CN110232286B - E-commerce data chaining method and equipment applying intelligent contracts - Google Patents
E-commerce data chaining method and equipment applying intelligent contracts Download PDFInfo
- Publication number
- CN110232286B CN110232286B CN201910547037.9A CN201910547037A CN110232286B CN 110232286 B CN110232286 B CN 110232286B CN 201910547037 A CN201910547037 A CN 201910547037A CN 110232286 B CN110232286 B CN 110232286B
- Authority
- CN
- China
- Prior art keywords
- client
- commerce data
- public key
- commerce
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses an electronic commerce data chaining method and equipment applying an intelligent contract, wherein the method comprises the following steps: the block chain node receives an E-business data uplink request sent by a first client; triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the first client; receiving a query request of the E-commerce data of a second client; triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client; after the verification is passed, sending the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key; receiving an e-commerce data query response sent by the first client; triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed. According to the method and the device, E-commerce data can be linked up publicly and credibly.
Description
Technical Field
The application relates to the technical field of block chains, in particular to an e-commerce data chaining method and equipment applying an intelligent contract.
Background
At present, a block chain technology is based on a decentralized peer-to-peer network, and open source software is used for combining a cryptography principle, time sequence data and a consensus mechanism to ensure the consistency and the persistence of each node in a distributed database, so that information can be immediately verified and traceable, but is difficult to tamper and cannot be shielded, and a set of private, efficient and safe shared value system is created.
The existing electronic commerce companies all adopt a centralized database, and store the contents of commodity purchase times, browsing records, user evaluation and the like; however, the centralized database of the electronic commerce has problems that data is tampered, authenticity of the data cannot be guaranteed, and the like, and an operation platform of the electronic commerce modifies the number of times of purchase of a certain commodity and deletes bad comments of users. Especially for some small-scale electronic commerce platforms, the data security and authenticity of the goods cannot be guaranteed.
Therefore, how to store the data of the e-commerce platform on the blockchain in a reliable manner based on the non-tampering of the blockchain becomes a problem to be solved urgently.
The above is only for the purpose of assisting understanding of the technical solutions of the present application, and does not represent an admission that the above is prior art.
Disclosure of Invention
In order to solve the above problems, the present application provides an e-commerce data chaining method and an apparatus thereof applying an intelligent contract, which can enable the e-commerce data to be chained, so that the e-commerce data on the chain is credible and is publicly transparent.
A first aspect of the present application provides an electronic commerce data chaining method applying an intelligent contract, where the method includes:
the method comprises the steps that a block chain node receives an E-commerce data uplink request sent by a first client, wherein the E-commerce data uplink request comprises E-commerce data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain winding process of the e-commerce data after the verification is passed;
the block chain node receives a query request of the E-commerce data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain nodes send the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the block chain node receives an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed.
In one possible implementation, the method further includes: the block chain node receives an E-commerce data query request sent by the second client;
and the block chain node sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In a possible implementation manner, the e-commerce data is operation data of a user on the e-commerce platform corresponding to the first client, and includes the number of times of purchasing commodities, commodity purchasing time, and commodity browsing times.
In a possible implementation manner, the first client encrypts the e-commerce data by using its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one possible implementation, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
A second aspect of the present application provides an e-commerce data uplink device applying an intelligent contract, where the device is a block chain node, and the device includes a receiving unit, a processing unit, and a sending unit; wherein the content of the first and second substances,
the receiving unit receives an e-commerce data uplink request sent by a first client, wherein the e-commerce data uplink request comprises e-commerce data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the E-commerce data is executed;
the receiving unit is used for receiving a query request of the e-commerce data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the receiving unit is used for receiving an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the E-commerce data encrypted by the public key of the second client is subjected to uplink process execution.
In a possible implementation manner, the receiving unit receives an e-commerce data query request sent by the second client; the sending unit sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In a possible implementation manner, the e-commerce data is operation data of a user on the e-commerce platform corresponding to the first client, and includes the number of times of purchasing commodities, commodity purchasing time, and commodity browsing times.
In a possible implementation manner, the first client encrypts the e-commerce data by using its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one possible implementation, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
According to the method and the device, the data of the e-commerce can be linked up, so that the e-commerce data on the chain can be credible and is public and transparent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
Fig. 1 is a schematic flow chart of an e-commerce data uplink method applying an intelligent contract according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of another electronic commerce data uplink method applying an intelligent contract according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an e-commerce data uplink device applying an intelligent contract according to an embodiment of the present disclosure.
Detailed Description
In order to more clearly explain the overall concept of the present application, the following detailed description is given by way of example in conjunction with the accompanying drawings.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the order of such use may be interchanged under appropriate circumstances such that embodiments of the invention described herein may be practiced in other orders than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The block link point and the client referred to in the embodiment of the application may be understood as an abstract machine that responds to an external specific trigger condition and performs state conversion according to a certain rule, and may be a device that can be networked according to application software, such as a mobile phone, a tablet computer, a palm computer, a personal PC, and the like.
As shown in fig. 1, a method for chaining e-commerce data by applying an intelligent contract includes steps S101-S107.
S101, a block chain node receives an E-commerce data uplink request sent by a first client, wherein the E-commerce data uplink request comprises E-commerce data encrypted by a public key of the first client.
And S102, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the E-commerce data after the verification is passed.
S103, the block chain node receives a query request of the E-commerce data of a second client.
And S104, triggering a verification intelligent contract, and verifying the identity of the second client by the verification intelligent contract.
And S105, after the verification is passed, the block link points send the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key.
And S106, the block chain node receives an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of the second client.
And S107, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed.
In one example, the method further comprises: the block chain node receives an E-commerce data query request sent by the second client; and the block chain node sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In one example, the e-commerce data is operation data of a user corresponding to the first client on an e-commerce platform, and includes the number of purchases of goods, the time of purchase of the goods, and the number of browsing times of the goods.
In one example, the first client encrypts the e-commerce data with its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one example, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
In the above example, the first client is used as an operator of the e-commerce data, and the second client is used as an inquirer of the e-commerce data; for a specific e-commerce platform, each user can be an operator of e-commerce data or an inquirer of the e-commerce data.
The method for uplink of e-commerce data will be described with reference to fig. 2, which includes steps S201-S214.
S201, the first client encrypts the e-commerce data generated by the first client by using a public key, wherein the e-commerce operation data comprises data generated by user operation behaviors such as commodity purchase times of a user on an e-commerce platform, commodity purchase time, an IP address of the user, an account password of the user, commodity browsing and the like.
The first client encrypts the e-commerce data generated by the first client by using the own public key, wherein the encryption can be performed by encrypting all fields of the e-commerce data or encrypting partial fields of the e-commerce data, such as: only private comment content is encrypted; or the user does not encrypt the e-commerce data.
In addition, the e-commerce data includes two attributes, an associated attribute and a non-associated attribute. For example: the user comment content belongs to the non-associated attribute, and the comment content of each user can be stored in the block chain; for example: the number of the user comment contents is the correlation attribute, the data format of one commodity comprises the comment number, and the comment number of the commodity can be automatically superposed as long as a user comments on the commodity.
S202, the first ue sends an e-commerce data uplink request to the blockchain node.
And S203, triggering a checking intelligent contract on the block chain, checking the identity of the first client by the checking intelligent contract, and executing the uplink process of the e-commerce data.
The checking means that whether the first client is a user of the e-commerce platform is judged, and only the user of the e-commerce platform can have the authority to uplink the e-commerce data.
It should be noted that the uplink process is a conventional process in the art and will not be described in detail. For example: and under the workload certification PoW common mode, packaging and verifying the data, wherein the block link point of the account right can place the packaged block in the next block of the current block as a new block uplink.
S204, the block node sends a power uplink response to the first ue.
S205, the second client sends an e-commerce data query request to the block chain node, wherein the e-commerce data query request comprises a public key of the second client.
At this time, the user corresponding to the second client may query the e-commerce data after seeing the e-commerce data. In the application, the first client and the second client are both terminal devices provided with decentralized application software, and can directly perform information interaction with the blockchain nodes on the blockchain.
And S206, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the second client.
After the verification is passed, executing the next flow; the check fails and the process terminates.
And S207, after the verification is passed, the block link node sends a power provider data query request to the first client, wherein the power provider data query request comprises a second client public key.
And S208, the first client encrypts the e-commerce data by using the second client public key.
And S209, the first client sends an e-commerce data query response to the block chain node, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client.
S210, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the first client and executes the uplink process on the E-commerce data encrypted by the public key of the second client.
And S211, sending the supplier data query response to the second client by the block link node.
S212, the second client sends an e-commerce data query request to the block chain node.
S213, the block link sends the e-commerce data query response to the second client, where the e-commerce data query response includes e-commerce data encrypted by the public key of the second client.
S214, the second client decrypts the e-commerce data encrypted by the public key of the second client by using the private key of the second client to obtain the e-commerce data.
According to the method and the device, the data of the e-commerce can be linked, the link process is public and transparent, and any user of the same e-commerce platform can check the e-commerce data; the authenticity of the e-commerce data is guaranteed. In addition, the user can encrypt or not encrypt the e-commerce data according to own preference, and user experience is improved.
As shown in fig. 3, an e-commerce data uplink apparatus applying an intelligent contract, where the apparatus is a block chain node, and the apparatus includes a receiving unit, a processing unit, and a sending unit.
The receiving unit receives an e-commerce data uplink request sent by a first client, wherein the e-commerce data uplink request comprises e-commerce data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the E-commerce data is executed;
the receiving unit is used for receiving a query request of the e-commerce data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the receiving unit is used for receiving an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the E-commerce data encrypted by the public key of the second client is subjected to uplink process execution.
In one example, the receiving unit receives an e-commerce data query request sent by the second client; the sending unit sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
In one example, the e-commerce data is operation data of a user corresponding to the first client on an e-commerce platform, and includes the number of purchases of goods, the time of purchase of the goods, and the number of browsing times of the goods.
In one example, the first client encrypts the e-commerce data with its own public key, specifically: and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
In one example, the e-commerce data includes an associated attribute and a non-associated attribute; and automatically superposing attribute values of the e-commerce data association attribute.
According to the method and the device, the data of the e-commerce can be linked, the link process is public and transparent, and any user of the same e-commerce platform can check the e-commerce data; the authenticity of the e-commerce data is guaranteed. In addition, the user can encrypt or not encrypt the e-commerce data according to own preference, and user experience is improved.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (8)
1. An e-commerce data chaining method applying an intelligent contract, the method comprising:
the method comprises the steps that a block chain node receives an E-commerce data uplink request sent by a first client, wherein the E-commerce data uplink request comprises E-commerce data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain winding process of the e-commerce data after the verification is passed;
the block chain node receives a query request of the E-commerce data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain nodes send the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the block chain node receives an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain loading process on the E-commerce data encrypted by the public key of the second client after the verification is passed;
the e-commerce data is operation data of a user corresponding to the first client on the e-commerce platform and comprises commodity purchase times, commodity purchase time and commodity browsing times.
2. The method of claim 1, further comprising:
the block chain node receives an E-commerce data query request sent by the second client;
and the block chain node sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
3. The method according to claim 1, wherein the first client encrypts the e-commerce data with its own public key, specifically:
and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
4. The method of claim 1, wherein the e-commerce data comprises an associated attribute and a non-associated attribute; wherein the content of the first and second substances,
and automatically superposing attribute values of the e-commerce data association attributes.
5. An E-commerce data uplink device applying an intelligent contract is characterized in that the device is a block chain node and comprises a receiving unit, a processing unit and a sending unit; wherein the content of the first and second substances,
the receiving unit receives an e-commerce data uplink request sent by a first client, wherein the e-commerce data uplink request comprises e-commerce data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the E-commerce data is executed;
the receiving unit is used for receiving a query request of the e-commerce data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the e-commerce data query request to the first client, wherein the e-commerce data query request comprises a second client public key, so that the first client encrypts the e-commerce data by using the second client public key;
the receiving unit is used for receiving an e-commerce data query response sent by the first client, wherein the e-commerce data query response comprises e-commerce data encrypted by a public key of a second client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, the E-commerce data encrypted by the public key of the second client is subjected to uplink process execution;
the e-commerce data is operation data of a user corresponding to the first client on the e-commerce platform and comprises commodity purchase times, commodity purchase time and commodity browsing times.
6. The apparatus of claim 5,
the receiving unit is used for receiving an e-commerce data query request sent by the second client;
the sending unit sends an e-commerce data query response to the second client, wherein the e-commerce data query response comprises e-commerce data encrypted by the public key of the second client, so that the second client can decrypt the e-commerce data encrypted by the public key of the second client by using a private key of the second client.
7. The device according to claim 5, wherein the first client encrypts the e-commerce data with its own public key, specifically:
and the first client encrypts the e-commerce data by using a self public key in a preset proportion.
8. The apparatus of claim 5, wherein the e-commerce data comprises an associated attribute and a non-associated attribute; wherein the content of the first and second substances,
and automatically superposing attribute values of the e-commerce data association attributes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547037.9A CN110232286B (en) | 2019-06-24 | 2019-06-24 | E-commerce data chaining method and equipment applying intelligent contracts |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547037.9A CN110232286B (en) | 2019-06-24 | 2019-06-24 | E-commerce data chaining method and equipment applying intelligent contracts |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110232286A CN110232286A (en) | 2019-09-13 |
CN110232286B true CN110232286B (en) | 2021-05-28 |
Family
ID=67857154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910547037.9A Active CN110232286B (en) | 2019-06-24 | 2019-06-24 | E-commerce data chaining method and equipment applying intelligent contracts |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110232286B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110995752B (en) * | 2019-12-18 | 2021-10-26 | 广州赛特智能科技有限公司 | System, method and medium for tracking commodities based on Ether house and asymmetric encryption algorithm |
CN111488343A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | E-commerce data uplink method and device based on business data block chain |
CN111488353B (en) * | 2020-04-08 | 2023-04-07 | 北京瑞策科技有限公司 | Intelligent contract implementation method and device for business data block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
CN108765023A (en) * | 2018-06-01 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of commodity evaluation management method, system and equipment |
CN109784931A (en) * | 2019-02-27 | 2019-05-21 | 成都埃克森尔科技有限公司 | A kind of querying method of the Data Query Platform based on block chain |
CN109858228A (en) * | 2019-01-31 | 2019-06-07 | 上海计算机软件技术开发中心 | Data sharing service platform and method based on block chain |
-
2019
- 2019-06-24 CN CN201910547037.9A patent/CN110232286B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
CN108765023A (en) * | 2018-06-01 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of commodity evaluation management method, system and equipment |
CN109858228A (en) * | 2019-01-31 | 2019-06-07 | 上海计算机软件技术开发中心 | Data sharing service platform and method based on block chain |
CN109784931A (en) * | 2019-02-27 | 2019-05-21 | 成都埃克森尔科技有限公司 | A kind of querying method of the Data Query Platform based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110232286A (en) | 2019-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110232286B (en) | E-commerce data chaining method and equipment applying intelligent contracts | |
Pal et al. | IoT technical challenges and solutions | |
CN110225032B (en) | Business data transaction method and equipment | |
CN110245004A (en) | Command executing method, device, equipment and computer readable storage medium | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
Patel et al. | A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems | |
CN111488372A (en) | Data processing method, device and storage medium | |
Dadeau et al. | Model‐based mutation testing from security protocols in HLPSL | |
CN110247923A (en) | Number cochain method and its equipment are shaken based on block chain | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN110264206A (en) | A kind of electric quotient data cochain method and its equipment based on block chain | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
CN110263529A (en) | Number cochain method and its equipment are shaken using intelligent contract | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN106161467A (en) | Water utilities data access method and device | |
CN110247921A (en) | A kind of polled data cochain method and its equipment for applying intelligent contract | |
CN110264205A (en) | A kind of electric quotient data cochain method and its equipment applied to block chain | |
CN110263562A (en) | A kind of evaluation data cochain method and its equipment based on block chain | |
CN111125734B (en) | Data processing method and system | |
CN110213296A (en) | It is a kind of that data cochain method and its equipment are thumbed up based on block chain | |
CN110225056A (en) | A kind of evaluation data cochain method and its equipment for applying intelligent contract | |
CN110245512A (en) | Lottery data cochain method and its equipment applied to block chain | |
CN110266695A (en) | Using the lottery data cochain method and its equipment of intelligent contract | |
US20210084027A1 (en) | A Digitally Certified Ecosystem | |
CN110233853A (en) | It is a kind of to thumb up data cochain method and its equipment applied to block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085 Applicant after: Beijing ruice Technology Co.,Ltd. Address before: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085 Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |