CN111460470B - Internet order processing method and device - Google Patents

Internet order processing method and device Download PDF

Info

Publication number
CN111460470B
CN111460470B CN202010172096.5A CN202010172096A CN111460470B CN 111460470 B CN111460470 B CN 111460470B CN 202010172096 A CN202010172096 A CN 202010172096A CN 111460470 B CN111460470 B CN 111460470B
Authority
CN
China
Prior art keywords
order
information
encryption information
encryption
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010172096.5A
Other languages
Chinese (zh)
Other versions
CN111460470A (en
Inventor
陈海全
余术彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Yuanheng Technology Development Co ltd
Original Assignee
Shanghai Shenghuijiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shenghuijiang Technology Co ltd filed Critical Shanghai Shenghuijiang Technology Co ltd
Priority to CN202010172096.5A priority Critical patent/CN111460470B/en
Publication of CN111460470A publication Critical patent/CN111460470A/en
Application granted granted Critical
Publication of CN111460470B publication Critical patent/CN111460470B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a processing method and device of an Internet order. The method comprises the following steps: when a user side needs to input order information of an internet order into a cloud end, receiving an order encryption request which is sent by the user side and carries a unique identifier, a secret key and the information of the user side; encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order; sending the order encryption information to a blockchain for security verification; and if the blockchain determines that the order encryption information is safe through the security verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud. The specific verification content is encrypted, so that the outside cannot be acquired from the blockchain, and therefore information of the order is prevented from being stolen from the outside in the blockchain.

Description

Internet order processing method and device
Technical Field
The application relates to the technical field of Internet, in particular to a processing method and device of an Internet order.
Background
With the development of internet technology, the sales mode based on the internet is very mature. After the seller completes the sales to form the order, the seller can save the order to the cloud for archiving via the internet. However, the security of the method is not high, and if a network attacker adds an attack script into an order, the cloud is very easy to attack after the order is uploaded to the cloud.
In response to this situation, the blockchain technique has become a key to solve the above-described problems with the development of the blockchain technique in recent years. The seller sends the order to the blockchain for verification before the order is stored in the cloud through the Internet, if the order passes the verification, the order is safe, and then the order is stored in the cloud, otherwise, the order is unsafe, and therefore the order is not stored in the cloud. Because of the distributed characteristic of the blockchain, the security verification is very reliable, so that almost all orders stored to the cloud can be ensured to be safe.
However, because the blockchain is a public network, that is, the outside of the information on the blockchain is transparent, when the order is uploaded to the blockchain for verification, the information of the order is easily stolen by the outside, and thus the confidential information of the client information or the company is revealed.
Disclosure of Invention
An objective of the embodiments of the present application is to provide a method and a device for processing an internet order, which are used for improving the above-mentioned drawbacks.
In a first aspect, an embodiment of the present application provides a method for processing an internet order, which is applied to an offline device of a third party, where the method includes:
when a user side needs to input order information of an internet order into a cloud end, receiving an order encryption request which is sent by the user side and carries a unique identifier, a secret key and the information of the user side;
encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order;
sending the order encryption information to a blockchain for security verification;
and if the blockchain determines that the order encryption information is safe through the security verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud.
The beneficial effects are that: the order information is encrypted by utilizing the unique identification of the client before the order is sent to the blockchain for verification, so that the order encrypted information is obtained. When the order encryption information is sent to the blockchain for verification, the outside only knows that a user initiates a verification based on the order encryption information, but the specific verification content is encrypted, so that the outside cannot acquire the information from the blockchain, and therefore the information of the order is prevented from being stolen in the blockchain.
Optionally, the method is further applied to a client disposed on an access node of the blockchain, and the method further includes:
after receiving the order encryption information, the client randomly sends the order encryption information to N nodes in M nodes of the blockchain for security verification, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N;
the client acquires the authentication results returned by each node of the N nodes and aiming at the order encryption information, wherein the total of the authentication results is N;
and if more than half of the N authentication results indicate that the security authentication of the order encryption information is passed, the client informs the offline equipment that the order encryption information is secure.
The beneficial effects are that: since verification of order encryption information by each of the N nodes is independent and is not influenced by other nodes, when half of the nodes pass verification, the security of the order encryption information is already high, and verification is determined to pass. Compared with the mode of passing all node verification or passing all node verification, the security is not different, but the efficiency can be greatly improved by adopting the mode of passing half of node verification.
Optionally, the method is further applied to each node of the N nodes, and the method further includes:
for each node:
after receiving the order encryption information, the node encrypts the unique identifier of the user side, preset parameters and a preset secret key to obtain encrypted information;
the node judges whether the encrypted information and the order encryption information are the same;
and if the authentication results are the same, returning an authentication result indicating that the order encryption information security authentication passes to the client, and if the authentication results are different, returning an authentication result indicating that the order encryption information security authentication fails to the client.
The beneficial effects are that: by encrypting the preset parameters and the preset keys which are completely different from the order encryption information, differential encryption and verification are realized, and the safety of the verification process is effectively improved.
Optionally, the order encryption request includes: the method further includes, after receiving an order encryption request sent by the user terminal and before encrypting the unique identifier, the key, and the order information with a blockchain, a primary encryption parameter and a secondary encryption parameter obtained by encrypting again based on the primary encryption parameter:
selecting N nodes from M nodes of the block chain, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N;
obtaining a secret key from each node in the N nodes, wherein the secret keys are N in total;
combining the N keys into a unitary key;
encrypting the primary encryption parameter by using the integral key to obtain a new encrypted encryption parameter;
judging whether the newly encrypted encryption parameters are the same as the secondary encryption parameters, wherein if so, executing the steps of: and encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order.
The beneficial effects are that: the original secret key is recovered through secret keys respectively stored by each node distributed on the block chain, and the distributed recovery mode can effectively ensure the security and reliability of the obtained original secret key. Secondly, the security of the order information is further improved because the security of the order information is secured by performing secondary encryption by using the original key before encryption.
Optionally, all information of the user side is stored on a cloud host deployed on a server of the cloud, and the method further includes:
monitoring the power supply, voltage and power of a power supply plug of the server;
matching parameters calculated according to the power supply, the voltage and the power with parameters of the server when the power is off;
if the cloud host is not matched with the cloud host, migrating the cloud host to other servers of the cloud by utilizing a pre-established daemon.
The beneficial effects are that: by monitoring the power supply, voltage and power of the power supply plug of the server and calculating the parameters, whether the server is powered off or not can be accurately determined, and service interruption provided for a user can be effectively avoided by migrating the cloud host when the server is powered off.
In a second aspect, an embodiment of the present application provides an apparatus for processing an internet order, which is applied to an offline device of a third party, where the apparatus includes:
the data receiving and transmitting module is used for receiving an order encryption request which is sent by the user terminal and carries the unique identifier and the secret key of the user terminal and the information when the user terminal needs to input order information of an internet order into the cloud;
the data processing module is used for encrypting the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order;
the data receiving and transmitting module is also used for transmitting the order encryption information to a blockchain for security verification; and if the blockchain determines that the order encryption information is safe through the security verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud.
Optionally, the apparatus is further applied to a client disposed on an access node of the blockchain, and the apparatus further includes:
the client side is used for randomly transmitting the order encryption information to N nodes in M nodes of the blockchain for security verification after receiving the order encryption information, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N;
the data receiving module is used for acquiring the authentication results of the order encryption information returned by each node in the N nodes, wherein the total of the authentication results is N;
and if more than half of the N authentication results indicate that the security authentication of the order encryption information passes, the data sending module is also used for informing the offline equipment that the order encryption information is secure.
Optionally, the apparatus is further applied to each node of the N nodes, and the apparatus further includes, for each node:
the verification module is used for encrypting the unique identifier of the user side, the preset parameters and the preset secret key by the node after receiving the order encryption information to obtain encrypted information; the node judges whether the encrypted information and the order encryption information are the same;
and the result feedback module is used for returning an authentication result indicating that the order encryption information security authentication passes to the client if the order encryption information security authentication passes, and returning an authentication result indicating that the order encryption information security authentication fails to the client if the order encryption information security authentication passes to the client if the order encryption information security authentication does not pass.
Optionally, the order encryption request includes: a primary encryption parameter and a secondary encryption parameter obtained by encrypting again based on the primary encryption parameter, after receiving an order encryption request sent by the user side, and before encrypting the unique identification, the key, and the order information by using a blockchain,
the data transceiver module is further configured to select N nodes from M nodes of the blockchain along with selection, where M and N are integers with a natural number greater than or equal to 2, and M is greater than N; obtaining a secret key from each node in the N nodes, wherein the secret keys are N in total;
the data processing module is further configured to combine the N keys into an overall key; encrypting the primary encryption parameter by using the integral key to obtain a new encrypted encryption parameter; judging whether the newly encrypted encryption parameters are the same as the secondary encryption parameters, wherein if so, executing the steps of: and encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order.
Optionally, all information of the user side is stored on a cloud host deployed on a server of the cloud, and the device is further applied to a management system of the cloud;
the monitoring processing module is used for monitoring the power supply, the voltage and the power of the power supply plug of the server; matching parameters calculated according to the power supply, the voltage and the power with parameters of the server when the power is off; if the cloud host is not matched with the cloud host, migrating the cloud host to other servers of the cloud by utilizing a pre-established daemon.
In a third aspect, an embodiment of the present application provides a computer readable storage medium, where a program code is stored, and when the program code is executed by the computer, the method for processing an internet order according to the first aspect or any implementation manner of the first aspect is executed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for processing an internet order according to an embodiment of the present application;
fig. 2 is a block diagram of an internet order processing device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Referring to fig. 1, in the method for processing an internet order provided in the embodiment of the present application, the method for processing an internet order may be performed by offline equipment of a third party, a client and a node in a blockchain, and a flow of the method for processing an internet order may include:
step A: when a user side needs to input order information of an internet order into a cloud end, receiving an order encryption request which is sent by the user side and carries a unique identifier, a secret key and the information of the user side;
and (B) step (B): encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order;
step C: sending the order encryption information to a blockchain for security verification;
step D: and if the blockchain determines that the order encryption information is safe through the security verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud.
The following will fully describe the flow of the present scheme in conjunction with the above-described flow.
Step A: when a user side needs to input order information of an internet order into a cloud, receiving an order encryption request which is sent by the user side and carries unique identification, a secret key and the information of the user side.
After the user, i.e. the seller completes one-time internet sales to form an internet order, the user needs to input the information of the internet order into the cloud storage. In order to ensure the cloud security, when a user sends an order, the user side of the user automatically sends an order encryption request carrying the unique identifier of the user side, a preset secret key and information of the internet order to offline equipment.
It will be appreciated that the off-line device is connected to the client and blockchain clients only via a local area network to ensure security.
Correspondingly, the offline device receives the order encryption request through the local area network.
And (B) step (B): and encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order.
In this embodiment, the offline device analyzes the order encryption request, and can obtain the unique identifier, the key and the order information of the user side, and then the offline device encrypts the order encryption request by using the unique identifier, the key and the order information to obtain the order encryption information of the internet order.
Specifically, if the key is m, the order information is X, and the unique identifier is ID, the offline device may hash the order information with X and the unique identifier as ID, and the obtained hash value is H. The offline device may then encrypt the hash value H and the key m using the steganographically encrypted algorithm parameter G, thereby obtaining order encryption information.
Of course, in other embodiments, when the client sends the order encryption request, the client may encrypt the preset parameter to obtain the primary encryption parameter, and encrypt the primary encryption parameter again to obtain the secondary encryption parameter. Therefore, the user can send the primary encryption parameter and the secondary encryption parameter to the offline equipment together with the order encryption request.
In this case, after the primary encryption parameter and the secondary encryption parameter are obtained by parsing the order encryption request, the offline device selects N nodes from the M nodes of the blockchain as it is, and initiates a request to the N nodes through a client on an access node of the blockchain. Each of the N nodes may send its own stored key to the offline device based on the request from the offline device. Thus, the offline device may obtain a key from each of the N nodes, for a total of N keys. The offline device may combine N to form an overall key. The off-line device may then encrypt the primary encryption parameter using the integral key to obtain a new encrypted encryption parameter. Finally, the offline device may determine whether the newly encrypted encryption parameter is the same as the secondary encryption parameter.
If not, the information describing the order may be tampered with by a person, so that the offline device may terminate execution of the subsequent procedure.
If the same is true, the information indicating the order is normal and safe, so the offline device can perform step B.
Step C: and sending the order encryption information to a blockchain for security verification.
After obtaining the order encryption information, the offline device may send the order encryption information to clients on the blockchain access node to send the order encryption information to nodes on the blockchain for verification by the clients.
For a client on a block chain access node, after receiving order encryption information, the client randomly sends the order encryption information to N nodes in M nodes of the block chain for security verification, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N.
For each node in the N nodes, after receiving the order encryption information, the node encrypts the unique identifier of the user terminal, the preset parameter and the preset key to obtain encrypted information. The node then determines whether the encrypted information is the same as the order encryption information. In other words, the node generates encrypted information through preset parameters to verify the encrypted information of the order, so that the information of the order is not exposed to the blockchain in the verification process. Further, if the node determines that the two pieces of information are the same, the node can return an authentication result indicating that the order encryption information security authentication passes to the client; if the two types of information are different, the verification is different, and the node can return an authentication result indicating that the order encryption information security authentication is not passed to the client.
And for the client on the block chain access node, the client acquires the authentication results for the order encryption information returned by each node in the N nodes, and the total of the N authentication results. The client analyzes the N authentication results, and if it is determined that more than half of the N authentication results indicate that the security authentication of the order encryption information is passed, the client informs that the order encryption information of the offline equipment is secure, and otherwise informs that the order encryption information of the offline equipment is unsafe.
Step D: and if the blockchain determines that the order encryption information is safe through the security verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud.
If the offline device determines that the order encryption information is unsafe based on the client notification on the blockchain access node, the offline device may delete the order encryption information and end execution of subsequent flows.
If the offline device determines that the order encryption information is safe based on the client notification on the blockchain access node, the offline device returns the order encryption information to the client, so that the client stores the order encryption information in the cloud.
In this embodiment, all information of the user side is stored in a cloud host deployed on a server in the cloud, and then a management system deployed on the cloud can monitor the server where the cloud host is located. I.e. monitoring the power supply, voltage and power of each power plug of the server. The management system may then SUM the power, voltage, and power of all power plugs of the server using the SUM summation function and match the calculated parameters to the parameters of the server at power down. And if the calculated parameters are determined to be matched with the parameters of the server in the power failure, the server is indicated to work normally. And if the calculated parameters are not matched with the parameters of the server in the outage, the condition that the server is in downtime or outage is indicated. Therefore, the management system can utilize the backup of all information of the user terminal in advance and utilize the pre-established daemon to migrate the cloud host deployed on the server to other servers in the cloud, and enable the other servers to continuously provide services for the user terminal based on the cloud host formed by migration and the backup of all information of the user terminal.
Referring to fig. 2, based on the same inventive concept, the embodiment of the present application further provides an apparatus 100 for processing an internet order, which is applied to an offline device of a third party, and the apparatus 100 for adjusting water environment based on water environment sampling includes:
the data transceiver module 110 is configured to receive an order encryption request carrying a unique identifier and a secret key of the user side and the information sent by the user side when the user side needs to input order information of an internet order into the cloud end;
the data processing module 120 is configured to encrypt the unique identifier, the key, and the order information to obtain order encryption information of the internet order;
the data transceiver module 110 is further configured to send the order encryption information to a blockchain for security verification; and if the blockchain determines that the order encryption information is safe through the security verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud.
Optionally, the apparatus is further applied to a client disposed on an access node of the blockchain, and the apparatus further includes:
the data sending module 130 is configured to send the order encryption information to N nodes in M nodes of the blockchain at random for security verification after the client receives the order encryption information, where M and N are integers with a natural number greater than or equal to 2, and M is greater than N;
the data receiving module 140 is configured to obtain an authentication result returned by each node of the N nodes and directed against the order encryption information, where the total number of authentication results is N;
if more than half of the N authentication results indicate that the order encryption information passes the security authentication, the data sending module 130 is further configured to inform the offline device that the order encryption information is secure.
Optionally, the apparatus is further applied to each node of the N nodes, and the apparatus further includes, for each node:
the verification module 150 is configured to encrypt, after receiving the order encryption information, the unique identifier of the user side, a preset parameter, and a preset key by the node, so as to obtain encrypted information; the node judges whether the encrypted information and the order encryption information are the same;
and the result feedback module 160 is configured to return, if the result is the same, an authentication result indicating that the order encryption information security authentication passes to the client, and if the result is not the same, return, to the client, an authentication result indicating that the order encryption information security authentication fails.
Optionally, the order encryption request includes: a primary encryption parameter and a secondary encryption parameter obtained by encrypting again based on the primary encryption parameter, after receiving an order encryption request sent by the user side, and before encrypting the unique identification, the key, and the order information by using a blockchain,
the data transceiver module is further configured to select N nodes from M nodes of the blockchain along with selection, where M and N are integers with a natural number greater than or equal to 2, and M is greater than N; obtaining a secret key from each node in the N nodes, wherein the secret keys are N in total;
the data processing module 120 is further configured to combine the N keys into an overall key; encrypting the primary encryption parameter by using the integral key to obtain a new encrypted encryption parameter; judging whether the newly encrypted encryption parameters are the same as the secondary encryption parameters, wherein if so, executing the steps of: and encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order.
Optionally, all information of the user side is stored on a cloud host deployed on a server of the cloud, and the device is further applied to a management system of the cloud;
a monitoring processing module 170, configured to monitor a power supply, a voltage, and a power of the power supply plug of the server; matching parameters calculated according to the power supply, the voltage and the power with parameters of the server when the power is off; if the cloud host is not matched with the cloud host, migrating the cloud host to other servers of the cloud by utilizing a pre-established daemon.
It should be noted that, since it will be clearly understood by those skilled in the art, for convenience and brevity of description, the specific working processes of the systems, apparatuses and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein.
Some embodiments of the present application further provide a computer readable storage medium of computer executable non-volatile program code, where the storage medium can be a general purpose storage medium, such as a removable disk, a hard disk, and the computer readable storage medium stores program code thereon, where the program code is executed by a computer to perform the steps of the method for processing an internet order according to any of the foregoing embodiments.
The program code product of the method for processing an internet order provided in the embodiment of the present application includes a computer readable storage medium storing program code, and instructions included in the program code may be used to execute the method in the foregoing method embodiment, and specific implementation may refer to the method embodiment and will not be described herein.
In summary, the embodiment of the application provides a method and a device for processing an internet order. The order information is encrypted by utilizing the unique identification of the client before the order is sent to the blockchain for verification, so that the order encrypted information is obtained. When the order encryption information is sent to the blockchain for verification, the outside only knows that a user initiates a verification based on the order encryption information, but the specific verification content is encrypted, so that the outside cannot acquire the information from the blockchain, and therefore the information of the order is prevented from being stolen in the blockchain.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions in actual implementation, and e.g., multiple elements or components may be combined or integrated into another system 10, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
Further, the units described as separate units may or may not be physically separate, and units displayed as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Furthermore, functional modules in various embodiments of the present application may be integrated together to form a single portion, or each module may exist alone, or two or more modules may be integrated to form a single portion.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application, and various modifications and variations may be suggested to one skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application.

Claims (8)

1. The processing method of the Internet order is applied to the offline equipment of the third party, and the method comprises the following steps:
when a user side needs to input order information of an internet order into a cloud end, receiving an order encryption request which is sent by the user side and carries a unique identifier, a secret key and the information of the user side;
encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order;
sending the order encryption information to a blockchain for security verification;
if the blockchain determines that the order encryption information is safe through safety verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud;
wherein, the order encryption request comprises: the method further includes, after receiving an order encryption request sent by the user terminal and before encrypting the unique identifier, the key, and the order information with a blockchain, a primary encryption parameter and a secondary encryption parameter obtained by encrypting again based on the primary encryption parameter:
selecting N nodes from M nodes of the block chain, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N;
obtaining a secret key from each node in the N nodes, wherein the secret keys are N in total;
combining the N keys into a unitary key;
encrypting the primary encryption parameter by using the integral key to obtain a new encrypted encryption parameter;
judging whether the newly encrypted encryption parameters are the same as the secondary encryption parameters, wherein if so, executing the steps of: and encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order.
2. The method of claim 1, further applied to clients disposed on access nodes of the blockchain, the method further comprising:
after receiving the order encryption information, the client randomly sends the order encryption information to N nodes in M nodes of the blockchain for security verification, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N;
the client acquires the authentication results returned by each node of the N nodes and aiming at the order encryption information, wherein the total of the authentication results is N;
and if more than half of the N authentication results indicate that the security authentication of the order encryption information is passed, the client informs the offline equipment that the order encryption information is secure.
3. The method of processing an internet order according to claim 2, wherein the method is further applied to each of the N nodes, the method further comprising:
for each node:
after receiving the order encryption information, the node encrypts the unique identifier of the user side, preset parameters and a preset secret key to obtain encrypted information;
the node judges whether the encrypted information and the order encryption information are the same;
and if the authentication results are the same, returning an authentication result indicating that the order encryption information security authentication passes to the client, and if the authentication results are different, returning an authentication result indicating that the order encryption information security authentication fails to the client.
4. The method according to claim 1, wherein all information of the user side is stored on a cloud host disposed on a server of the cloud, the method further comprising:
monitoring the power supply, voltage and power of a power supply plug of the server;
matching parameters calculated according to the power supply, the voltage and the power with parameters of the server when the power is off;
if the cloud host is not matched with the cloud host, migrating the cloud host to other servers of the cloud by utilizing a pre-established daemon.
5. An apparatus for processing an internet order, the apparatus being applied to an offline device of a third party, the apparatus comprising:
the data receiving and transmitting module is used for receiving an order encryption request which is sent by the user terminal and carries the unique identifier and the secret key of the user terminal and the information when the user terminal needs to input order information of an internet order into the cloud;
the data processing module is used for encrypting the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order;
the data receiving and transmitting module is also used for transmitting the order encryption information to a blockchain for security verification; if the blockchain determines that the order encryption information is safe through safety verification, returning the order encryption information to the user side so that the user side stores the order encryption information in the cloud;
wherein, the order encryption request comprises: a primary encryption parameter and a secondary encryption parameter obtained by encrypting again based on the primary encryption parameter, after receiving an order encryption request sent by the user side, and before encrypting the unique identification, the key, and the order information by using a blockchain,
the data transceiver module is further configured to select N nodes from M nodes of the blockchain along with selection, where M and N are integers with a natural number greater than or equal to 2, and M is greater than N; obtaining a secret key from each node in the N nodes, wherein the secret keys are N in total;
the data processing module is further configured to combine the N keys into an overall key; encrypting the primary encryption parameter by using the integral key to obtain a new encrypted encryption parameter; judging whether the newly encrypted encryption parameters are the same as the secondary encryption parameters, wherein if so, executing the steps of: and encrypting by using the unique identifier, the secret key and the order information to obtain order encryption information of the Internet order.
6. The internet order processing apparatus of claim 5, wherein the apparatus is further applied to a client provided on an access node of the blockchain, the apparatus further comprising:
the client side is used for randomly transmitting the order encryption information to N nodes in M nodes of the blockchain for security verification after receiving the order encryption information, wherein M and N are integers with natural numbers greater than or equal to 2, and M is greater than N;
the data receiving module is used for acquiring the authentication results of the order encryption information returned by each node in the N nodes, wherein the total of the authentication results is N;
and if more than half of the N authentication results indicate that the security authentication of the order encryption information passes, the data sending module is also used for informing the offline equipment that the order encryption information is secure.
7. The internet order processing apparatus of claim 6, wherein the apparatus is further applied to each of the N nodes, the apparatus further comprising for each node:
the verification module is used for encrypting the unique identifier of the user side, the preset parameters and the preset secret key by the node after receiving the order encryption information to obtain encrypted information; the node judges whether the encrypted information and the order encryption information are the same;
and the result feedback module is used for returning an authentication result indicating that the order encryption information security authentication passes to the client if the order encryption information security authentication passes, and returning an authentication result indicating that the order encryption information security authentication fails to the client if the order encryption information security authentication passes to the client if the order encryption information security authentication does not pass.
8. The internet order processing device according to claim 5, wherein all information of the user side is stored on a cloud host deployed on a server of the cloud, and the device is further applied to a management system of the cloud;
the monitoring processing module is used for monitoring the power supply, the voltage and the power of the power supply plug of the server; matching parameters calculated according to the power supply, the voltage and the power with parameters of the server when the power is off; if the cloud host is not matched with the cloud host, migrating the cloud host to other servers of the cloud by utilizing a pre-established daemon.
CN202010172096.5A 2020-03-12 2020-03-12 Internet order processing method and device Active CN111460470B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010172096.5A CN111460470B (en) 2020-03-12 2020-03-12 Internet order processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010172096.5A CN111460470B (en) 2020-03-12 2020-03-12 Internet order processing method and device

Publications (2)

Publication Number Publication Date
CN111460470A CN111460470A (en) 2020-07-28
CN111460470B true CN111460470B (en) 2024-03-22

Family

ID=71685863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010172096.5A Active CN111460470B (en) 2020-03-12 2020-03-12 Internet order processing method and device

Country Status (1)

Country Link
CN (1) CN111460470B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256867A (en) * 2017-12-01 2018-07-06 西安电子科技大学 Offline transaction system and its method based on the transaction block verification of bit coin
CN109327481A (en) * 2018-12-17 2019-02-12 北京信息科技大学 A kind of unified online authentication method and system of the whole network based on block chain
CN109447742A (en) * 2018-10-16 2019-03-08 广东工业大学 A kind of order processing method and relevant apparatus
CN110381075A (en) * 2019-07-26 2019-10-25 烨链(上海)科技有限公司 Equipment identities authentication method and device based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180137507A1 (en) * 2016-11-14 2018-05-17 International Business Machines Corporation Performing verification on the blockchain for non-blockchain transactions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256867A (en) * 2017-12-01 2018-07-06 西安电子科技大学 Offline transaction system and its method based on the transaction block verification of bit coin
CN109447742A (en) * 2018-10-16 2019-03-08 广东工业大学 A kind of order processing method and relevant apparatus
CN109327481A (en) * 2018-12-17 2019-02-12 北京信息科技大学 A kind of unified online authentication method and system of the whole network based on block chain
CN110381075A (en) * 2019-07-26 2019-10-25 烨链(上海)科技有限公司 Equipment identities authentication method and device based on block chain

Also Published As

Publication number Publication date
CN111460470A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
US10142113B2 (en) Identifying and maintaining secure communications
CN109687959B (en) Key security management system, key security management method, key security management medium, and computer program
CN111245597A (en) Key management method, system and equipment
US11831753B2 (en) Secure distributed key management system
CN107920052B (en) Encryption method and intelligent device
CN103297429A (en) Embedded upgrading file transmission method
CN112118245B (en) Key management method, system and equipment
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN110362984B (en) Method and device for operating service system by multiple devices
CN114244522B (en) Information protection method, device, electronic equipment and computer readable storage medium
US9350545B1 (en) Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens
CN111585995B (en) Secure wind control information transmission and processing method and device, computer equipment and storage medium
CN110493005B (en) Anti-quantum computing public key pool updating method and system based on alliance chain
CN115276978A (en) Data processing method and related device
CN113890724A (en) Access authentication method and system for power Internet of things communication equipment
CN111460470B (en) Internet order processing method and device
KR101287669B1 (en) Apparatus and method for multiplexing hardware security module
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN114745115A (en) Information transmission method and device, computer equipment and storage medium
CN112039921B (en) Verification method for parking access, parking user terminal and node server
CN110868397B (en) Method and system for exchanging multipoint data of enterprise in different places
CN108540498B (en) Method and system for issuing security policy version in financial payment
CN107516044A (en) A kind of recognition methods, device and system
CN114598478B (en) Data encryption method, device, electronic equipment and storage medium
CN112804053B (en) Data recovery method, encryption device, terminal device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240219

Address after: No. 701 Taogan Road, Sheshan Town, Songjiang District, Shanghai, 2010

Applicant after: Shanghai Shenghuijiang Technology Co.,Ltd.

Country or region after: China

Address before: 617000 No. 1, unit 1, building 73, Pangang family area, West District, Panzhihua City, Sichuan Province

Applicant before: Chen Haiquan

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240514

Address after: Room 311, No. 16 Fuhe Road, Baigutun Town, Wuqing District, Tianjin, 300000

Patentee after: Tianjin Yuanheng Technology Development Co.,Ltd.

Country or region after: China

Address before: No. 701 Taogan Road, Sheshan Town, Songjiang District, Shanghai, 2010

Patentee before: Shanghai Shenghuijiang Technology Co.,Ltd.

Country or region before: China