CN112507363A - Data supervision method, device and equipment based on block chain and storage medium - Google Patents
Data supervision method, device and equipment based on block chain and storage medium Download PDFInfo
- Publication number
- CN112507363A CN112507363A CN202011472818.5A CN202011472818A CN112507363A CN 112507363 A CN112507363 A CN 112507363A CN 202011472818 A CN202011472818 A CN 202011472818A CN 112507363 A CN112507363 A CN 112507363A
- Authority
- CN
- China
- Prior art keywords
- transaction
- data
- encrypted
- blockchain
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the field of big data and discloses a block chain-based data supervision method, a block chain-based data supervision device, block chain-based data supervision equipment and a storage medium. The method comprises the following steps: acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; the monitoring party decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information and monitors the transaction information. By utilizing the decentralized characteristic of the block chain, the technical problem of low data supervision efficiency is solved, the data supervision efficiency is improved, and the accuracy of transaction data is ensured.
Description
Technical Field
The invention relates to the field of big data, in particular to a block chain-based data supervision method, a block chain-based data supervision device, block chain-based data supervision equipment and a storage medium.
Background
In recent years, with the rapid development of the information industry and the popularization of the mobile internet, the current trading platforms are centralized, such as Taobao, Linjia, Meilian, and the like. When a customer makes a transaction, the transaction platform records transaction information of the customer, including bank account information, identity information, address information and the like, which are all customer privacy data and are very important. The personal information transaction information of a huge user group is under the actual control of a transaction platform and is easy to become the target of hacking. In addition, there is a risk that information carried in these centralized trading platforms is lost, falsified, leaked, etc. If the transaction is disputed, the platform which is not completely fair and fair can provide the transaction information as the basis of referees.
With the successful application of bitcoin, blockchain technology is more and more favored by many industries and enterprises. The rise of finance and the internet brings new opportunities and challenges to the insurance industry, and many financial companies start to try to apply the block chain technology to solve the financial credit problem. However, in the current transaction data processing method, there is no scheme for effectively utilizing the block chain technology. Therefore, a decentralized online trading platform based on encryption system is needed to solve the problem.
Disclosure of Invention
The invention mainly aims to solve the technical problems that different processing can not be carried out according to different accounting modes of docking channels, and the data supervision efficiency based on a block chain is low.
The invention provides a data supervision method based on a block chain in a first aspect, which comprises the following steps:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor, wherein the encryption key pair carries an encryption private key and an encryption public key;
encrypting the transaction information of a target client on a blockchain transaction network through the encrypted private key to generate encrypted transaction data, wherein the encrypted transaction data carries the privacy information of the target client;
encrypting the encrypted public key through a preset receiver public key to generate a receiver encrypted public key;
the encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
the transaction is completed according to the transaction request, and transaction related data corresponding to the transaction are stored in the block chain, wherein the transaction related data comprise user information, behavior information, transaction information and contract information;
and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information and displays the transaction information.
Optionally, in a first implementation manner of the first aspect of the present invention, before the obtaining a preset encryption key pair and synchronizing the encryption key pair to a preset supervisor, the method further includes:
establishing an appearance creating block and determining a consensus mechanism of the block chain, and establishing a block chain transaction network by taking a terminal agreeing to the consensus mechanism as a block chain node.
Optionally, in a second implementation manner of the first aspect of the present invention, the encrypting, by the encryption private key, transaction information of a target customer on a blockchain transaction network, and generating encrypted transaction data includes:
receiving transaction information of a target client on a blockchain transaction network to be transmitted;
generating random data with a specified length, and adding the generated random data to the transaction information to form new data;
generating an encryption key of the new data based on the length of the new data and the preset redundant data;
and encrypting the new data by using the encryption key.
Optionally, in a third implementation manner of the first aspect of the present invention, after the combining the encrypted transaction data and the recipient encrypted public key into a transaction body, and initiating a transaction request on the blockchain based on the transaction body, the method further includes:
when a transaction request sent by a target client in a preset format is received, calling a preset intelligent contract, and judging whether the transaction corresponding to the transaction request needs to be introduced into a supervisor or not based on the preset intelligent contract;
if the transaction needs to be introduced into a supervisor, analyzing the transaction request, and judging whether the transaction related party in the transaction request comprises the supervisor;
if the transaction related party in the transaction request comprises the monitoring party, the transaction request is sent in a blockchain network so that the transaction related party can confirm the transaction request;
and if the transaction related party in the transaction request does not comprise the supervisor party, rejecting the transaction request.
Optionally, in a fourth implementation manner of the first aspect of the present invention, before the monitoring party decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information, and displays the transaction information, the method further includes:
acquiring transaction data sent by each supervisor to a block chain;
and constructing an intelligent contract running in the block chain according to a supervision protocol in the transaction data, wherein the intelligent contract comprises a judgment condition of a transaction state.
Optionally, in a fifth implementation manner of the first aspect of the present invention, after the monitoring party decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information, and displays the transaction information, the method further includes:
receiving transaction data and an authenticity judgment request for the transaction data;
comparing the transaction data with decrypted transaction data obtained by decrypting the encrypted transaction data stored in the blockchain node;
and if the similarity between the decrypted transaction data and the transaction data is greater than a first threshold value, determining that the transaction data is true.
The second aspect of the present invention provides a block chain-based data monitoring apparatus, including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a preset encryption key pair and synchronizing the encryption key pair to a preset supervisor, and the encryption key pair carries an encryption private key and an encryption public key;
the encryption module is used for encrypting the transaction information of the target customer on the blockchain transaction network through the encryption private key to generate encrypted transaction data, wherein the encrypted transaction data carries the privacy information of the target customer;
the generating module is used for encrypting the encrypted public key through a preset receiver public key to generate a receiver encrypted public key;
the initiating module is used for forming a transaction body by the encrypted transaction data and the encrypted public key of the receiving party and initiating a transaction request on the block chain based on the transaction body;
the storage module is used for completing the transaction according to the transaction request and storing transaction related data corresponding to the transaction to the block chain, wherein the transaction related data comprises user information, behavior information, transaction information and contract information;
and the decryption module is used for decrypting the encrypted transaction data according to the encrypted public key by the supervisor to obtain transaction information and displaying the transaction information.
Optionally, in a first implementation manner of the second aspect of the present invention, the apparatus for supervising block chain-based data further includes:
and the building module is used for building the creation block and determining a consensus mechanism of the block chain, and building the block chain transaction network by taking a terminal agreeing to the consensus mechanism as a block chain node.
Optionally, in a second implementation manner of the second aspect of the present invention, the encryption module includes:
the receiving unit is used for receiving the transaction information of the target client on the block chain transaction network to be transmitted;
a generation unit configured to generate random data of a specified length and add the generated random data to the transaction information to form new data;
a generating unit configured to generate an encryption key of the new data based on the length of the new data and the preset redundant data;
an encryption unit configured to encrypt the new data using the encryption key.
Optionally, in a third implementation manner of the second aspect of the present invention, the apparatus for supervising block chain-based data further includes:
the system comprises a judging module, a monitoring module and a processing module, wherein the judging module is used for calling a preset intelligent contract when receiving a transaction request sent by a target client in a preset format, and judging whether the transaction corresponding to the transaction request needs to be introduced into a monitoring party or not based on the preset intelligent contract;
the analysis module is used for analyzing the transaction request when the transaction needs to be introduced into a supervisor, and judging whether the supervisor is included in transaction related parties in the transaction request or not;
the confirmation module is used for sending the transaction request in a block chain network when the transaction related party in the transaction request comprises the supervisor, so that the transaction related party can confirm the transaction request;
a rejecting module for rejecting the transaction request when the transaction-related party in the transaction request does not include the supervising party.
Optionally, in a fourth implementation manner of the second aspect of the present invention, the data policing apparatus based on a block chain further includes:
the second acquisition module is used for acquiring the transaction data sent by each supervisor to the block chain;
and the construction module is used for constructing an intelligent contract running in the block chain according to a supervision protocol in the transaction data, wherein the intelligent contract comprises a judgment condition of a transaction state.
Optionally, in a fifth implementation manner of the second aspect of the present invention, the apparatus for supervising block chain-based data further includes:
the receiving module is used for receiving transaction data and an authenticity judgment request for the transaction data;
a comparison module, configured to compare the transaction data with decrypted transaction data obtained by decrypting the encrypted transaction data stored in the blockchain node; and if the similarity between the decrypted transaction data and the transaction data is greater than a first threshold value, determining that the transaction data is true.
The third aspect of the present invention provides a data monitoring device based on a block chain, including: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line;
the at least one processor invokes the instructions in the memory to cause the blockchain based data policing device to perform the blockchain based data policing method described above.
A fourth aspect of the present invention provides a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to execute the above-mentioned block chain-based data policing method.
In the technical scheme provided by the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Drawings
FIG. 1 is a diagram of a block chain-based data policing method according to a first embodiment of the present invention;
FIG. 2 is a diagram of a block chain-based data policing method according to a second embodiment of the present invention;
FIG. 3 is a diagram of a block chain-based data policing method according to a third embodiment of the present invention;
FIG. 4 is a diagram of a fourth embodiment of a block chain-based data policing method according to the present invention;
FIG. 5 is a diagram of a fifth embodiment of a block chain-based data policing method according to the present invention;
FIG. 6 is a diagram of a block chain-based data policing apparatus according to a first embodiment of the present invention;
FIG. 7 is a diagram of a block chain-based data policing apparatus according to a second embodiment of the present invention;
fig. 8 is a schematic diagram of an embodiment of a data supervision device based on a block chain according to the present invention.
Detailed Description
The embodiment of the invention provides a data supervision method, a device, equipment and a storage medium based on a block chain, wherein in the technical scheme of the invention, a preset encryption key pair is firstly obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, a specific flow of the embodiment of the present invention is described below, and referring to fig. 1, a first embodiment of a block chain-based data supervision method according to the embodiment of the present invention includes:
101. acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor, wherein the encryption key pair carries an encryption private key and an encryption public key;
in this embodiment, the key used for encryption is the SHA256 key. SHA-256 is a one-way Hash algorithm, the plaintext to be transmitted is converted into message digests through a Hash function operation, different plaintext corresponds to different message digests, the message digests are transmitted to a receiver together with the plaintext after being encrypted, the receiver decrypts and compares the received plaintext with the message digests sent by the sender, the comparison result is consistent to indicate that the plaintext is not changed, and if not, the plaintext is tampered. The plaintext and the ciphertext are in one-to-one correspondence, and the ciphertext can be decrypted by using the key which is the same as the encryption key and the corresponding decryption method during decryption to obtain the decryption key.
The encryption key of this embodiment is stored in the encryption device, the corresponding decryption key is also stored in the encryption device, and after scanning the two-dimensional code of the encryption key, the ciphertext can be decrypted by using the same key as the encryption key and the SHA-256 decryption method, so that the decryption key corresponding to the encryption key can be obtained.
102. Encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data;
in this embodiment, in order to ensure privacy of blockchain transactions and privacy of transactants; the content in the transaction request may be preprocessed by public-private key encryption, that is, the transaction request has a certain format. Specifically, the transaction request includes a transaction header, transaction content and a key group; for the transaction head, the transaction type information of the transaction is included; for transaction content, including transaction details and transaction data specific to the transaction, the portion of the content may be related to business privacy, and thus the portion of the content is encrypted, and the key set includes encryption keys related to encryption. In this embodiment, for the encryption of the transaction content, an encryption idea combining symmetric encryption and asymmetric encryption is adopted, and the transaction content is encrypted in multiple layers.
In this embodiment, symmetric encryption means that both sides that send and receive data use the same key (symmetric key) to encrypt and decrypt plaintext, and the encryption and decryption speed is fast and suitable for processing a large amount of data. While asymmetric encryption requires two keys: public key (public key) and private key (private key), the public key is disclosed to other parties, the private key is stored by itself; the public key and the private key are a pair, and if the public key is used for encrypting data, the data can be decrypted only by using the corresponding private key; if the data is encrypted with the private key, then the decryption can be performed only with the corresponding public key; the algorithm of asymmetric encryption is complex, so that the encryption and decryption speed is not as high as that of symmetric encryption and decryption, but the security of the asymmetric encryption and decryption method is superior to that of symmetric encryption because the encryption and decryption keys are different. In the embodiment, considering that the data volume in the transaction content is large, in order to ensure the encryption and decryption speed, the transaction content part is encrypted by adopting a symmetric encryption method, and a key used for encryption is called a transaction symmetric key; meanwhile, in order to enable the transaction related party to use the transaction symmetric key for decryption, the transaction symmetric key needs to be sent at the same time when the transaction request is sent. Considering that the transaction symmetric key may also be leaked in the transmission process, the transaction symmetric key needs to be encrypted; because the data volume corresponding to the transaction symmetric key is small, based on the double-layer consideration of security and encryption efficiency, the encryption of the transaction symmetric key is carried out in an asymmetric encryption mode, namely, a public key in an asymmetric key group is used for encryption, and a private key corresponding to the public key only exists in a transaction related party, so that the condition that other third parties cannot decrypt the encrypted content of the public key can be ensured, and the security is improved. Although the transaction request can be received by all nodes in the blockchain due to the characteristics of the blockchain, because the transaction request adopts a multi-layer encryption method, the key for decrypting the transaction content is realized, and the true private key of the transaction related party is only owned by the transaction related party, so that even if other nodes receive anonymous handshake requests, the transaction content cannot be decrypted and read, and the business privacy is effectively protected. Of course, in addition to the above-mentioned two-layer encryption method, other encryption algorithms may be used to encrypt the transaction request according to the specific use case.
103. Encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key;
in this embodiment, the encryption key may be preset and synchronously notified to the administrator. The key pairs can also be obtained by applying from a CA center, and a supervisor can apply for the CA center to obtain the key pairs by the supervision identity of the supervisor. The transaction information is divided into transaction service data and transaction content data, for example, the transaction service data is "a transfers to B", and the transaction content data is "transfer amount 100". The transaction initiator A obtains a preset encryption key pair for the transaction, or applies for obtaining the encryption key pair for the transaction from the CA center. The transaction initiator a encrypts the transaction content data of the current transaction by using the encryption private key in the applied encryption key pair to generate encrypted transaction content data, for example, encrypts the plaintext data 100 to generate encrypted transaction content data, and forms a transaction body, where the transaction body includes transaction service data and encrypted transaction content data.
Further, the encrypted public key in the encrypted key pair applied by the transaction initiator A from the CA center is encrypted by using the receiver public key of the transaction receiver B, so as to generate the receiver encrypted public key. And encrypting the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center by using the first public key of the first informed party node to generate a first encryption public key. And adding the encrypted public key of the receiver and the first encrypted public key into the transaction body, wherein the new transaction body comprises transaction service data, encrypted transaction content data, the encrypted public key of the receiver and the first encrypted public key.
The method comprises the steps that a transaction initiator A calculates a corresponding hash value by using a hash algorithm on the whole transaction body, the hash value calculated by the whole transaction body is encrypted by using a signature private key applied from a CA center to obtain an encrypted hash value, and the encrypted hash value is added into the transaction body, so that the finally formed transaction body comprises five parts, namely transaction service data, encrypted transaction content data, a receiver encrypted public key, a first encrypted public key and an encrypted hash value.
104. The encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the block chain based on the transaction body;
in this embodiment, the forming the encrypted transaction data and the encrypted public key of the receiving party into a transaction body includes:
and the transaction business data, the encrypted transaction content data and the receiver encrypted public key form a transaction body.
In this embodiment, the blockchain further includes a preset third-party informed party node (including a node that can completely or partially know the transaction) other than the two parties of the transaction, for example, an informed party public key of the third-party informed party node preset on the blockchain may be used to encrypt the encryption public key in the encryption key pair, so as to generate an informed party encryption public key; and the transaction business data, the encrypted transaction content data, the receiver encrypted public key and the informed party encrypted public key form a transaction body.
Further, the present embodiment further includes a signature authentication step, first, acquiring a preset signature key pair; and calculating a corresponding hash value for the whole transaction body by using a hash algorithm, encrypting the hash value calculated for the whole transaction body by using a signature private key in the signature key pair to obtain an encrypted hash value, and adding the encrypted hash value into the transaction body. After a transaction receiver receives a transaction body on a blockchain, firstly performing signature authentication, for example, decrypting an encrypted hash value received by the transaction receiver by using a signature public key in the signature key pair to obtain a decrypted hash value; calculating a corresponding hash value for the transaction body received by the transaction receiving party by using a hash algorithm, and comparing the calculated hash value with the decrypted hash value; if the calculated hash value is the same as the decrypted hash value, the transaction of the transaction receiving party and the transaction initiating party is completed based on the transaction body; and if the calculated hash value is different from the decrypted hash value, ending the transaction flow.
105. Completing the transaction according to the transaction request, and storing transaction related data corresponding to the transaction to a block chain;
in this embodiment, the initiated transaction is completed according to the transaction request, and all data information related to the transaction is stored in the block chain.
In this embodiment, the block chain is also called a data structure, which is a term in the field of information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect. Meanwhile, the blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The Blockchain (Blockchain) is an important concept of the bitcoin, which is essentially a decentralized database, and is used as the underlying technology of the bitcoin, and is a series of data blocks which are generated by using a cryptographic method to be related, wherein each data block contains information of a batch of bitcoin network transactions, and the information is used for verifying the validity (anti-counterfeiting) of the information and generating the next block.
In this embodiment, a characteristic of the blockchain is that information is difficult to modify, so that encrypted transaction data is stored in all blockchain nodes, and it is ensured that the transaction data is not modified (for example, malicious modification caused by hacking).
106. And the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information.
In the embodiment, the transaction information determined by the transaction initiator on the block chain is encrypted by an encryption private key in a preset encryption key pair to generate encrypted transaction data; encrypting the encryption public key in the encryption key pair by using a receiver public key preset by a transaction receiver to generate a receiver encryption public key; the encrypted transaction data and the encrypted public key of the receiver form a transaction body; initiating a transaction on the blockchain based on the transaction body. Because the transaction can be carried out on the blockchain in a way that the encrypted transaction data and the encrypted public key of the receiver form a transaction body, the transaction receiver on the blockchain can decrypt the encrypted public key of the receiver through a preset private key of the receiver to obtain the encrypted public key in the encrypted secret key pair, and decrypt the encrypted transaction data by using the decrypted encrypted public key to obtain determined transaction information so as to complete the transaction with the transaction initiator; because only the receiving party encrypts the public key in the transaction body, other nodes on the blockchain cannot decrypt the encrypted public key to obtain the encrypted public key in the encrypted key pair, and cannot decrypt the encrypted transaction data, so that the privacy of the transaction data in the blockchain is ensured.
Meanwhile, the supervisor can decrypt the encrypted transaction data according to the encryption public key in the encryption key pair obtained synchronously to obtain determined transaction information, and the transaction information is displayed. The privacy of the transaction data can be guaranteed, and the supervision mechanism can be enabled to effectively supervise the transaction.
The method and the device ensure the authenticity of transaction data by utilizing the characteristic that the information of the block chain is difficult to change and tamper. Wherein the encrypted transaction data stored in any one of the blockchain nodes can be decrypted to obtain decrypted transaction data; decrypted transaction data which can be obtained by decrypting the encrypted transaction data stored in any plurality of blockchain nodes; or decrypted transaction data obtained by decrypting the encrypted transaction data stored in all blockchain nodes. If the electronic transaction data is the same as the decrypted stored transaction data in the region link point, the electronic transaction data can be considered to be true, otherwise, the electronic transaction data is false, and therefore malicious claim settlement is prevented. The specific comparison method comprises the following steps: performing exclusive or operation on the electronic transaction data and the decrypted transaction data according to bytes to obtain repeated bytes of the electronic transaction data and the decrypted transaction data; if the number of the repeated bytes exceeds a first threshold value, namely the similarity between the decrypted transaction data and the electronic transaction data is greater than the first threshold value, the electronic transaction data is judged to be the same as the decrypted transaction data, and therefore the electronic transaction data is judged to be true.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Referring to fig. 2, a second embodiment of a block chain-based data supervision method according to the embodiment of the present invention includes:
201. establishing an appearance creating block and determining a consensus mechanism of the block chain, and establishing a block chain transaction network by taking a terminal agreeing with the consensus mechanism as a block chain node;
in this embodiment, the data related to the transaction is sent to the blockchain node. The terminal agreeing to the consensus mechanism may be any terminal, preferably a computer of a financial product business office of the company, or a computer of a financial product business office of another company (i.e., a block chain constructed by a plurality of financial companies at the same time). The block chain establishing method may adopt any existing establishing method, and is not described herein again.
The pre-built blockchain may be any type of blockchain, for example, a blockchain network is built using a consensus protocol similar to that in bitcoin blockchains. The web server, preferably the insurance web server, receives the web access request, and the embodiment takes the insurance web server as an example for description. Wherein, the insurance policy is preferably a vehicle insurance policy. Wherein, the pre-established blockchain network can be used as a blockchain network initiator from any end, for example, a web server receiving a web access application is used as an initiator, and the specific process includes: creating a Blockchain class in any feasible language, and creating a list for storing block chains in a constructor; after the Blockchain is instantiated, establishing a created block (the first block before the block is absent); determining consensus mechanisms for blockchains (e.g., workload attestation mechanisms, equity attestation mechanisms, share authorization attestation mechanisms, and Pool verification pools); and receiving a terminal agreeing to the consensus mechanism as a node of the block chain network, thereby obtaining the pre-established block chain network. The nodes (mutual interaction subjects) of the blockchain network may be terminals that agree with the consensus mechanism at will, and preferably, the computers of the insurance business outlets of the insurance company are the nodes. The nodes are connected with each other, and whether the data is tampered or not can be verified mutually (by using the hash value and the asymmetric encryption technology in the block chain).
202. Acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
203. encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data;
204. encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key;
205. the encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
206. completing the transaction according to the transaction request, and storing transaction related data corresponding to the transaction to the blockchain;
207. and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information.
The steps 203-207 in the present embodiment are similar to the steps 101-106 in the first embodiment, and are not described herein again.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Referring to fig. 3, a third embodiment of a block chain-based data supervision method according to the embodiment of the present invention includes:
301. acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
302. receiving transaction information of a target client on a blockchain transaction network to be transmitted;
in this embodiment, when the relevant data of the target client needs to be sent to the blockchain transaction network, the data to be sent may be the transaction information of the target client and the personal data information of the target client. The data may be, for example, data transmitted by the source end and the destination end during the double-ended handshake, or data exchanged by the double ends during data transmission. The raw data may be received by the data encryption device and may be encrypted by the data encryption device.
303. Generating random data with a specified length, and adding the generated random data to the transaction information to form new data;
in this embodiment, after receiving the original data, the data encryption apparatus may add random data of a specified length to the original data in order to remove the fixed feature in the original data. Generally, the fixed characteristic of the data is often embodied by a character string in the data packet header, so in this embodiment, the fixed characteristic of the data packet header of the original data can be removed by splicing the random data in front of the original data.
In this embodiment, the predetermined length of the random data may be determined in advance based on the time stamp and the preset redundant data. Specifically, when the original data is transmitted, the source end may transmit the original data together with a timestamp of the original data, so that the data encryption apparatus receives the original data and receives the corresponding timestamp at the same time. In addition, in practical applications, the original data sent by the source end may not carry a corresponding timestamp, and the data encryption device may use the time when the original data is received as the timestamp corresponding to the original data.
In this embodiment, after obtaining a timestamp corresponding to original data, the timestamp and the preset redundant data may be spliced to serve as feature data; the Hash value of the feature data may then be computed using a predetermined Hash Algorithm, which may be, for example, the SHA1(Secure Hash Algorithm) Algorithm. After the hash value of the feature data is calculated, the specified length of the random data may be determined based on the hash value, specifically, the contents of the first two bytes of the hash value may be taken, and then the contents of the first two bytes are divided by 256, and then the obtained result is rounded, so that the specified length of the random data may be obtained. It will be appreciated that the specific manner in which the specified length is determined based on the hash value may be modified according to the actual setting.
In the present embodiment, after the specified length is determined, random data having the specified length can be generated. For example, in the Linux system, random data having a specified length may be generated by an instruction of/dev/random.
304. Generating an encryption key of the new data based on the length of the new data and preset redundant data;
in this embodiment, after the random data is spliced in the original data, new data can be obtained. In order to ensure the security of the new data during transmission, the new data may be encrypted. The data encryption means may generate an encryption key for the new data. Specifically, the data encryption apparatus may identify the length L of the new data, and may calculate a length hash value corresponding to the length L of the new data by a preset hash algorithm. For example, the predetermined hash algorithm may be the SHA512 algorithm, and the hash value with the length may be calculated by the SHA512 (L). Then, the data encryption apparatus may splice the length hash value and the preset redundant data into target data, and calculate a hash value of the target data by the preset hash algorithm. Using the formula can be expressed as: SHA512(SHA512(L) + salt). Wherein salt may represent the preset redundant data, and "+" may represent splicing SHA512(L) with the preset redundant data. SHA512(×) indicates the predetermined hash algorithm. Finally, the hash value of the target data may be used as an encryption key for the new data.
305. Encrypting the new data by using the encryption key;
in this embodiment, after obtaining the encryption key, the new data and the encryption key may be subjected to an exclusive or operation, so as to complete the encryption process of the new data. The data after the exclusive-or operation can be used as encrypted data. The encrypted data can be sent to the data decryption device by the data encryption device through a pre-established secure channel.
In one embodiment, in order to facilitate the data decryption device to decrypt the encrypted data, the data encryption device may further add a timestamp used in calculating the specified length to the encrypted data after obtaining the encrypted data. In this way, after the data decryption device receives the encrypted data carrying the time stamp, the specified length can be calculated in the same manner based on the preset redundant data and the time stamp identified from the encrypted data. Subsequently, the data decryption device may remove the content with the specified length from the decrypted data, so as to restore the original data.
Specifically, the manner of adding the time stamp to the encrypted data may include directly adding a time stamp of a preset length to a fixed position of the encrypted data, where the preset length and the fixed position are negotiated with each other by the encryption and decryption apparatuses or are initially set. For example, a time stamp is added to the front, tail, or middle of the encrypted data. In this way, the decryption apparatus can extract the time stamp from the received data based on the added position and length of the time stamp after receiving the data transmitted from the encryption apparatus, and the extracted data is data that needs to be decrypted by the key. By means of the processing in the mode, the difficulty of cracking the data can be increased after the data in the transmission process is hijacked illegally.
306. Encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data;
307. encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key;
308. the encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
309. completing the transaction according to the transaction request, and storing transaction related data corresponding to the transaction to the blockchain;
310. and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information.
The steps 301 and 306-310 in this embodiment are similar to the steps 101-106 in the first embodiment, and are not described herein again.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Referring to fig. 4, a fourth embodiment of a block chain-based data supervision method according to the embodiment of the present invention includes:
401. acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
402. encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data;
403. encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key;
404. the encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
405. when a transaction request sent by a target client in a preset format is received, calling a preset intelligent contract, and judging whether the transaction corresponding to the transaction request needs to be introduced into a supervisor or not based on the preset intelligent contract;
in this embodiment, the blockchain technique has the characteristics of decentralization and information non-tamper-resistance, and the like, and the transaction event involving multiple parties can be realized by using the blockchain technique. In blockchain transactions, some transactions need to be participated in by a monitoring party and monitored; however, during the transaction process, in order to protect the privacy of the transaction-related party (or called a participant), the identity of the transactor and the transaction data are usually encrypted (for example, protected anonymously by using a zero-knowledge proof method); in such a case, the non-transaction related party may see that the transaction occurred, but does not know the true identity and specific transaction content of the transactant; at this time, if the transaction initiator does not invite the monitoring party to join the transaction process, the monitoring party cannot normally perform the monitoring function in the blockchain platform, thereby adversely affecting the orderliness and stability of the blockchain transaction platform.
In this embodiment, an intelligent contract is preset in the blockchain transaction platform, and the intelligent contract can be understood as a set of codes and data and is registered in a node of the blockchain transaction platform; smart contracts are capable of automatically performing functions driven by time or events, such as passing information between each other, modifying the state of block chains (account information, etc.), and turing-complete computations (everything that can be done with a turing machine, colloquially, everything a general programming language can do).
406. When the transaction needs to be introduced into a supervisor, the transaction request is analyzed, and whether the supervisor is included in transaction related parties in the transaction request is judged;
in this embodiment, each transaction executed by the blockchain platform calls an intelligent contract to execute the transaction; the intelligent contract is provided with related transaction supervision events, when a transaction request sent by a certain user (which can be called as a transaction initiator) is received in a platform in a block chain, the intelligent contract is automatically called, the transaction request is analyzed and identified, the transaction type of the transaction corresponding to the transaction request is determined, and whether the transaction which the transaction initiator wishes to carry out needs to be introduced into a supervisor for supervision or not is judged.
In this embodiment, if the transaction that the transaction initiator wishes to initiate needs to be introduced into the administrator, the transaction request is parsed, and it is determined whether the administrator has been used as one of the transaction related parties in the transaction request. If the transaction related party in the transaction request includes the supervisor, it indicates that the transaction initiator initiates the transaction and simultaneously issues a transaction invitation to the supervisor to introduce the supervisor into the transaction.
In this embodiment, the judgment on whether the transaction-related party includes the monitoring party may be obtained by analyzing an encryption algorithm. Specifically, since the supervisor is trusted and knowable in the blockchain platform, the supervisor's supervision public key needs to be published in the blockchain platform in advance. When the transaction initiator sends a transaction request, if a supervisor is hoped to be introduced, the supervisor can be added into the transaction request as a special transaction related party (the supervisor mainly plays a supervision role); in other words, one transaction symmetric key in the transaction symmetric keys used for encrypted transaction content is encrypted by using a supervision public key of a supervisor; therefore, the supervisor can decrypt the transaction symmetric key through the supervisory private key of the supervisor, and the transaction content is obtained by using the decrypted transaction symmetric key, so that the transaction process is supervised. Based on the above principle, when determining whether the transaction related party in the transaction request includes the supervising party, the transaction related party is the transaction symmetric key for determining whether the transaction request has the real public key encryption of the supervised party (if the transaction request has a plurality of encrypted transaction symmetric keys, it is determined whether at least one of the encrypted transaction symmetric keys is the real public key encryption of the supervised party); if the transaction request has the transaction symmetric key encrypted by the real public key of the supervisor, the transaction related party in the transaction request comprises the supervisor; if the transaction request has the transaction symmetric key encrypted by the real public key of the supervisor, the transaction related party in the transaction request does not include the supervisor.
407. When the transaction related party in the transaction request comprises a monitoring party, the transaction request is sent in the blockchain network so that the transaction related party can confirm the transaction request;
in this embodiment, if the transaction related party in the transaction request includes the administrator, it indicates that the transaction initiator initiates the transaction and also issues a transaction invitation to the administrator to introduce the administrator into the transaction process. According to the relevant setting of the intelligent contract, the current transaction request can be considered to meet the preliminary supervision requirement, and then the transaction request can be broadcasted in the blockchain platform, so that all relevant parties (including a supervision party) in the transaction request can acquire the transaction request and check and confirm the content in the transaction request. For the transaction request applying the double-layer encryption, after the supervisor party is used as a related party to join in the transaction, the supervisor party can decrypt the transaction symmetric key through the own supervision private key, and obtains the transaction content by using the decrypted transaction symmetric key to correctly see the actual situation of the transaction; the supervisor can check the transaction according to the supervision strategy and automatically approve the transaction which accords with the supervision strategy; automatically rejecting transactions that do not meet a transaction supervision policy; if the monitoring strategy cannot be judged according to the monitoring strategy, early warning can be performed, the early warning is pushed to related personnel, and the monitoring personnel are asked to perform manual secondary judgment.
408. When the transaction related party in the transaction request does not comprise the monitoring party, rejecting the transaction request;
in this embodiment, if the transaction related party in the transaction request does not include the administrator, it indicates that the transaction initiator does not send a transaction invitation to the administrator while initiating the transaction. At this time, since the transaction initiator does not invite the monitoring party to participate in the transaction according to the provisions in the intelligent contract when initiating the transaction, the transaction request can be considered to be untrusted; the transaction request is not broadcast in the blockchain platform at this time, but is directly rejected (overruled).
In the embodiment, when a transaction request sent by a transaction initiator in a preset format is received, a preset intelligent contract is called, and whether a transaction corresponding to the transaction request needs to be introduced into a supervisor or not is judged based on the preset intelligent contract; if the transaction needs to be introduced into a supervisor, analyzing the transaction request, and judging whether the transaction related party in the transaction request comprises the supervisor; if the transaction related party in the transaction request comprises the supervisor party, broadcasting the transaction request in a blockchain platform so that the transaction related party can confirm the transaction request; and if the transaction related party in the transaction request does not comprise the supervisor party, rejecting the transaction request. Through the above manner, in this embodiment, when the transaction initiator sends a transaction request, it is determined through the intelligent contract whether the transaction needs to be introduced into the supervisor, and if the transaction needs to be introduced into the supervisor, it is determined whether to broadcast the transaction request to the block chain platform according to the specific invitation object of the transaction request; therefore, the handling control of the transaction request in the blockchain transaction is realized, the monitoring function of the monitoring party can be normally realized in the blockchain transaction, and the orderliness and stability of the transaction in a blockchain transaction platform are effectively ensured.
409. The encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
410. completing the transaction according to the transaction request, and storing transaction related data corresponding to the transaction to the blockchain;
411. and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information.
The steps 401-.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Referring to fig. 5, a fifth embodiment of a block chain-based data supervision method according to the present invention includes:
501. acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor;
502. encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data;
503. encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key;
504. the encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
505. completing the transaction according to the transaction request, and storing transaction related data corresponding to the transaction to the blockchain;
506. acquiring transaction data sent by each supervisor to a block chain;
in this embodiment, the execution subject of the present invention may be a node in a chain of the supervisor block. The transaction data can comprise personal data of a customer, transaction information of both transaction parties, transaction state, transaction time and other parameters, and the blockchain supervisor comprises transaction individuals, financial institutions and the like. The supervisor creates a blockchain for transaction supervision. After the transaction is completed, the client sends the data related to the transaction to the block chain link point corresponding to the block chain, so that the corresponding block chain link point receives the transaction record data and writes the received data into the block chain; after the financial institution performing supervision can sign a supervision protocol on both transaction parties, parameters such as transaction information of both transaction parties are sent to the block chain link based on the actual transaction progress and the supervision protocol signed by both parties, so that the block chain link point writes the received data into the block chain.
507. According to a supervision protocol in the transaction data, an intelligent contract running in a block chain is constructed, wherein the intelligent contract comprises a judgment condition of a transaction state;
in this embodiment, after the transaction data is obtained, an intelligent contract running in the blockchain system may be constructed according to a supervision protocol in the transaction data, the construction of the intelligent contract may also be referred to as deploying the intelligent contract, and the process of constructing the intelligent contract is to initialize the transaction data according to transaction needs.
The intelligent contract is constructed while the contract name of the intelligent contract is generated, and it is understood that the contract name is also set according to specific transaction requirements. Since the contract name is set according to specific transaction requirements, the contract name includes a description of the transaction purpose of the intelligent contract. Certainly, when describing the transaction purpose of the contract name, the uniform format is adopted as much as possible, then the supervision protocol in the transaction data is extracted to be used as the function of the intelligent contract, other data in the transaction data, such as fund information, transaction time, transaction product type and the like, are used as the data of the intelligent contract, and are compiled by using the solc to form the intelligent contract. It can be understood that, in the process of constructing the intelligent contract, the supervision protocol in the transaction data is used as the function of the intelligent contract, so that the intelligent contract is provided with the judgment condition of the transaction state, and the supervision protocol needs to be converted firstly in the specific implementation process to be used as the function of the intelligent contract. In a specific embodiment, the intelligent contract is divided into item formation, item release and verification and execution in the whole period, the intelligent contract is composed of a plurality of chapters, and the execution of the intelligent contract is executed in sections.
508. The supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information, and displays the transaction information;
509. receiving transaction data and a request for judging the authenticity of the transaction data;
in the embodiment, the fact that whether the transaction data is real or not is judged. The potential for counterfeiting transaction data can arise in insurance fraud. The method and the device ensure the authenticity of transaction data by utilizing the characteristic that the information of the block chain is difficult to change and tamper. Wherein the encrypted transaction data stored in any one of the blockchain nodes can be decrypted to obtain decrypted transaction data; decrypted transaction data which can be obtained by decrypting the encrypted transaction data stored in any plurality of blockchain nodes; or decrypted transaction data obtained by decrypting the encrypted transaction data stored in all blockchain nodes.
510. Comparing the transaction data with decrypted transaction data obtained by decrypting the encrypted transaction data stored in the block link points; and when the similarity between the decrypted transaction data and the transaction data is greater than a first threshold value, determining that the transaction data is true.
In this embodiment, if the transaction data is the same as the decrypted stored transaction data in the region link point, the transaction data may be considered as true, otherwise, the transaction data may be considered as false, thereby preventing malicious claims from being resolved. The specific comparison method comprises the following steps: performing exclusive or operation on the transaction data and the decrypted transaction data according to bytes to obtain repeated bytes of the transaction data and the decrypted transaction data; and if the number of the repeated bytes exceeds a first threshold value, namely the similarity between the decrypted transaction data and the transaction data is greater than the first threshold value, judging that the transaction data is the same as the decrypted transaction data, and judging that the transaction data is true. For example, the possibility of counterfeiting a policy may arise in insurance fraud. The authenticity of the policy is ensured by using the characteristic that the information of the block chain is difficult to change and tamper. If the electronic policy is the same as the decrypted stored policy in the region link point, the electronic policy may be deemed to be authentic, otherwise it may be deemed to be false, thereby preventing malicious claims from being resolved.
Steps 501-505 and 508 in this embodiment are similar to steps 101-105 and 106 in the first embodiment, and are not described herein again.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
With reference to fig. 6, the above describes a block chain based data supervision method in an embodiment of the present invention, and a block chain based data supervision apparatus in an embodiment of the present invention is described below, where a first embodiment of the block chain based data supervision apparatus in an embodiment of the present invention includes:
a first obtaining module 601, configured to obtain a preset encryption key pair, and synchronize the encryption key pair to a preset administrator, where the encryption key pair carries an encryption private key and an encryption public key;
the encryption module 602 is configured to encrypt, by using the encryption private key, transaction information of a target client on a blockchain transaction network to generate encrypted transaction data, where the encrypted transaction data carries privacy information of the target client;
a generating module 603, configured to encrypt the encrypted public key by using a preset public key of the receiver, and generate an encrypted public key of the receiver;
the initiating module 604 is configured to combine the encrypted transaction data and the recipient encrypted public key into a transaction body, and initiate a transaction request on the blockchain based on the transaction body;
a storage module 605, configured to complete the transaction according to the transaction request, and store transaction related data corresponding to the transaction to the block chain, where the transaction related data includes user information, behavior information, transaction information, and contract information;
and the decryption module 606 is configured to decrypt the encrypted transaction data according to the encrypted public key to obtain transaction information, and display the transaction information.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Referring to fig. 7, a second embodiment of the block chain-based data monitoring apparatus according to the embodiment of the present invention specifically includes:
a first obtaining module 601, configured to obtain a preset encryption key pair, and synchronize the encryption key pair to a preset administrator, where the encryption key pair carries an encryption private key and an encryption public key;
the encryption module 602 is configured to encrypt, by using the encryption private key, transaction information of a target client on a blockchain transaction network to generate encrypted transaction data, where the encrypted transaction data carries privacy information of the target client;
a generating module 603, configured to encrypt the encrypted public key by using a preset public key of the receiver, and generate an encrypted public key of the receiver;
the initiating module 604 is configured to combine the encrypted transaction data and the recipient encrypted public key into a transaction body, and initiate a transaction request on the blockchain based on the transaction body;
a storage module 605, configured to complete the transaction according to the transaction request, and store transaction related data corresponding to the transaction to the block chain, where the transaction related data includes user information, behavior information, transaction information, and contract information;
and the decryption module 606 is configured to decrypt the encrypted transaction data according to the encrypted public key to obtain transaction information, and display the transaction information.
In this embodiment, the device for supervising data based on a block chain further includes:
the building module 607 is configured to build a creation block and determine a consensus mechanism of the block chain, and build a block chain transaction network with a terminal agreeing to the consensus mechanism as a block chain node.
In this embodiment, the encryption module 602 includes:
a receiving unit 6021, configured to receive transaction information of a target client on a blockchain transaction network to be transmitted;
a generation unit 6022 for generating random data of a specified length and adding the generated random data to the transaction information to form new data; generating an encryption key of the new data based on the length of the new data and the preset redundant data;
an encrypting unit 6023 for encrypting the new data with the encryption key.
In this embodiment, the device for supervising data based on a block chain further includes:
the judging module 608 is configured to, when a transaction request sent by a target client in a preset format is received, invoke a preset intelligent contract, and judge, based on the preset intelligent contract, whether a transaction corresponding to the transaction request needs to be introduced to a monitoring party;
the analyzing module 609 is configured to analyze the transaction request when the transaction needs to be introduced into a monitoring party, and determine whether a transaction related party in the transaction request includes the monitoring party;
a confirmation module 610, configured to send the transaction request in a blockchain network when a transaction-related party in the transaction request includes the administrator, so that the transaction-related party confirms the transaction request;
a rejecting module 611, configured to reject the transaction request when the transaction-related party in the transaction request does not include the supervising party.
In this embodiment, the device for supervising data based on a block chain further includes:
a second obtaining module 612, configured to obtain transaction data sent by each supervisor to the blockchain;
a building module 613, configured to build an intelligent contract running in the blockchain according to a supervision protocol in the transaction data, where the intelligent contract includes a determination condition of a transaction state.
In this embodiment, the device for supervising data based on a block chain further includes:
a receiving module 614, configured to receive transaction data and an authenticity judgment request for the transaction data;
a comparison module 615, configured to compare the transaction data with decrypted transaction data obtained by decrypting the encrypted transaction data stored in the blockchain node; and if the similarity between the decrypted transaction data and the transaction data is greater than a first threshold value, determining that the transaction data is true.
In the embodiment of the invention, a preset encryption key pair is obtained, and the encryption key pair is synchronized to a preset supervisor; encrypting the transaction information of the target client on the blockchain transaction network by using an encryption private key to generate encrypted transaction data; encrypting the encrypted public key by presetting a receiver public key to generate a receiver encrypted public key; initiating a transaction request on the blockchain based on a transaction body consisting of the encrypted transaction data and the encrypted public key of the receiver; completing the transaction according to the transaction request, and storing transaction data to the block chain; and the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain the transaction information and displays the transaction information. The technical problem of low data supervision efficiency is solved by utilizing the decentralized characteristic of the block chain.
Fig. 6 and fig. 7 describe the block chain based data supervision apparatus in the embodiment of the present invention in detail from the perspective of the modular functional entity, and the block chain based data supervision apparatus in the embodiment of the present invention is described in detail from the perspective of hardware processing.
Fig. 8 is a schematic structural diagram of a block chain based data policing apparatus according to an embodiment of the present invention, where the block chain based data policing apparatus 800 may generate relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 810 (e.g., one or more processors) and a memory 820, and one or more storage media 830 (e.g., one or more mass storage devices) storing an application 833 or data 832. Memory 820 and storage medium 830 may be, among other things, transient or persistent storage. The program stored in the storage medium 830 may include one or more modules (not shown), each of which may include a series of instructions operating on the blockchain based data policing device 800. Still further, the processor 810 may be configured to communicate with the storage medium 830, and execute a series of instruction operations in the storage medium 830 on the blockchain-based data policing apparatus 800 to implement the steps of the blockchain-based data policing method provided by the above-described method embodiments.
The blockchain-based data policing apparatus 800 may also include one or more power supplies 840, one or more wired or wireless network interfaces 850, one or more input-output interfaces 860, and/or one or more operating systems 831, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, and the like. Those skilled in the art will appreciate that the blockchain based data policing device architecture shown in fig. 8 does not constitute a limitation of the blockchain based data policing devices provided herein, and may include more or fewer components than shown, or combine certain components, or a different arrangement of components.
The present invention also provides a computer-readable storage medium, which may be a non-volatile computer-readable storage medium, and may also be a volatile computer-readable storage medium, where instructions are stored, and when the instructions are executed on a computer, the instructions cause the computer to execute the steps of the above block chain-based data supervision method.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A block chain based data supervision method is characterized by comprising the following steps:
acquiring a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisor, wherein the encryption key pair carries an encryption private key and an encryption public key;
encrypting the transaction information of a target client on a blockchain transaction network through the encrypted private key to generate encrypted transaction data, wherein the encrypted transaction data carries the privacy information of the target client;
encrypting the encrypted public key through a preset receiver public key to generate a receiver encrypted public key;
the encrypted transaction data and the encrypted public key of the receiver form a transaction body, and a transaction request is initiated on the blockchain based on the transaction body;
the transaction is completed according to the transaction request, and transaction related data corresponding to the transaction are stored in the block chain, wherein the transaction related data comprise user information, behavior information, transaction information and contract information;
and decrypting the encrypted transaction data according to the encrypted public key to obtain transaction information, and displaying the transaction information.
2. The method for block chain-based data supervision according to claim 1, further comprising, before the obtaining a preset encryption key pair and synchronizing the encryption key pair to a preset supervisor:
establishing an appearance creating block and determining a consensus mechanism of the block chain, and establishing a block chain transaction network by taking a terminal agreeing to the consensus mechanism as a block chain node.
3. The blockchain-based data monitoring method according to claim 1, wherein the encrypting transaction information of the target customer on the blockchain transaction network by the encryption private key to generate encrypted transaction data includes:
receiving transaction information of a target client on a blockchain transaction network to be transmitted;
generating random data with a specified length, and adding the generated random data to the transaction information to form new data;
generating an encryption key of the new data based on the length of the new data and the preset redundant data;
and encrypting the new data by using the encryption key.
4. The blockchain-based data policing method according to claim 1, further comprising, after the combining the encrypted transaction data and the recipient encrypted public key into a transaction body and initiating a transaction request on the blockchain based on the transaction body:
when a transaction request sent by a target client in a preset format is received, calling a preset intelligent contract, and judging whether the transaction corresponding to the transaction request needs to be introduced into a supervisor or not based on the preset intelligent contract;
if the transaction needs to be introduced into a supervisor, analyzing the transaction request, and judging whether the transaction related party in the transaction request comprises the supervisor;
if the transaction related party in the transaction request comprises the monitoring party, the transaction request is sent in a blockchain network so that the transaction related party can confirm the transaction request;
and if the transaction related party in the transaction request does not comprise the supervisor party, rejecting the transaction request.
5. The block chain-based data supervision method according to claim 1, wherein before the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information and displays the transaction information, the method further comprises:
acquiring transaction data sent by each supervisor to a block chain;
and constructing an intelligent contract running in the block chain according to a supervision protocol in the transaction data, wherein the intelligent contract comprises a judgment condition of a transaction state.
6. The block chain-based data supervision method according to claim 1, wherein after the supervisor decrypts the encrypted transaction data according to the encrypted public key to obtain transaction information and displays the transaction information, the method further comprises:
receiving transaction data and an authenticity judgment request for the transaction data;
comparing the transaction data with decrypted transaction data obtained by decrypting the encrypted transaction data stored in the blockchain node;
and if the similarity between the decrypted transaction data and the transaction data is greater than a first threshold value, determining that the transaction data is true.
7. A blockchain based data policing apparatus, the blockchain based data policing apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a preset encryption key pair and synchronizing the encryption key pair to a preset supervisor, and the encryption key pair carries an encryption private key and an encryption public key;
the encryption module is used for encrypting the transaction information of the target customer on the blockchain transaction network through the encryption private key to generate encrypted transaction data, wherein the encrypted transaction data carries the privacy information of the target customer;
the generating module is used for encrypting the encrypted public key through a preset receiver public key to generate a receiver encrypted public key;
the initiating module is used for forming a transaction body by the encrypted transaction data and the encrypted public key of the receiving party and initiating a transaction request on the block chain based on the transaction body;
the storage module is used for completing the transaction according to the transaction request and storing transaction related data corresponding to the transaction to the block chain, wherein the transaction related data comprises user information, behavior information, transaction information and contract information;
and the decryption module is used for decrypting the encrypted transaction data according to the encrypted public key by the supervisor to obtain transaction information and displaying the transaction information.
8. The blockchain-based data policing apparatus of claim 7, wherein the blockchain-based data policing apparatus further comprises:
and the building module is used for building the creation block and determining a consensus mechanism of the block chain, and building the block chain transaction network by taking a terminal agreeing to the consensus mechanism as a block chain node.
9. A blockchain-based data policing apparatus, the blockchain-based data policing apparatus comprising: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line;
the at least one processor invoking the instructions in the memory to cause the blockchain based data policing apparatus to perform the steps of the blockchain based data policing method of any one of claims 1-6.
10. A computer-readable storage medium, having stored thereon a computer program, wherein the computer program, when being executed by a processor, carries out the steps of the blockchain-based data policing method according to any one of claims 1 to 6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011472818.5A CN112507363A (en) | 2020-12-15 | 2020-12-15 | Data supervision method, device and equipment based on block chain and storage medium |
PCT/CN2021/090219 WO2022126967A1 (en) | 2020-12-15 | 2021-04-27 | Blockchain-based data supervision method, apparatus and device, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011472818.5A CN112507363A (en) | 2020-12-15 | 2020-12-15 | Data supervision method, device and equipment based on block chain and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112507363A true CN112507363A (en) | 2021-03-16 |
Family
ID=74973262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011472818.5A Pending CN112507363A (en) | 2020-12-15 | 2020-12-15 | Data supervision method, device and equipment based on block chain and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112507363A (en) |
WO (1) | WO2022126967A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113065170A (en) * | 2021-04-21 | 2021-07-02 | 山大地纬软件股份有限公司 | Method, system and device for block chain supervision data based on dynamic identification |
CN113094432A (en) * | 2021-04-06 | 2021-07-09 | 湖北央中巨石信息技术有限公司 | Multi-party asynchronous consensus method and system based on same prefabrication rule |
CN113206744A (en) * | 2021-04-29 | 2021-08-03 | 杭州趣链科技有限公司 | Cross-chain transaction supervision method, device, equipment and storage medium |
CN113516475A (en) * | 2021-05-14 | 2021-10-19 | 数字印记(北京)科技有限公司 | Data delivery method, device, system, electronic equipment and storage medium |
CN114244534A (en) * | 2021-12-21 | 2022-03-25 | 杭州趣链科技有限公司 | Data storage method, device, equipment and storage medium |
CN114398206A (en) * | 2022-01-06 | 2022-04-26 | 北京德风新征程科技有限公司 | Information storage method and device, electronic equipment and computer readable medium |
WO2022126967A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Blockchain-based data supervision method, apparatus and device, and storage medium |
CN114881781A (en) * | 2022-05-11 | 2022-08-09 | 孙继东 | Safe transaction system and method based on block chain technology |
CN115022377A (en) * | 2022-07-22 | 2022-09-06 | 国网浙江省电力有限公司电力科学研究院 | High-elasticity power grid data transmission method, device, equipment and medium |
CN115550026A (en) * | 2022-09-26 | 2022-12-30 | 建信金融科技有限责任公司 | Multi-monitoring method, system and storage medium based on block chain transaction |
CN117454437A (en) * | 2023-12-22 | 2024-01-26 | 北京天润基业科技发展股份有限公司 | Transaction processing method, storage medium and electronic device |
WO2024160210A1 (en) * | 2023-01-31 | 2024-08-08 | 中国人民银行数字货币研究所 | Transaction method and apparatus, device and storage medium |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115664769B (en) * | 2022-10-20 | 2024-05-31 | 牛津(海南)区块链研究院有限公司 | Data transmission method, system, equipment and medium based on blockchain commitment |
CN116308210B (en) * | 2023-05-08 | 2023-09-15 | 广东粤电信息科技有限公司 | Power plant supervision method and system based on two-dimension code |
CN116760651A (en) * | 2023-08-22 | 2023-09-15 | 中国航空结算有限责任公司 | Data encryption method and device, electronic equipment and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107196989A (en) * | 2017-03-21 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of processing method and processing device of service request |
CN108242013A (en) * | 2017-12-25 | 2018-07-03 | 招商银行股份有限公司 | Transaction monitoring and managing method, equipment and computer readable storage medium based on block chain |
CN109034796A (en) * | 2018-06-15 | 2018-12-18 | 重庆金融资产交易所有限责任公司 | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN109150512A (en) * | 2018-08-22 | 2019-01-04 | 网宿科技股份有限公司 | A kind of data encryption, decryption method, system and data encryption, decryption device |
CN109918451A (en) * | 2019-03-28 | 2019-06-21 | 中国联合网络通信集团有限公司 | Data base management method and system based on block chain |
JP2020078081A (en) * | 2020-01-14 | 2020-05-21 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | Regulating blockchain confidential transactions |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190063796A (en) * | 2017-11-30 | 2019-06-10 | 주식회사 베프스 | Identification apparatus and method based on biometric data for blockchain system |
CN112507363A (en) * | 2020-12-15 | 2021-03-16 | 平安科技(深圳)有限公司 | Data supervision method, device and equipment based on block chain and storage medium |
-
2020
- 2020-12-15 CN CN202011472818.5A patent/CN112507363A/en active Pending
-
2021
- 2021-04-27 WO PCT/CN2021/090219 patent/WO2022126967A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107196989A (en) * | 2017-03-21 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of processing method and processing device of service request |
CN108242013A (en) * | 2017-12-25 | 2018-07-03 | 招商银行股份有限公司 | Transaction monitoring and managing method, equipment and computer readable storage medium based on block chain |
CN109034796A (en) * | 2018-06-15 | 2018-12-18 | 重庆金融资产交易所有限责任公司 | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN109150512A (en) * | 2018-08-22 | 2019-01-04 | 网宿科技股份有限公司 | A kind of data encryption, decryption method, system and data encryption, decryption device |
CN109918451A (en) * | 2019-03-28 | 2019-06-21 | 中国联合网络通信集团有限公司 | Data base management method and system based on block chain |
JP2020078081A (en) * | 2020-01-14 | 2020-05-21 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | Regulating blockchain confidential transactions |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022126967A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Blockchain-based data supervision method, apparatus and device, and storage medium |
CN113094432B (en) * | 2021-04-06 | 2022-06-03 | 湖北央中巨石信息技术有限公司 | Multi-party asynchronous consensus method and system based on same prefabrication rule |
CN113094432A (en) * | 2021-04-06 | 2021-07-09 | 湖北央中巨石信息技术有限公司 | Multi-party asynchronous consensus method and system based on same prefabrication rule |
CN113065170A (en) * | 2021-04-21 | 2021-07-02 | 山大地纬软件股份有限公司 | Method, system and device for block chain supervision data based on dynamic identification |
CN113206744A (en) * | 2021-04-29 | 2021-08-03 | 杭州趣链科技有限公司 | Cross-chain transaction supervision method, device, equipment and storage medium |
CN113206744B (en) * | 2021-04-29 | 2024-04-02 | 杭州趣链科技有限公司 | Cross-chain transaction supervision method, device, equipment and storage medium |
CN113516475A (en) * | 2021-05-14 | 2021-10-19 | 数字印记(北京)科技有限公司 | Data delivery method, device, system, electronic equipment and storage medium |
CN114244534A (en) * | 2021-12-21 | 2022-03-25 | 杭州趣链科技有限公司 | Data storage method, device, equipment and storage medium |
CN114398206A (en) * | 2022-01-06 | 2022-04-26 | 北京德风新征程科技有限公司 | Information storage method and device, electronic equipment and computer readable medium |
CN114881781A (en) * | 2022-05-11 | 2022-08-09 | 孙继东 | Safe transaction system and method based on block chain technology |
CN115022377A (en) * | 2022-07-22 | 2022-09-06 | 国网浙江省电力有限公司电力科学研究院 | High-elasticity power grid data transmission method, device, equipment and medium |
CN115550026A (en) * | 2022-09-26 | 2022-12-30 | 建信金融科技有限责任公司 | Multi-monitoring method, system and storage medium based on block chain transaction |
WO2024160210A1 (en) * | 2023-01-31 | 2024-08-08 | 中国人民银行数字货币研究所 | Transaction method and apparatus, device and storage medium |
CN117454437A (en) * | 2023-12-22 | 2024-01-26 | 北京天润基业科技发展股份有限公司 | Transaction processing method, storage medium and electronic device |
CN117454437B (en) * | 2023-12-22 | 2024-03-22 | 北京天润基业科技发展股份有限公司 | Transaction processing method, storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
WO2022126967A1 (en) | 2022-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112507363A (en) | Data supervision method, device and equipment based on block chain and storage medium | |
CN111737724B (en) | Data processing method and device, intelligent equipment and storage medium | |
CN109889504B (en) | Decentralized data access right transaction method and system | |
CN109309565B (en) | Security authentication method and device | |
AU2021236535A1 (en) | Transferring digital tickets based on blockchain networks | |
WO2019007396A1 (en) | Method and device for conducting encrypted transaction based on smart contract, and blockchain | |
EP3563553A1 (en) | Method for signing a new block in a decentralized blockchain consensus network | |
CN114357492B (en) | Medical data privacy fusion method and device based on blockchain | |
CN110942382A (en) | Electronic contract generating method and device, computer equipment and storage medium | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
CN114499875B (en) | Service data processing method, device, computer equipment and storage medium | |
CN111476573A (en) | Account data processing method, device, equipment and storage medium | |
WO2022057106A1 (en) | Credibility verification system for digital asset data packet | |
CN114760071B (en) | Zero-knowledge proof based cross-domain digital certificate management method, system and medium | |
CN112231755A (en) | Data authorization method, device and system based on block chain | |
CN115147224A (en) | Transaction data sharing method and device based on alliance chain | |
CN115908001A (en) | Transaction supervision method and device based on block chain, electronic equipment and storage medium | |
CN111274597A (en) | Data processing method and equipment | |
CN113328854B (en) | Service processing method and system based on block chain | |
CN114666064A (en) | Block chain-based digital asset management method, device, storage medium and equipment | |
CN112926983A (en) | Block chain-based deposit certificate transaction encryption system and method | |
CN112948789A (en) | Identity authentication method and device, storage medium and electronic equipment | |
CN116881936A (en) | Trusted computing method and related equipment | |
CN113869901B (en) | Key generation method, key generation device, computer-readable storage medium and computer equipment | |
CN114742649A (en) | Transaction data processing method and device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210316 |