, the standard comparing data It is identical as the data format to store transaction data.
Step 302, server compares the data to be compared and the standard comparing data.
The data to be compared include: the identification information and storage parameter of the transaction data to be verified;It is described to deposit Parameter is stored up, can be the important parameter that can indicate the transaction data to be verified without encryption;Or encryption It can indicate the important parameter of the transaction data to be verified.
The standard comparing data include: the identification information and storage parameter of the data to be stored;The storage Parameter can be the important parameter that can indicate the data to be stored without encryption;Or encryption being capable of table Show the important parameter of the data to be stored.
In the specific implementation, the identification information of the data to be compared and the standard comparing data;Compare The storage parameter of the data to be compared and the standard comparing data can will be described when storing parameter without encryption Storage parameter is directly compared, and when storage parameter is encrypted, the inverse operation that will first store parameter encryption is decrypted, It is compared by the storage parameter after decryption;When the identification information and the comparison result for storing parameter are all correct, institute State data to be compared and the normal data successful match.
Example IV
The embodiment of the present invention four proposes a kind of transaction data authentication method, as shown in figure 4, the following institute of its detailed process It states:
Transaction platform of bidding and purchasing obtains transaction data to be verified, and utilizes transaction data to be verified described in pre-defined algorithm It is handled, obtains the corresponding data to be compared of the transaction data to be verified.
The pre-defined algorithm can be hash algorithm, be calculated using hash algorithm the transaction data to be verified, Obtain cryptographic Hash;Identification information of the cryptographic Hash as transaction data to be verified can uniquely determine the transaction to be verified Data.
The data to be compared, identification information and storage parameter including the transaction data to be verified.
In the specific implementation, the storage parameter can be that can indicate the transaction data to be verified without encryption Important parameter;Or the important parameter that can indicate the transaction data to be verified encrypted.
In the specific implementation, if encrypted to the storage parameter, under the application scenarios of bid transaction, can make The storage parameter is encrypted with the digital certificate on bid and purchase transaction platform.
Bid and purchase transaction platform to data to be stored use data processing method identical with data to be verified at Reason, obtains the corresponding information to be stored of the data to be stored.
Pre-defined algorithm processing, the pre-defined algorithm, Ke Yiwei are carried out to the information to be stored in block chain support platform Hash algorithm calculates the use of information hash algorithm to be stored, obtained calculated result and the time for completing Hash calculation Together as normal data, signature and sign test operation are carried out to described.
The normal data is signed, the normal data that server completes signature carries out signature verification.It is right All onblock executings common recognition algorithm in block chain, including proof of work, equity prove, after block is by common recognition algorithmic procedure It is formally included in block chain and is stored.
Normal data is to handle to obtain by pre-defined algorithm to store transaction data by described, it is therefore desirable to the standard Data carry out the corresponding inverse algorithms processing of the pre-defined algorithm, can just obtain standard comparing data, the standard comparing data It include: the identification information and storage parameter of the data to be stored;The storage parameter can be the energy without encryption Enough indicate the important parameter of the data to be stored;Or the important ginseng that can indicate the data to be stored of encryption Number.
In the specific implementation, the identification information of the data to be compared and the standard comparing data;Compare The storage parameter of the data to be compared and the standard comparing data can will be described when storing parameter without encryption Storage parameter is directly compared, and when storage parameter is encrypted, the inverse operation that will first store parameter encryption is decrypted, It is compared by the storage parameter after decryption;When the identification information and the comparison result for storing parameter are all correct, institute State data to be compared and the normal data successful match.
Embodiment five
Based on the same technical idea, the embodiment of the present invention five proposes a kind of transaction data authentication device, as shown in figure 5, The device includes: data acquisition module 401, the first data processing module 402, the second data processing module 403, data verification mould Block 404;
Data acquisition module 401, for obtaining transaction data to be verified;
First data processing module 402, for using pre-defined algorithm to the transaction data to be verified of acquisition at Reason, obtains the corresponding data to be compared of the transaction data to be verified;
Second data processing module 403, for obtaining standard corresponding with the transaction data to be verified from block chain Data;
Data Verification module 404, for when the data to be compared and the normal data mismatch, determine it is described to Verify transaction data authentication failure.
First data processing module 402 is specifically used for, and is calculated by pre-defined algorithm the transaction data to be verified, The identification information of transaction data to be verified is obtained, the identification information can uniquely determine the number of deals to be verified According to;The transaction data to be verified is packaged into file, is handled by second of pre-defined algorithm, storage parameter is obtained, it is described to deposit Storing up parameter is the important parameter that can indicate the transaction data to be verified.
Second data processing module 403 is specifically used for, to what is stored in the corresponding block chain of the transaction data to be verified To store transaction data, by the calculating of pre-defined algorithm, obtain stating the corresponding normal data of transaction data to be verified;Said standard Data include: the identification information to store transaction data, the storage parameter to store transaction data.
Data Verification module 404 is specifically used for, the identity mark of the data to be compared and the standard comparing data Know information;Compare the storage parameter of the data to be compared and the standard comparing data;The identification information and storage When the comparison result of parameter is all correct, the data to be compared and the normal data successful match.
The computer program product of transaction data authentication method is carried out provided by the embodiment of the present application, including stores place The computer readable storage medium of the executable non-volatile program code of device is managed, the instruction that said program code includes can be used for Previous methods method as described in the examples is executed, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, those skilled in the art should understand that: anyone skilled in the art Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of transaction data authentication method based on block chain, which is characterized in that the described method includes:
Obtain transaction data to be verified;
It is handled using the to be verified transaction data of the pre-defined algorithm to acquisition, it is corresponding to obtain the transaction data to be verified Data to be compared;
Normal data corresponding with the transaction data to be verified, and the determination data to be compared and institute are obtained from block chain State whether normal data matches;
When the data to be compared and the normal data mismatch, the transaction data authentication failure to be verified is determined.
2. transaction data authentication method according to claim 1, which is characterized in that the method determine it is described to be verified When transaction data authentication fails, further includes:
Generate and show the information warning of the transaction data authentication failure to be verified;
Mark is distorted to the transaction data addition to be verified.
3. transaction data authentication method according to claim 1, which is characterized in that obtain the standard according to following steps Data:
It obtains to store transaction data;
It is handled to store transaction data using the pre-defined algorithm described in acquisition, is obtained with described to store transaction number According to corresponding normal data.
4. transaction data authentication method according to claim 3, which is characterized in that using the pre-defined algorithm to acquisition The store transaction data are handled, and in the data deposit block chain that processing is obtained, comprising:
Operation is carried out to store transaction data to described using pre-defined algorithm, obtains the identity to store transaction data Information;
Based on the storage parameter to store transaction data and the identification information to store transaction data, institute is determined It states to the corresponding information to be stored of store transaction data;
Operation is carried out to the information to be stored using pre-defined algorithm, is obtained described to the corresponding criterion numeral of store transaction data According to;
It will be in a block to the corresponding normal data deposit block chain of store transaction data.
5. transaction data authentication method according to claim 4, which is characterized in that the method also includes generating block chain In each block identification information the step of:
The identification information of the previous block of normal data and the block based on the block, generates the identity mark of the block Know information.
6. transaction data authentication method according to claim 4, which is characterized in that the determination data to be compared with Whether the normal data matches, comprising:
Using the corresponding inverse algorithms of the pre-defined algorithm, the normal data is handled, obtains standard comparing data;
The data to be compared and the standard comparing data are compared, in the data to be compared and the standard comparing When data are identical, the data to be compared are matched with the normal data, in the data to be compared and the standard comparing number According to it is not identical when, the data to be compared and the normal data mismatch.
7. transaction data authentication method according to claim 1, which is characterized in that it is described using pre-defined algorithm to acquisition The transaction data to be verified is handled, and the corresponding data to be compared of the transaction data to be verified are obtained, comprising:
Operation is carried out to the transaction data to be verified using pre-defined algorithm, obtains the identity of the transaction data to be verified Information;
Storage parameter and the identification information based on the transaction data to be verified, determine the transaction data to be verified Corresponding data to be compared.
8. transaction data authentication method according to claim 7, which is characterized in that described to be based on the number of deals to be verified According to storage parameter and the identification information, determine the corresponding data to be compared of the transaction data to be verified, comprising:
The storage parameter of the transaction data to be verified is encrypted;
Based on encrypted storage parameter and the identification information, determine that the transaction data to be verified is corresponding to be compared Data.
9. a kind of transaction data authentication device based on block chain characterized by comprising
Data acquisition module, for obtaining transaction data to be verified;
First data processing module is obtained for being handled using the transaction data to be verified of the pre-defined algorithm to acquisition The corresponding data to be compared of the transaction data to be verified;
Second data processing module, for obtaining normal data corresponding with the transaction data to be verified from block chain, and Determine whether the data to be compared match with the normal data;
Data Verification module, for determining the friendship to be verified when the data to be compared and the normal data mismatch Easy data verification failure.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer journey on the computer readable storage medium Sequence, the computer program execute the method for verifying transaction data as described in any of the claims 1 to 8 when being run by processor Step.
CN201910286296.0A 2019-04-10 2019-04-10 A kind of transaction data authentication method, apparatus and storage medium based on block chain Pending CN110020951A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910286296.0A CN110020951A (en) 2019-04-10 2019-04-10 A kind of transaction data authentication method, apparatus and storage medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910286296.0A CN110020951A (en) 2019-04-10 2019-04-10 A kind of transaction data authentication method, apparatus and storage medium based on block chain

Publications (1)

Publication Number Publication Date
CN110020951A true CN110020951A (en) 2019-07-16

Family

ID=67190971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910286296.0A Pending CN110020951A (en) 2019-04-10 2019-04-10 A kind of transaction data authentication method, apparatus and storage medium based on block chain

Country Status (1)

Country Link
CN (1) CN110020951A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111200741A (en) * 2020-04-02 2020-05-26 上海商魁信息科技有限公司 Video processing method and device and machine-readable storage medium
CN111475865A (en) * 2020-04-13 2020-07-31 北京新能源汽车技术创新中心有限公司 Automobile data verification method and verification device
CN111861734A (en) * 2020-07-31 2020-10-30 重庆富民银行股份有限公司 Test evaluation system and method for three-party data source
CN113515579A (en) * 2021-06-17 2021-10-19 自然资源部地图技术审查中心 Boundary peak data screening method and device
CN113761585A (en) * 2020-06-17 2021-12-07 北京沃东天骏信息技术有限公司 Data processing method, device and system
CN116401718A (en) * 2023-06-08 2023-07-07 科大讯飞股份有限公司 Block chain-based data protection method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN106548330A (en) * 2016-10-27 2017-03-29 上海亿账通区块链科技有限公司 Transaction verification method and system based on block chain
CN107545181A (en) * 2017-08-16 2018-01-05 上海策赢网络科技有限公司 Program operating method, terminal and computer-readable recording medium
CN109101572A (en) * 2018-07-17 2018-12-28 何晓行 Card method, apparatus and server, storage medium are deposited based on block chain
CN109408319A (en) * 2018-08-30 2019-03-01 中国地质大学(武汉) A kind of software running technology method for monitoring state based on block chain
CN109447631A (en) * 2018-09-19 2019-03-08 平安科技(深圳)有限公司 Client, server, method of commerce and storage medium based on block chain
CN109543459A (en) * 2018-11-22 2019-03-29 中国联合网络通信集团有限公司 A kind of data deposit card method and apparatus
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106548330A (en) * 2016-10-27 2017-03-29 上海亿账通区块链科技有限公司 Transaction verification method and system based on block chain
CN107545181A (en) * 2017-08-16 2018-01-05 上海策赢网络科技有限公司 Program operating method, terminal and computer-readable recording medium
CN109101572A (en) * 2018-07-17 2018-12-28 何晓行 Card method, apparatus and server, storage medium are deposited based on block chain
CN109408319A (en) * 2018-08-30 2019-03-01 中国地质大学(武汉) A kind of software running technology method for monitoring state based on block chain
CN109447631A (en) * 2018-09-19 2019-03-08 平安科技(深圳)有限公司 Client, server, method of commerce and storage medium based on block chain
CN109543459A (en) * 2018-11-22 2019-03-29 中国联合网络通信集团有限公司 A kind of data deposit card method and apparatus
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国财务公司协会: "《互联网+建筑 数字经济下的智慧建筑行业变革》", 31 December 2018 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111200741A (en) * 2020-04-02 2020-05-26 上海商魁信息科技有限公司 Video processing method and device and machine-readable storage medium
CN111475865A (en) * 2020-04-13 2020-07-31 北京新能源汽车技术创新中心有限公司 Automobile data verification method and verification device
CN113761585A (en) * 2020-06-17 2021-12-07 北京沃东天骏信息技术有限公司 Data processing method, device and system
CN111861734A (en) * 2020-07-31 2020-10-30 重庆富民银行股份有限公司 Test evaluation system and method for three-party data source
CN111861734B (en) * 2020-07-31 2024-05-03 重庆富民银行股份有限公司 Test evaluation system and method for three-party data source
CN113515579A (en) * 2021-06-17 2021-10-19 自然资源部地图技术审查中心 Boundary peak data screening method and device
CN113515579B (en) * 2021-06-17 2024-01-19 自然资源部地图技术审查中心 Method and device for screening boundary peak data
CN116401718A (en) * 2023-06-08 2023-07-07 科大讯飞股份有限公司 Block chain-based data protection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110020951A (en) A kind of transaction data authentication method, apparatus and storage medium based on block chain
CN111989893B (en) Method, system and computer readable device for generating and linking zero knowledge proofs
AU2019295815C1 (en) Blockchain-based data verification method and apparatus, and electronic device
CN108111314B (en) Method and equipment for generating and verifying digital certificate
CN105574435B (en) Electronic contract on-line signing, verification method, apparatus and system
WO2019144612A1 (en) Zero-knowledge multi-account-book exchange transfer method and apparatus based on blockchain, and storage medium
JP5710075B2 (en) Certificate validation
CN107612697B (en) Digital certificate application method and device
CN105701372A (en) Block chain identity construction and verification method
US20200097950A1 (en) Privileged entity consensus for digital asset creation
TW202013930A (en) A method and apparatus for authenticate user identity in a network
CN109818730B (en) Blind signature acquisition method and device and server
US20180158058A1 (en) Apparatus and method to prevent execution of an unauthorized transaction via a distributed database
CN105227319A (en) A kind of method of authentication server and device
CN110048851B (en) Method and device for generating and verifying multilayer linkable ring signature in block chain
CN108292341A (en) Method for the execution integrality for verifying the application in destination apparatus
CN110363509A (en) A kind of information protecting method and device
JP2020536473A5 (en)
CN114201781A (en) Block chain-based storage verification method and device, computer equipment and medium
CN113656497A (en) Data verification method and device based on block chain
WO2022205961A1 (en) Method and apparatus for updating blockchain domain name configuration
CN109698750A (en) Block generation method, device, equipment and the readable storage medium storing program for executing of block chain
WO2019203790A1 (en) Workflow transactions
CN114387137A (en) Block chain-based electronic contract signing method, device, equipment and storage medium
CN107743066B (en) Monitorable anonymous signature method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190716