CN112600673A - Block chain transaction uplink method and system - Google Patents

Block chain transaction uplink method and system Download PDF

Info

Publication number
CN112600673A
CN112600673A CN202011389509.1A CN202011389509A CN112600673A CN 112600673 A CN112600673 A CN 112600673A CN 202011389509 A CN202011389509 A CN 202011389509A CN 112600673 A CN112600673 A CN 112600673A
Authority
CN
China
Prior art keywords
transaction
terminal
electronic tag
block chain
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011389509.1A
Other languages
Chinese (zh)
Inventor
王晓亮
卢缃梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Hangzhou Rivtower Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Rivtower Technology Co Ltd filed Critical Hangzhou Rivtower Technology Co Ltd
Priority to CN202011389509.1A priority Critical patent/CN112600673A/en
Publication of CN112600673A publication Critical patent/CN112600673A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

One or more embodiments of the present specification disclose a method and a system for block chain transaction uplink, in which a read-write device performs identity recognition on an electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.

Description

Block chain transaction uplink method and system
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and system for uplink transaction in blockchain.
Background
The blockchain is a decentralized and innovative solution for solving the multi-party trust problem by using a distributed book technology, and is a leading-edge technology of the current society.
The current blockchain application system can roughly include the following ways for uplink processing of transactions:
the terminal equipment signs the transaction based on a private key for input, and sends the signed transaction to the block chain node through the network for uplink processing; alternatively, the first and second electrodes may be,
the terminal equipment signs the transaction through a private key management module (such as HSM), and then sends the signed transaction to a block chain node for uplink processing; alternatively, the first and second electrodes may be,
the terminal equipment sends the transaction content without the signature to the server, and the server signs the transaction and submits the transaction content to the block link point for uplink processing.
In the uplink processing process of the transaction, almost all the transactions need to be directly uplink processed by the terminal device or the server through the network, which inevitably brings risks to the execution subject who centrally hosts the private key. Moreover, with the development of the blockchain application technology, the uplink transaction presents a diversified requirement, and therefore, a new uplink transaction scheme in a blockchain application scenario needs to be found.
Disclosure of Invention
One or more embodiments of the present disclosure provide a method and a system for blockchain transaction uplink, so as to implement submitting blockchain transaction uplink by an RFID device in various application scenarios combining RFID and blockchain, and at the same time, avoid the risk of centrally hosting a private key.
To solve the above technical problem, one or more embodiments of the present specification are implemented as follows:
in a first aspect, a method for uplink block chain transaction is provided, which is applied in a block chain service system using radio frequency identification RFID, and the method includes:
the read-write device carries out identity recognition on the electronic tag which is close to and can trigger the transaction initiation;
after a transaction related to the current service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag;
the electronic tag signs the transaction and sends the transaction to the read-write device;
and the read-write device uploads the signed transaction to a block chain service node for transaction chain linking processing.
In a second aspect, a method for uplink block chain transaction is provided, which is applied in a block chain service system using radio frequency identification RFID, and the method includes:
the method comprises the following steps that a first terminal carries out identity recognition on a second terminal which is close to and can trigger transaction initiation, wherein message transmission is carried out between the first terminal and the second terminal through a communication link established by an RFID technology;
after constructing a transaction related to the current service based on the identified identity information, the first terminal sends the constructed transaction to the second terminal;
the second terminal signs the transaction and sends the signature to the first terminal;
and the first terminal uploads the signed transaction to a block chain server for transaction uplink processing.
In a third aspect, a uplink block chain transaction system is provided, the system including: the method comprises the steps that a read-write device and an electronic tag of a communication link are established based on a Radio Frequency Identification (RFID) technology, and a block chain service node of the communication link is established with the read-write device; wherein the content of the first and second substances,
the reading and writing device carries out identity recognition on the electronic tag which is close to and can trigger the transaction initiation;
after a transaction related to the current service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag;
the electronic tag signs the transaction and sends the transaction to the read-write device;
and the read-write device uploads the signed transaction to a block chain service node for transaction chain linking processing.
In a fourth aspect, a block chain trade uplink system is provided, the system comprising: the system comprises a first terminal, a second terminal and a block chain server, wherein the first terminal and the second terminal are used for establishing a communication link based on a Radio Frequency Identification (RFID) technology, and the block chain server is used for establishing a communication link with the first terminal; wherein the content of the first and second substances,
the method comprises the following steps that a first terminal carries out identity recognition on a second terminal which is close to and can trigger transaction initiation, wherein message transmission is carried out between the first terminal and the second terminal through a communication link established by an RFID technology;
after constructing a transaction related to the current service based on the identified identity information, the first terminal sends the constructed transaction to the second terminal;
the second terminal signs the transaction and sends the signature to the first terminal;
and the first terminal uploads the signed transaction to a block chain server for transaction uplink processing.
As can be seen from the technical solutions provided in one or more embodiments of the present disclosure, a new block chain transaction uplink method is provided, in which a read/write device performs identity identification on an electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions of the present specification, reference will now be made briefly to the attached drawings, which are needed in the description of one or more embodiments or prior art, and it should be apparent that the drawings in the description below are only some of the embodiments described in the specification, and that other drawings may be obtained by those skilled in the art without inventive exercise.
Fig. 1 is a schematic diagram illustrating a step of a block chain transaction uplink method according to an embodiment of the present disclosure.
Fig. 2 is a block chain transaction uplink architecture diagram according to an embodiment of the present disclosure.
Fig. 3 is a second step diagram of a block chain transaction uplink method according to an embodiment of the present disclosure.
Fig. 4 is a schematic structural diagram of a uplink block chain transaction system according to an embodiment of the present disclosure.
Fig. 5 is a second schematic structural diagram of a uplink block chain transaction system according to an embodiment of the present disclosure.
Fig. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification.
Detailed Description
In order to make the technical solutions in the present specification better understood, the technical solutions in one or more embodiments of the present specification will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present specification, and it is obvious that the one or more embodiments described are only a part of the embodiments of the present specification, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
Example one
Referring to fig. 1, a schematic step diagram of a block chain transaction uplink method provided in an embodiment of the present disclosure is shown, it should be understood that the method is applied in a block chain service system using radio frequency identification RFID, that is, an RFID technology is combined with a block chain technology to implement uplink processing for block chain transactions. Referring to the architecture diagram of the blockchain business system shown in fig. 2, the executing entity participating in the blockchain uplink transaction scheme may include: an electronic tag 202, a read-write device 204 and a blockchain service node 206; the electronic tags 202 are composed of coupling elements and chips, each electronic tag 202 has a unique electronic code, and a high-capacity electronic tag has a user writable storage space; it should be understood that the electronic tag 202 may be attached to an object to identify a target object, where the object may be a target operation object related to a blockchain service, and is described in detail later through a specific service scenario, which is not limited herein. The read-write device 204 is a device for reading or writing tag information, and the read-write device 204 can be used by being attached to a terminal device. It should be noted that, inside the electronic tag 202 and the read/write device 204, antennas for receiving and/or transmitting signals are uniformly arranged, but not shown in fig. 2. The blockchain service node 206 may be any node device in the blockchain network that exists as an access point for transactions in the blockchain network.
Still referring to fig. 1, the block chain uplink transaction method may include the following steps:
step 102: the read-write device carries out identity recognition on the electronic tag which is close to and can trigger the transaction initiation.
The chip is arranged in the electronic tag, and the chip stores a target object identifier which is associated with the electronic tag and used for triggering related transactions of the block chain service, wherein the target object identifier can be a name or a code of a target object and can identify the uniqueness of the target object. In fact, in general, the target object may be a carrier of an electronic tag, that is, the electronic tag is attached to the target object to "give" the target object a function of the electronic tag. Meanwhile, a private key generated by a user based on a target object and a signature algorithm for performing signature operation on the received corresponding transaction by using the private key are also stored in the chip. It should be understood that all the electronic tags may use the same signature algorithm for the same RFID system; signature algorithms used by different RFID systems may or may not be distinguished, and are not limited herein.
Antennas are further arranged in the reading and writing device and the electronic tag, and when the electronic tag is close to the reading and writing device, the reading and writing device and the electronic tag are in wireless connection in a wireless radio frequency mode. And after the non-contact bidirectional data communication link is established, reading and writing the electronic tag by using a wireless radio frequency mode.
In this embodiment of the present description, the reading and writing device reads and writes the electronic tag, and first obtains the identity of the electronic tag or the identity of a target object represented by the electronic tag. Here, the identity information may be a target object identification. That is, the read-write device reads the identity information in the electronic tag, so as to identify the identity of the target object capable of initiating the transaction.
In an implementation manner, when the read-write apparatus performs identity recognition on an electronic tag that triggers a transaction initiation, the implementation is specifically as follows: and the read-write device reads the identification information which is stored in the electronic tag and can represent the unique identity of the electronic tag through an RFID technology. Therefore, a transaction related to the block chain service can be accurately constructed and initiated based on the identified identity.
Step 104: and after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag.
In embodiments of the present description, the manner of constructing the transaction may include:
the first method is as follows: the read-write device constructs the transaction related to the current service based on the identified identity information and the current service application type; in other words, the transaction construction process is mainly completed by the read-write device, that is, after the read-write device recognizes the identity information, the transaction is constructed based on the identity information and the current service application type. For example, the reader-writer constructs the transaction "Zhang Sandi Tianjin Dongdong station 13 o 03 registers identity card at the entrance of the station"
The second method comprises the following steps: and the read-write device cooperates with the electronic tag to construct a transaction related to the current service based on the identified identity information and the current service application type. That is, the transaction construction process is performed by the read/write device and the electronic tag, and the calculation and storage functions of the electronic tag are weaker than those of the read/write device, so that the transaction construction process is performed by the read/write device in most cases.
Step 106: and the electronic tag signs the transaction and sends the transaction to the read-write device.
In an implementation manner, a private key and a signature algorithm corresponding to the electronic tag are stored in a chip of the electronic tag; then, the signing of the transaction by the electronic tag may be implemented as:
the electronic tag signs the transaction by using the locally stored signature algorithm based on a corresponding private key.
Considering the wireless radio frequency link communication established between the electronic tag and the read-write device through the RFID, the read-write device can send the constructed transaction to the electronic tag through the wireless radio frequency link, and the electronic tag which is not connected with the network signs the transaction. Therefore, the read-write device is directly connected with the network, and the electronic tag for signature is communicated with the read-write device only through the wireless radio frequency link established by the RFID, so that the leakage of the private key for signature stored in the electronic tag is effectively isolated, and the security risk brought by the fact that the read-write device intensively hosts the private key is avoided.
It should be understood that the specific implementation of the signature operation described in this embodiment of this specification may be performed in the existing manner, and is not described herein again.
Step 108: and the read-write device uploads the signed transaction to a block chain service node for transaction chain linking processing.
Optionally, in this embodiment of the present specification, the block chain service using radio frequency identification RFID at least includes:
identity recognition service, anti-counterfeiting verification service, asset management service, information management service, and security control service. Some of the services are detailed later by specific examples.
Through the technical scheme, a new block chain transaction uplink mode is provided, and in the scheme, the reading and writing device identifies the identity of the electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.
The following describes a specific application scenario related to the uplink block chain transaction scheme based on the above-mentioned block chain service.
1. Logistics service
Logistics warehousing is one of the most potential application fields of RFID, and UPS, DHL, Fedex and other international logistics are actively experimenting RFID technologies, so that the logistics technology can be applied to the improvement of logistics capacity in the future on a large scale. Specific services that can use the uplink block chain transaction scheme of the present application may include: cargo tracking, automatic information acquisition, warehousing management application, port application, postal packages, express delivery and the like in the logistics process. Under the service scenes, the block chain transaction uplink scheme can be adopted to process the logistics information so as to realize effective management and allocation of goods.
2. Traffic control system
Specific services that can use the uplink block chain transaction scheme of the present application include: taxi management, bus hub management, railway locomotive identification and the like, so as to carry out cochain storage on traffic management information.
3. Identity recognition
Specific services that can use the uplink block chain transaction scheme of the present application include: electronic passport items, second generation identity cards, student cards, and other various electronic documents.
4. Anti-counterfeiting method
Specific services that can use the uplink block chain transaction scheme of the present application include: the anti-counterfeiting of valuables (cigarettes, wine and medicines), tickets, and the like.
5. Asset management
Specific services that can use the uplink block chain transaction scheme of the present application include: valuables, large numbers of items with high similarity, or dangerous items, etc.
6. Food product
Specific services that can use the uplink block chain transaction scheme of the present application include: fruits, vegetables, fresh foods, medicines and the like. For example, tracing is implemented.
7. Information statistics
The inquiry software of the file informatization management platform transmits a statistical clearing signal, and the reader quickly reads the data information and the related storage information of the collected files and intelligently returns the acquired information and the information in the central information base for proofreading. If the files which cannot be matched are targeted, the manager uses the reader to perform field verification, and adjusts the system information and the field information, thereby completing the information statistics work.
8. Look-up application
When inquiring the file information, the file manager finds out the file number by the inquiry management platform, the system reads the data information in the central information base according to the file number, after checking, the file is transmitted out of the base, the intelligent file identification function module of the storage position management platform can find out the specific part stored by the file by combining the file number with the corresponding storage position number. After the manager sends out the file delivery signal, the indicator lamp on the storage site is immediately lighted. When the data is delivered out of the warehouse, the radio frequency identification reader feeds back the acquired information to the management platform, the manager checks again, and the delivered archive and the checked archive are checked to be the same and then delivered out of the warehouse. Moreover, the system will record the time of the information going out of the warehouse. If the feedback file is not matched with the query file, an alarm module in the safety management platform transmits abnormal early warning.
9. Safety control
The security control system can realize functions of timely monitoring and abnormal alarming of the archives so as to prevent the archives from being damaged and stolen. When the files are borrowed and returned, particularly the physical files are often used for exhibition, evaluation and inspection and the like, managers carefully inspect the returned files and verify the returned files with the information before the files are borrowed, and whether the files are damaged or lost or not can be timely found.
Next, taking identification as an example, the process of using the uplink block chain transaction scheme of the present application is briefly described. Specifically, a signature algorithm module and a private key storage module can be arranged in an 'identity card' chip serving as an electronic tag, or the signature algorithm and the private key can be directly written into the chip to enable the chip to become an independent block chain account. When the ID card is close to the certificate reader-writer, a transaction data can be constructed, the ID card completes the transaction signature, the signature is sent to the certificate reader-writer, and the signature is submitted to the block chain by the certificate reader-writer, so that the chain chaining processing of one transaction is completed. In the whole process, a main body (identity card) sending the transaction does not need to be connected with a network, so that a private key stored in the identity card is safe, a certificate reader-writer is not required to be centrally managed, the risk of leakage is effectively reduced, and meanwhile, the block chain transaction uplink submitted by RFID equipment is realized in various application scenes of combining the RFID and the block chain.
Example two
Another uplink block chain transaction method is further provided in an embodiment of the present specification, and as shown in fig. 3, the method includes:
step 302: the method comprises the following steps that a first terminal carries out identity recognition on a second terminal which is close to and can trigger transaction initiation, wherein the first terminal and the second terminal carry out message transmission through a communication link established by an RFID technology.
Step 304: after constructing a transaction related to the current service based on the identified identity information, the first terminal transmits the constructed transaction to the second terminal.
Step 306: and the second terminal signs the transaction and sends the signature to the first terminal.
Optionally, a private key and a signature algorithm corresponding to the second terminal are saved in a chip of the second terminal; the signing of the transaction by the second terminal specifically comprises:
and the second terminal signs the transaction by using the locally stored signature algorithm based on a corresponding private key.
Step 308: and the first terminal uploads the signed transaction to a block chain server for transaction uplink processing.
Optionally, the service using radio frequency identification RFID at least includes: identity recognition service, anti-counterfeiting verification service, asset management service, information management service, and security control service.
It should be understood that, in the second embodiment, the first terminal may be a terminal device having all functions of the electronic tag described in the first embodiment. The second terminal may be a terminal device having all the functions of the read/write apparatus described in the first embodiment. The first terminal and the second terminal can carry out RFID communication, the first terminal is not connected with a network, and the second terminal can directly connect with the network to upload data. Therefore, the first terminal can safely conduct transaction signature, the private key does not need to be leaked, and the security risk caused by the fact that the second terminal centrally trusts the private key is avoided.
EXAMPLE III
Referring to fig. 4, for a uplink block chain transaction system 400 provided by an embodiment of the present disclosure, the apparatus 400 may include:
a read-write device 402 and an electronic tag 404 establishing a communication link based on a Radio Frequency Identification (RFID) technology, and a block chain service node 406 establishing a communication link with the read-write device 402; wherein the content of the first and second substances,
the read-write device 402 identifies the electronic tag 404 which is close to and can trigger the initiation of the transaction;
after constructing a transaction related to the current service based on the identified identity information, the read-write device 402 sends the constructed transaction to the electronic tag 404;
the electronic tag 404 signs the transaction and sends the transaction to the read-write device 402;
the read/write device 402 uploads the signed transaction to the blockchain service node 406 for transaction uplink processing.
Optionally, as an embodiment, a private key and a signature algorithm corresponding to the electronic tag are stored in a chip of the electronic tag;
and when the electronic tag signs the transaction, the transaction is signed by using the locally stored signature algorithm based on the corresponding private key.
In a specific implementation manner of the embodiment of the present specification, when the read-write device performs identity identification on an electronic tag that triggers a transaction initiation, identification information that is stored in the electronic tag and can represent a unique identity of the electronic tag is read through an RFID technology.
In a specific implementation manner of the embodiment of the present specification, the read-write apparatus constructs a transaction related to the current service based on the identified identity information and the current service application type;
alternatively, the first and second electrodes may be,
and the read-write device cooperates with the electronic tag to construct a transaction related to the current service based on the identified identity information and the current service application type.
In a specific implementation manner of the embodiment of the present specification, the block chain service using radio frequency identification RFID at least includes:
identity recognition service, anti-counterfeiting verification service, asset management service, information management service, and security control service.
Through the technical scheme, a new block chain transaction uplink mode is provided, and in the scheme, the reading and writing device identifies the identity of the electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.
Example four
Referring to fig. 5, for a uplink block chain transaction system 500 provided by an embodiment of the present disclosure, the apparatus 500 may include:
a first terminal 502 and a second terminal 504 establishing communication links based on radio frequency identification, RFID, technology, and a blockchain server 506 establishing a communication link with the first terminal 502; wherein the content of the first and second substances,
the method comprises the steps that a first terminal 502 identifies a second terminal 504 which is close to and can trigger transaction initiation, wherein message transmission is carried out between the first terminal 502 and the second terminal 504 through a communication link established by an RFID technology;
after constructing a transaction related to the current service based on the identified identity information, the first terminal 502 transmits the constructed transaction to the second terminal 504;
the second terminal 504 signs the transaction and sends it to the first terminal 502;
the first terminal 502 uploads the signed transaction to the blockchain server 506 for uplink transaction processing.
Optionally, as an embodiment, a chip of the second terminal 504 stores a private key and a signature algorithm corresponding to the second terminal 504;
when the second terminal 504 signs the transaction, the transaction is signed by using the locally stored signature algorithm based on the private key corresponding to the second terminal.
In a specific implementation manner of the embodiment of this specification, when the first terminal 502 identifies the second terminal 504 that triggers the initiation of the transaction, the identification information that is stored in the second terminal 504 and can represent the unique identity of the second terminal 504 is read by using an RFID technology.
In a specific implementation manner of the embodiment of this specification, the first terminal 502 constructs a transaction related to the current service based on the identified identity information and the current service application type;
alternatively, the first and second electrodes may be,
the first terminal 502 cooperates with the second terminal 504 to construct a transaction related to the current service based on the identified identity information and the current service application type.
In a specific implementation manner of the embodiment of the present specification, the block chain service using radio frequency identification RFID at least includes:
identity recognition service, anti-counterfeiting verification service, asset management service, information management service, and security control service.
Through the technical scheme, a new block chain transaction uplink mode is provided, and in the scheme, the reading and writing device identifies the identity of the electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.
EXAMPLE five
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Referring to fig. 6, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads a corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the electronic tag or the read-write device in the block chain uplink system on a logic level. And a processor for executing the program stored in the memory, and specifically for executing the method steps involved in each execution body.
The method performed by the apparatus under the system as disclosed in the embodiments shown in fig. 4 and fig. 5 in this specification can be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The methods, steps, and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may also execute the method shown in fig. 1 and fig. 3, and implement the functions of the corresponding apparatus in the embodiments shown in fig. 1 and fig. 3, which are not described herein again in this specification.
Of course, besides the software implementation, the electronic device of the embodiment of the present disclosure does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Through the technical scheme, a new block chain transaction uplink mode is provided, and in the scheme, the reading and writing device identifies the identity of the electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.
EXAMPLE six
Embodiments of the present description also propose a computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a portable electronic device comprising a plurality of application programs, are capable of causing the portable electronic device to perform the method of the embodiments shown in fig. 1 and 3, and in particular to perform the method steps involved in executing the subject accordingly.
Through the technical scheme, a new block chain transaction uplink mode is provided, and in the scheme, the reading and writing device identifies the identity of the electronic tag; after the transaction related to the service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag for signature; and returning to the read-write device for transaction uploading after the signature is completed. Because the electronic tag is not connected with the network, when the electronic tag is used as a transaction sending terminal and indirectly sends the signed transaction to a block chain scene, the private key stored in the electronic tag is relatively safe, so that the block chain transaction chaining submitted by RFID equipment is realized in various application scenes in which the RFID and the block chain are combined, and meanwhile, the risk of intensively hosting the private key is avoided.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present specification shall be included in the protection scope of the present specification.
The system, apparatus, module or unit illustrated in one or more of the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with a certain functionality. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.

Claims (10)

1. A block chain transaction uplink method is applied to a block chain service system using Radio Frequency Identification (RFID), and the method comprises the following steps:
the read-write device carries out identity recognition on the electronic tag which is close to and can trigger the transaction initiation;
after a transaction related to the current service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag;
the electronic tag signs the transaction and sends the transaction to the read-write device;
and the read-write device uploads the signed transaction to a block chain service node for transaction chain linking processing.
2. The method according to claim 1, wherein a private key corresponding to the electronic tag and a signature algorithm are stored in a chip of the electronic tag;
the electronic tag signing the transaction specifically comprises:
the electronic tag signs the transaction by using the locally stored signature algorithm based on a corresponding private key.
3. The method according to claim 2, wherein the identification of the electronic tag that triggers the initiation of the transaction by the read/write device specifically comprises:
and the read-write device reads the identification information which is stored in the electronic tag and can represent the unique identity of the electronic tag through an RFID technology.
4. The method according to claim 1, wherein constructing the transaction related to the current service based on the identified identity information specifically comprises:
the read-write device constructs the transaction related to the current service based on the identified identity information and the current service application type;
alternatively, the first and second electrodes may be,
and the read-write device cooperates with the electronic tag to construct a transaction related to the current service based on the identified identity information and the current service application type.
5. The method according to any of claims 1-4, wherein the blockchain service using radio frequency identification RFID comprises at least:
identity recognition service, anti-counterfeiting verification service, asset management service, information management service, and security control service.
6. A block chain transaction uplink method is applied to a block chain service system using Radio Frequency Identification (RFID), and the method comprises the following steps:
the method comprises the following steps that a first terminal carries out identity recognition on a second terminal which is close to and can trigger transaction initiation, wherein message transmission is carried out between the first terminal and the second terminal through a communication link established by an RFID technology;
after constructing a transaction related to the current service based on the identified identity information, the first terminal sends the constructed transaction to the second terminal;
the second terminal signs the transaction and sends the signature to the first terminal;
and the first terminal uploads the signed transaction to a block chain server for transaction uplink processing.
7. The method of claim 6, wherein a private key and a signature algorithm corresponding to the second terminal are stored in a chip of the second terminal;
the signing of the transaction by the second terminal specifically comprises:
and the second terminal signs the transaction by using the locally stored signature algorithm based on a corresponding private key.
8. The method of claim 6, the service using Radio Frequency Identification (RFID) comprising at least:
identity recognition service, anti-counterfeiting verification service, asset management service, information management service, and security control service.
9. A blockchain uplink transaction system, the system comprising: the method comprises the steps that a read-write device and an electronic tag of a communication link are established based on a Radio Frequency Identification (RFID) technology, and a block chain service node of the communication link is established with the read-write device; wherein the content of the first and second substances,
the reading and writing device carries out identity recognition on the electronic tag which is close to and can trigger the transaction initiation;
after a transaction related to the current service is constructed based on the identified identity information, the read-write device sends the constructed transaction to the electronic tag;
the electronic tag signs the transaction and sends the transaction to the read-write device;
and the read-write device uploads the signed transaction to a block chain service node for transaction chain linking processing.
10. A blockchain uplink transaction system, the system comprising: the system comprises a first terminal, a second terminal and a block chain server, wherein the first terminal and the second terminal are used for establishing a communication link based on a Radio Frequency Identification (RFID) technology, and the block chain server is used for establishing a communication link with the first terminal; wherein the content of the first and second substances,
the method comprises the following steps that a first terminal carries out identity recognition on a second terminal which is close to and can trigger transaction initiation, wherein message transmission is carried out between the first terminal and the second terminal through a communication link established by an RFID technology;
after constructing a transaction related to the current service based on the identified identity information, the first terminal sends the constructed transaction to the second terminal;
the second terminal signs the transaction and sends the signature to the first terminal;
and the first terminal uploads the signed transaction to a block chain server for transaction uplink processing.
CN202011389509.1A 2020-12-01 2020-12-01 Block chain transaction uplink method and system Pending CN112600673A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011389509.1A CN112600673A (en) 2020-12-01 2020-12-01 Block chain transaction uplink method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011389509.1A CN112600673A (en) 2020-12-01 2020-12-01 Block chain transaction uplink method and system

Publications (1)

Publication Number Publication Date
CN112600673A true CN112600673A (en) 2021-04-02

Family

ID=75187685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011389509.1A Pending CN112600673A (en) 2020-12-01 2020-12-01 Block chain transaction uplink method and system

Country Status (1)

Country Link
CN (1) CN112600673A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120412A (en) * 2018-10-29 2019-01-01 马晶瑶 A kind of preservation of block chain key and exchange system based on smart card
US10523443B1 (en) * 2016-08-24 2019-12-31 Bruce Kleinman Devices, methods, and systems for cryptographic authentication and provenance of physical assets
CN111274831A (en) * 2020-04-24 2020-06-12 杭州趣链科技有限公司 Information circulation system, method, equipment and storage medium based on RFID
CN111342963A (en) * 2020-05-15 2020-06-26 支付宝(杭州)信息技术有限公司 Data uplink method, data storage method and device
CN111967820A (en) * 2020-08-11 2020-11-20 杭州溪塔科技有限公司 Pallet management method and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10523443B1 (en) * 2016-08-24 2019-12-31 Bruce Kleinman Devices, methods, and systems for cryptographic authentication and provenance of physical assets
CN109120412A (en) * 2018-10-29 2019-01-01 马晶瑶 A kind of preservation of block chain key and exchange system based on smart card
CN111274831A (en) * 2020-04-24 2020-06-12 杭州趣链科技有限公司 Information circulation system, method, equipment and storage medium based on RFID
CN111342963A (en) * 2020-05-15 2020-06-26 支付宝(杭州)信息技术有限公司 Data uplink method, data storage method and device
CN111967820A (en) * 2020-08-11 2020-11-20 杭州溪塔科技有限公司 Pallet management method and system based on block chain

Similar Documents

Publication Publication Date Title
CN109034583B (en) Abnormal transaction identification method and device and electronic equipment
CN111415158B (en) Wind control method and system based on block chain
CN112000730B (en) Tracing information writing and tracing information verification method and system based on block chain
CN111723943B (en) Multi-label-based federal learning method, device and system
CN107196842B (en) Method and device for realizing message anti-counterfeiting
CN110032882A (en) Card method and apparatus are deposited based on block chain
US11233830B2 (en) Systems and methods for point-to-point encryption compliance
CN111371559B (en) Material inventory data providing method, device and system based on block chain
CN101223531A (en) Verification of a product identifier
CN111382980A (en) Logistics management method, device, equipment and system based on block chain
CN112819617B (en) Data uplink method and device, electronic equipment and storage medium
US12026712B2 (en) Dynamic application selection based on contextual data
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN111737323B (en) Information query method and device based on block chain and electronic equipment
US20130246279A1 (en) External log storage in an asset storage and transfer system
US20180103019A1 (en) Method and system for authenticating a user based on location data
US20190066043A1 (en) Method and system for tracking products
CN112637222A (en) Request processing method and device
CN112600673A (en) Block chain transaction uplink method and system
US20160219436A1 (en) User verification
CN111461728B (en) Risk identification method, device and system
CN114925405A (en) Block chain-based digital seal verification method and device and electronic equipment
CN111274831B (en) Information circulation system, method, equipment and storage medium based on RFID
Guizani Security applications challenges of RFID technology and possible countermeasures
Souvignet et al. Payment card forensic analysis: From concepts to desktop and mobile analysis tools

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination