CN110232286B - E-commerce data chaining method and equipment applying intelligent contracts - Google Patents

E-commerce data chaining method and equipment applying intelligent contracts Download PDF

Info

Publication number
CN110232286B
CN110232286B CN201910547037.9A CN201910547037A CN110232286B CN 110232286 B CN110232286 B CN 110232286B CN 201910547037 A CN201910547037 A CN 201910547037A CN 110232286 B CN110232286 B CN 110232286B
Authority
CN
China
Prior art keywords
client
commerce data
public key
commerce
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910547037.9A
Other languages
Chinese (zh)
Other versions
CN110232286A (en
Inventor
吉建勋
杨慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruice Technology Co Ltd
Original Assignee
Beijing Ruice Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruice Technology Co Ltd filed Critical Beijing Ruice Technology Co Ltd
Priority to CN201910547037.9A priority Critical patent/CN110232286B/en
Publication of CN110232286A publication Critical patent/CN110232286A/en
Application granted granted Critical
Publication of CN110232286B publication Critical patent/CN110232286B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an electronic commerce data chaining method and equipment applying an intelligent contract, wherein the method comprises the following steps: the block chain node receives an E-business data uplink request sent by a first client; triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the first client; receiving a query request of the E-commerce data of a second client; triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client; after the verification is passed, sending the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key; receiving an e-commerce data query response sent by the first client; triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed. According to the method and the device, E-commerce data can be linked up publicly and credibly.

Description

E-commerce data chaining method and equipment applying intelligent contracts
Technical Field
The application relates to the technical field of block chains, in particular to an e-commerce data chaining method and equipment applying an intelligent contract.
Background
At present, a block chain technology is based on a decentralized peer-to-peer network, and open source software is used for combining a cryptography principle, time sequence data and a consensus mechanism to ensure the consistency and the persistence of each node in a distributed database, so that information can be immediately verified and traceable, but is difficult to tamper and cannot be shielded, and a set of private, efficient and safe shared value system is created.
The existing electronic commerce companies all adopt a centralized database, and store the contents of commodity purchase times, browsing records, user evaluation and the like; however, the centralized database of the electronic commerce has problems that data is tampered, authenticity of the data cannot be guaranteed, and the like, and an operation platform of the electronic commerce modifies the number of times of purchase of a certain commodity and deletes bad comments of users. Especially for some small-scale electronic commerce platforms, the data security and authenticity of the goods cannot be guaranteed.
Therefore, how to store the data of the e-commerce platform on the blockchain in a reliable manner based on the non-tampering of the blockchain becomes a problem to be solved urgently.
The above is only for the purpose of assisting understanding of the technical solutions of the present application, and does not represent an admission that the above is prior art.
Disclosure of Invention
In order to solve the above problems, the present application provides an e-commerce data chaining method and an apparatus thereof applying an intelligent contract, which can enable the e-commerce data to be chained, so that the e-commerce data on the chain is credible and is publicly transparent.
A first aspect of the present application provides an electronic commerce data chaining method applying an intelligent contract, where the method includes:
the method comprises the steps that a block chain node receives an E-commerce data uplink request sent by a first client, wherein the E-commerce data uplink request comprises E-commerce data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain winding process of the e-commerce data after the verification is passed;
the block chain node receives a query request of the E-commerce data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain nodes send the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the block chain node receives an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed.
In one possible implementation, the method further includes: the block chain node receives an E-commerce data query request sent by the second client;
and the block chain node sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In a possible implementation manner, the e-commerce data is operation data of a user on the e-commerce platform corresponding to the first client, and includes the number of times of purchasing commodities, commodity purchasing time, and commodity browsing times.
In a possible implementation manner, the first client encrypts the e-commerce data by using its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one possible implementation, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
A second aspect of the present application provides an e-commerce data uplink device applying an intelligent contract, where the device is a block chain node, and the device includes a receiving unit, a processing unit, and a sending unit; wherein the content of the first and second substances,
the receiving unit receives an e-commerce data uplink request sent by a first client, wherein the e-commerce data uplink request comprises e-commerce data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the E-commerce data is executed;
the receiving unit is used for receiving a query request of the e-commerce data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the receiving unit is used for receiving an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the E-commerce data encrypted by the public key of the second client is subjected to uplink process execution.
In a possible implementation manner, the receiving unit receives an e-commerce data query request sent by the second client; the sending unit sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In a possible implementation manner, the e-commerce data is operation data of a user on the e-commerce platform corresponding to the first client, and includes the number of times of purchasing commodities, commodity purchasing time, and commodity browsing times.
In a possible implementation manner, the first client encrypts the e-commerce data by using its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one possible implementation, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
According to the method and the device, the data of the e-commerce can be linked up, so that the e-commerce data on the chain can be credible and is public and transparent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
Fig. 1 is a schematic flow chart of an e-commerce data uplink method applying an intelligent contract according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of another electronic commerce data uplink method applying an intelligent contract according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an e-commerce data uplink device applying an intelligent contract according to an embodiment of the present disclosure.
Detailed Description
In order to more clearly explain the overall concept of the present application, the following detailed description is given by way of example in conjunction with the accompanying drawings.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the order of such use may be interchanged under appropriate circumstances such that embodiments of the invention described herein may be practiced in other orders than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The block link point and the client referred to in the embodiment of the application may be understood as an abstract machine that responds to an external specific trigger condition and performs state conversion according to a certain rule, and may be a device that can be networked according to application software, such as a mobile phone, a tablet computer, a palm computer, a personal PC, and the like.
As shown in fig. 1, a method for chaining e-commerce data by applying an intelligent contract includes steps S101-S107.
S101, a block chain node receives an E-commerce data uplink request sent by a first client, wherein the E-commerce data uplink request comprises E-commerce data encrypted by a public key of the first client.
And S102, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the E-commerce data after the verification is passed.
S103, the block chain node receives a query request of the E-commerce data of a second client.
And S104, triggering a verification intelligent contract, and verifying the identity of the second client by the verification intelligent contract.
And S105, after the verification is passed, the block link points send the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key.
And S106, the block chain node receives an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of the second client.
And S107, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed.
In one example, the method further comprises: the block chain node receives an E-commerce data query request sent by the second client; and the block chain node sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In one example, the e-commerce data is operation data of a user corresponding to the first client on an e-commerce platform, and includes the number of purchases of goods, the time of purchase of the goods, and the number of browsing times of the goods.
In one example, the first client encrypts the e-commerce data with its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one example, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
In the above example, the first client is used as an operator of the e-commerce data, and the second client is used as an inquirer of the e-commerce data; for a specific e-commerce platform, each user can be an operator of e-commerce data or an inquirer of the e-commerce data.
The method for uplink of e-commerce data will be described with reference to fig. 2, which includes steps S201-S214.
S201, the first client encrypts the e-commerce data generated by the first client by using a public key, wherein the e-commerce operation data comprises data generated by user operation behaviors such as commodity purchase times of a user on an e-commerce platform, commodity purchase time, an IP address of the user, an account password of the user, commodity browsing and the like.
The first client encrypts the e-commerce data generated by the first client by using the own public key, wherein the encryption can be performed by encrypting all fields of the e-commerce data or encrypting partial fields of the e-commerce data, such as: only private comment content is encrypted; or the user does not encrypt the e-commerce data.
In addition, the e-commerce data includes two attributes, an associated attribute and a non-associated attribute. For example: the user comment content belongs to the non-associated attribute, and the comment content of each user can be stored in the block chain; for example: the number of the user comment contents is the correlation attribute, the data format of one commodity comprises the comment number, and the comment number of the commodity can be automatically superposed as long as a user comments on the commodity.
S202, the first ue sends an e-commerce data uplink request to the blockchain node.
And S203, triggering a checking intelligent contract on the block chain, checking the identity of the first client by the checking intelligent contract, and executing the uplink process of the e-commerce data.
The checking means that whether the first client is a user of the e-commerce platform is judged, and only the user of the e-commerce platform can have the authority to uplink the e-commerce data.
It should be noted that the uplink process is a conventional process in the art and will not be described in detail. For example: and under the workload certification PoW common mode, packaging and verifying the data, wherein the block link point of the account right can place the packaged block in the next block of the current block as a new block uplink.
S204, the block node sends a power uplink response to the first ue.
S205, the second client sends an e-commerce data query request to the block chain node, wherein the e-commerce data query request comprises a public key of the second client.
At this time, the user corresponding to the second client may query the e-commerce data after seeing the e-commerce data. In the application, the first client and the second client are both terminal devices provided with decentralized application software, and can directly perform information interaction with the blockchain nodes on the blockchain.
And S206, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the second client.
After the verification is passed, executing the next flow; the check fails and the process terminates.
And S207, after the verification is passed, the block link node sends a power provider data query request to the first client, wherein the power provider data query request comprises a second client public key.
And S208, the first client encrypts the e-commerce data by using the second client public key.
And S209, the first client sends an e-commerce data query response to the block chain node, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client.
S210, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the first client and executes the uplink process on the E-commerce data encrypted by the public key of the second client.
And S211, sending the supplier data query response to the second client by the block link node.
S212, the second client sends an e-commerce data query request to the block chain node.
S213, the block link sends the e-commerce data query response to the second client, where the e-commerce data query response includes e-commerce data encrypted by the public key of the second client.
S214, the second client decrypts the e-commerce data encrypted by the public key of the second client by using the private key of the second client to obtain the e-commerce data.
According to the method and the device, the data of the e-commerce can be linked, the link process is public and transparent, and any user of the same e-commerce platform can check the e-commerce data; the authenticity of the e-commerce data is guaranteed. In addition, the user can encrypt or not encrypt the e-commerce data according to own preference, and user experience is improved.
As shown in fig. 3, an e-commerce data uplink apparatus applying an intelligent contract, where the apparatus is a block chain node, and the apparatus includes a receiving unit, a processing unit, and a sending unit.
The receiving unit receives an e-commerce data uplink request sent by a first client, wherein the e-commerce data uplink request comprises e-commerce data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the E-commerce data is executed;
the receiving unit is used for receiving a query request of the e-commerce data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the receiving unit is used for receiving an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the E-commerce data encrypted by the public key of the second client is subjected to uplink process execution.
In one example, the receiving unit receives an e-commerce data query request sent by the second client; the sending unit sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In one example, the e-commerce data is operation data of a user corresponding to the first client on an e-commerce platform, and includes the number of purchases of goods, the time of purchase of the goods, and the number of browsing times of the goods.
In one example, the first client encrypts the e-commerce data with its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one example, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
According to the method and the device, the data of the e-commerce can be linked, the link process is public and transparent, and any user of the same e-commerce platform can check the e-commerce data; the authenticity of the e-commerce data is guaranteed. In addition, the user can encrypt or not encrypt the e-commerce data according to own preference, and user experience is improved.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. An e-commerce data chaining method applying an intelligent contract, the method comprising:
the method comprises the steps that a block chain node receives an E-commerce data uplink request sent by a first client, wherein the E-commerce data uplink request comprises E-commerce data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain winding process of the e-commerce data after the verification is passed;
the block chain node receives a query request of the E-commerce data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain nodes send the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the block chain node receives an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed;
the e-commerce data is operation data of a user corresponding to the first client on the e-commerce platform and comprises commodity purchase times, commodity purchase time and commodity browsing times.
2. The method of claim 1, further comprising:
the block chain node receives an E-commerce data query request sent by the second client;
and the block chain node sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
3. The method according to claim 1, wherein the first client encrypts the e-commerce data with its own public key, specifically:
and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
4. The method of claim 1, wherein the e-commerce data comprises an associated attribute and a non-associated attribute; wherein the content of the first and second substances,
and automatically superposing attribute values of the e-commerce data association attributes.
5. An E-commerce data uplink device applying an intelligent contract is characterized in that the device is a block chain node and comprises a receiving unit, a processing unit and a sending unit; wherein the content of the first and second substances,
the receiving unit receives an e-commerce data uplink request sent by a first client, wherein the e-commerce data uplink request comprises e-commerce data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the E-commerce data is executed;
the receiving unit is used for receiving a query request of the e-commerce data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the receiving unit is used for receiving an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, the E-commerce data encrypted by the public key of the second client is subjected to uplink process execution;
the e-commerce data is operation data of a user corresponding to the first client on the e-commerce platform and comprises commodity purchase times, commodity purchase time and commodity browsing times.
6. The apparatus of claim 5,
the receiving unit is used for receiving an e-commerce data query request sent by the second client;
the sending unit sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
7. The device according to claim 5, wherein the first client encrypts the e-commerce data with its own public key, specifically:
and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
8. The apparatus of claim 5, wherein the e-commerce data comprises an associated attribute and a non-associated attribute; wherein the content of the first and second substances,
and automatically superposing attribute values of the e-commerce data association attributes.
CN201910547037.9A 2019-06-24 2019-06-24 E-commerce data chaining method and equipment applying intelligent contracts Active CN110232286B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547037.9A CN110232286B (en) 2019-06-24 2019-06-24 E-commerce data chaining method and equipment applying intelligent contracts

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547037.9A CN110232286B (en) 2019-06-24 2019-06-24 E-commerce data chaining method and equipment applying intelligent contracts

Publications (2)

Publication Number Publication Date
CN110232286A CN110232286A (en) 2019-09-13
CN110232286B true CN110232286B (en) 2021-05-28

Family

ID=67857154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547037.9A Active CN110232286B (en) 2019-06-24 2019-06-24 E-commerce data chaining method and equipment applying intelligent contracts

Country Status (1)

Country Link
CN (1) CN110232286B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995752B (en) * 2019-12-18 2021-10-26 广州赛特智能科技有限公司 System, method and medium for tracking commodities based on Ether house and asymmetric encryption algorithm
CN111488343A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 E-commerce data uplink method and device based on business data block chain
CN111488353B (en) * 2020-04-08 2023-04-07 北京瑞策科技有限公司 Intelligent contract implementation method and device for business data block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339639A (en) * 2016-08-30 2017-01-18 弗洛格(武汉)信息科技有限公司 Credit score management method and system based on block chain
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN108765023A (en) * 2018-06-01 2018-11-06 深圳市元征科技股份有限公司 A kind of commodity evaluation management method, system and equipment
CN109784931A (en) * 2019-02-27 2019-05-21 成都埃克森尔科技有限公司 A kind of querying method of the Data Query Platform based on block chain
CN109858228A (en) * 2019-01-31 2019-06-07 上海计算机软件技术开发中心 Data sharing service platform and method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339639A (en) * 2016-08-30 2017-01-18 弗洛格(武汉)信息科技有限公司 Credit score management method and system based on block chain
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN108765023A (en) * 2018-06-01 2018-11-06 深圳市元征科技股份有限公司 A kind of commodity evaluation management method, system and equipment
CN109858228A (en) * 2019-01-31 2019-06-07 上海计算机软件技术开发中心 Data sharing service platform and method based on block chain
CN109784931A (en) * 2019-02-27 2019-05-21 成都埃克森尔科技有限公司 A kind of querying method of the Data Query Platform based on block chain

Also Published As

Publication number Publication date
CN110232286A (en) 2019-09-13

Similar Documents

Publication Publication Date Title
CN110232286B (en) E-commerce data chaining method and equipment applying intelligent contracts
Pal et al. IoT technical challenges and solutions
CN110225032B (en) Business data transaction method and equipment
CN110245004A (en) Command executing method, device, equipment and computer readable storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
Patel et al. A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems
CN111488372A (en) Data processing method, device and storage medium
Dadeau et al. Model‐based mutation testing from security protocols in HLPSL
CN110247923A (en) Number cochain method and its equipment are shaken based on block chain
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110266696A (en) A kind of evaluation data cochain method and its equipment applied to block chain
CN110263529A (en) Number cochain method and its equipment are shaken using intelligent contract
CN110278270A (en) A kind of polled data cochain method and its equipment based on block chain
CN106161467A (en) Water utilities data access method and device
CN110247921A (en) A kind of polled data cochain method and its equipment for applying intelligent contract
CN110264205A (en) A kind of electric quotient data cochain method and its equipment applied to block chain
CN110263562A (en) A kind of evaluation data cochain method and its equipment based on block chain
CN111125734B (en) Data processing method and system
CN110213296A (en) It is a kind of that data cochain method and its equipment are thumbed up based on block chain
CN110225056A (en) A kind of evaluation data cochain method and its equipment for applying intelligent contract
CN110245512A (en) Lottery data cochain method and its equipment applied to block chain
CN110266695A (en) Using the lottery data cochain method and its equipment of intelligent contract
US20210084027A1 (en) A Digitally Certified Ecosystem
CN110233853A (en) It is a kind of to thumb up data cochain method and its equipment applied to block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085

Applicant after: Beijing ruice Technology Co.,Ltd.

Address before: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085

Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant