CN113222593B - Authorized big data transaction scheme based on intelligent contract and digital watermark - Google Patents
Authorized big data transaction scheme based on intelligent contract and digital watermark Download PDFInfo
- Publication number
- CN113222593B CN113222593B CN202110316445.0A CN202110316445A CN113222593B CN 113222593 B CN113222593 B CN 113222593B CN 202110316445 A CN202110316445 A CN 202110316445A CN 113222593 B CN113222593 B CN 113222593B
- Authority
- CN
- China
- Prior art keywords
- transaction
- buyer
- big data
- seller
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000004044 response Effects 0.000 claims abstract description 9
- 238000012795 verification Methods 0.000 claims description 10
- 238000000034 method Methods 0.000 claims description 8
- 239000000284 extract Substances 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000012856 packing Methods 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims 1
- 238000013500 data storage Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 abstract description 2
- 238000012545 processing Methods 0.000 abstract description 2
- 238000013461 design Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Marketing (AREA)
- Multimedia (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical fields of intelligent contracts, digital watermarks and blockchains and application thereof, in particular to a scheme for authorizing big data transaction based on the intelligent contracts and the digital watermarks; in the traditional data transaction market, the traditional transaction mode cannot ensure that data is not subjected to unauthorized transaction by a user, if one large data is subjected to frequent unauthorized transaction, the problems of data value shrinkage and data abuse can occur, and thus the data transaction market is greatly and negatively influenced; moreover, all transaction data are transacted through a big data exchange, so that the big data transaction is subjected to the problem of overlarge data storage burden; in order to solve the problems, the invention provides an authorized big data transaction scheme based on intelligent contracts and digital watermarks, so as to prevent unauthorized transaction of big data; according to the scheme, the watermark embedded big data with strong robustness is generated through a digital watermarking technology and is used as a big data identifier, so that the identifier is not easy to tamper with or damage by an attacker. The large data seller deploys the intelligent contract on the blockchain, and sets response conditions by initializing parameters of the intelligent contract template, so that automatic transaction processing is realized, the efficiency of large data transaction and the transparency of the transaction are greatly improved, and copyright of large data is protected while large data transaction is promoted.
Description
Technical Field
The invention relates to the technical fields of intelligent contracts, digital watermarks and blockchains and application thereof, and mainly constructs a scheme for authorizing big data transaction based on the intelligent contracts and the digital watermarks. And the copyright of the big data is protected while the big data transaction is promoted.
Background
Current state of industry technology and defects, reasons: the traditional data transaction framework cannot ensure that big data is not subjected to unauthorized transaction by a buyer after being transacted, a monitoring mechanism and a traceability mechanism for the transacted big data are not provided, and once the big data is subjected to continuous unauthorized transaction, the data value is reduced and the data are abused, so that the loss brought to a data source is irreversible. And the negative effects of data abuse caused by big data unauthorized transactions on the big data transaction market are also not visible.
Competitor product solutions and published patents are known:
big data transaction method and system
Applicants: communication stock Limited of Zhongxing
Main classification number: G06Q30/06 (2012.01) I
Classification number: G06Q30/06 (2012.01) I
Disclosure of Invention
S1, designing an intelligent contract template SCT and a reward and punishment mechanism RP: the intelligent contract template SCT mainly comprises three modules, namely a transaction module, wherein the module is responsible for realizing a transaction flow; secondly, a hash module provides a hash algorithm G1 to verify the integrity of the data; thirdly, the report response module can receive report information R from the buyer E2, and all other users can verify the report; in addition, the reward and punishment mechanism RP requires the seller E1 to pay a guarantee SD before the transaction, and if the transaction is illegal, the seller E1 reports and verifies the transaction, and the seller E1 refunds and pays the guarantee to the buyer E2; s2 vendor E1 initializes the smart contract SC: the seller E1 firstly generates a watermark W and embeds the watermark W into big data D1 to be transacted, and then the seller E1 encrypts big data D2 embedded with the watermark W by using a secret key K1 of the seller E1 to obtain encrypted big data D3 embedded with the watermark; the seller E1 calculates a hash value H2 of the big data D3 of the hash value H1 of the key K1 using the hash algorithm G1 provided in the smart contract, and uploads the calculated value into the smart contract SC; after the completion, the seller E1 stores the big data D3 into the address AD, and uploads the amount N1 required by the transaction, the address AD, the hash value H1 of the key K1 and the hash value H3 of the big data D3 into the intelligent contract, and then deploys the contract on the blockchain BC; finally, the seller E1 pays the deposit N2 to the intelligent contract SC; in addition, the response time T of each step of the transaction is set in the intelligent contract template SCT, and if a certain step of the transaction is not completed within T, the transaction is automatically terminated;
the BLOCK data structure in the blockchain BC1 includes:
a1 difficulty;
a2 Gas limitation;
a3 The usage amount of Gas;
a4, miners packing the blocks;
a5, numbering the blocks;
a6, hash value of the block data of the block;
a7 the size of the block;
transactions recorded in block A8;
a9, merkleRoot values of all transactions;
a10, generating a timestamp of the block;
in the above steps, the big data watermark information W is generated by the buyer according to the watermark generation algorithm G2, and is embedded into the big data D1 according to the big data watermark embedding algorithm G3 to obtain the big data D2, and the big data D2 embedded with the watermark is encrypted by the key K1 to obtain the encrypted big data D3 embedded with the watermark, and the specific parameters and algorithms required by the generated watermark W are:
W=Hash(D3)||Sig(Hash(D3),PriK1),
wherein Hash refers to a Hash algorithm G1 stored in the smart contract SC, D3 refers to encrypted big data embedded with a watermark, sig refers to a private key PriK1 signature of the watermark using a vendor E1; in the above steps, the buyer E2 can obtain more information from the watermark by different watermark types, and the existing transaction scheme can be expanded according to different watermark types and corresponding meanings; for example, big data containing a type-one watermark may be traded with multiple times; big data containing type two watermarks can only be traded once; big data containing type three watermarks can only be traded at specific time; big data containing type four watermarks can only be traded thirty days after purchase; the parameters and algorithms specifically required are:
W=Hash(D3)||Sig(Hash(D3)||Type,PriK1),
wherein, hash refers to the Hash algorithm G1 stored in the smart contract SC, D3 refers to the encrypted big data embedded with the watermark, type is the Type embedded with the watermark, sig refers to the private key PriK1 signature of the watermark using the vendor E1; s3, buyer E2 initiates a transaction: the buyer E2 accesses and downloads the big data D3 uploaded by the seller according to the address AD stored in the intelligent contract SC provided by the seller E1, and the buyer E2 can verify whether the data D3 uploaded by the seller E is consistent with the claim of the data D3 according to the hash algorithm provided by the intelligent contract SC; if the result obtained by E2 calculation is consistent with H2 in the intelligent contract SC, a transaction can be initiated; if not, the seller B can send a report R to the intelligent contract SC; if the verification is correct, the buyer E2 continues to conduct the transaction, the buyer E2 pays the amount N1 required by the transaction to the intelligent contract, and meanwhile, the public key PubK2 of the buyer E2 is uploaded to the intelligent contract SC; s4, the seller E1 confirms the transaction: after the seller E1 confirms that the amount N1 paid by the buyer and the public key PubK2 of the buyer E2 are received, the seller E1 encrypts the key K using the public key PubK2 of the buyer to obtain an encrypted key EnK; vendor E1 then uploads the encrypted key EnK to the smart contract; s5, the buyer E2 checks the commodity provided by the seller E1: the buyer E2 downloads the encryption key EnK uploaded by the seller, and decrypts the encryption key by using the private key Prik2 of the buyer E2 to obtain K1; the buyer E2 calculates a hash value H3 of the key K1 according to a hash algorithm G1 provided in the intelligent contract SC, if H3 is equal to H1 in the intelligent contract, the key uploaded by the seller is proved to be correct, the next verification can be carried out, otherwise, the buyer E2 sends a report R to the intelligent contract SC; if the verification is continued, the buyer E2 decrypts the big data D3 by using the obtained secret key K1 to obtain big data D2 containing the watermark; the buyer E2 extracts the watermark in the D2, if a plurality of watermarks or watermark confusion occurs, the large data D2 is proved to be the data which is not needed by the buyer E2 or the data which is transacted for a plurality of times, and the buyer E2 can submit report R to the intelligent contract SC at the moment; s6, transaction results: if the transaction is normally performed, the transaction is successfully completed in each step and the time is within T; if a certain step is not completed within the time T in the transaction process, automatically ending the transaction, and if the buyer E2 has paid, returning the payment paid by the buyer E2; if the buyer E2 finds that the data D3 sold by the seller E1 is illegal in the transaction process, the buyer E2 may send report information R to the intelligent contract SC, and the intelligent contract SC verifies the report information R, if the verification report is correct, the intelligent contract SC refunds the amount N1 to the buyer E2, and pays the deposit N2 of the seller E1 to the buyer E2 together, and if the verification report is incorrect, the intelligent contract does not respond.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a diagram of a smart contract template design;
FIG. 2 is a vendor parameter initialization diagram;
FIG. 3 is a transaction flow diagram;
fig. 4 is a flow chart of reporting responses.
Detailed Description
(1) Intelligent contract template design
The intelligent contract template design mainly comprises three modules.
The first module, the transaction module. The transaction module is mainly responsible for controlling the transaction flow and specifically comprises an uploading parameter module, a parameter obtaining module, a transaction response module and the like. Wherein the parameters mainly comprise: transaction amount N1, deposit amount N2, key K1, time parameter T big data address AD, etc.
The second module, the hash module. The hash module is mainly responsible for storing hash values and providing a hash algorithm G1, except that the seller E1 can upload hash values H1 of large data and hash values H2 of keys, and further both the buyer E1 and the seller E2 of the transaction can query the hash values therefrom and calculate the hash values using the hash algorithm G1 to ensure the integrity of the data and the credibility of the transaction.
And a third module, a reporting module. The reporting module is mainly responsible for responding to the reporting information R, and if the buyer E2 finds that the seller E1 has fraud during the transaction, for example, the buyer E2 cannot obtain correct data or extracts multiple watermarks from the data, in this case, the buyer E2 needs to submit the key K1 of the seller E1 to the smart contract SC as the reporting evidence. If the transaction is deemed to be a violation, the smart contract SC refunds the buyer E2 and pays the buyer E2 the seller's deposit N2; if there is no violation in the transaction, the smart contract does not respond any further.
(2) The smart contract initializing seller E1 initializes the contract by modifying parameters of the smart contract SC. Specific parameters that the seller E1 needs to set are: the transaction amount N1, the deposit amount N2 (N1 or more is necessary), the address where the big data D3 is stored, the hash value H1 of the big data D3, the hash value H2 of the buyer key K1, the payment address AP, and the response time T per transaction step (T has a range limit, cannot be too long or too short). The initialization process of some parameters is detailed in the transaction flow, and other parameters not given are already completed at the beginning of initialization.
(3) Transaction flow
First, the method includes the steps of. The seller E1 generates digital watermark information W by a specific method of w=hash (D3) |sig (Hash (D3), priK 1), where Hash refers to a Hash algorithm G1 stored in the smart contract SC, D3 refers to encrypted big data embedded with the watermark, and Sig refers to a signature of the watermark using a private key PriK1 of the seller E1. After the watermark W is generated, the seller E1 embeds the watermark W into the big data D1 by the watermark embedding algorithm G2, to obtain the big data D2. After completion, the seller E1 encrypts the big data D2 using the key K1 to obtain the big data D3, and uploads the big data D3 to the address AD for storage. The seller E1 calculates the hash value H1 of the key K1 and the hash value H2 of the big data D3 according to the hash algorithm G1 in the smart contract SC, after which the seller E1 uploads the transaction amount N1, the paid address AP, the hash value H1 of the key, the hash value H2 of the big data D3, and the data storage address AD into the smart contract SC. After the upload is completed, the buyer E2 can browse details of the transaction created by the seller E1 through the smart contract SC. If the buyer E2 wants to initiate a transaction, it can first access the data address AD in the smart contract SC and download the watermark embedded encrypted big data D3. After the downloading is completed, the buyer E2 may calculate a hash value H3 of the downloaded big data D3 according to the hash algorithm G1 in the smart contract SC. If H3 is equal to H2, proving that the data uploaded by the seller is the data declared by the seller, and the buyer E2 can continue the transaction; if H3 is not equal to H2, the buyer E2 may choose not to transact or send reporting information R to the smart contract SC for processing. If the transaction continues without violation, buyer E2 may initiate the transaction. The buyer E2 needs to pay the amount N1 to the smart contract SC while sending its own public key PubK2 to the smart contract SC. When the seller E1 confirms receipt of the transaction funds of the amount N1 transmitted by the buyer E2 and the buyer's public key PubK2, the seller E1 encrypts its own key K1 using the buyer's public key PubK2 to obtain an encrypted key EnK, and then the seller E1 uploads the encrypted key EnK to the smart contract SC. After the seller E1 uploads the encrypted key EnK to the smart contract SC, the buyer E2 may download the encrypted key EnK from the smart contract SC and decrypt the encrypted key EnK with its own public key PubK2 to obtain the seller's key K1. After the buyer E2 obtains the key K1, the downloaded encrypted big data D3 embedded with the watermark is decrypted, and the big data D2 embedded with the watermark is obtained. The watermark information may be extracted from the watermark embedded big data D2 by the buyer E2. If the watermark information is correct, proving that the big data transaction accords with the specification; if the watermark information is disordered or a plurality of watermarks are extracted, the seller E1 is indicated to have illegal transaction behaviors, and the buyer E2 can submit the reporting information R to the intelligent contract SC and upload the reporting evidence, namely the secret key K1 received by the buyer E2. If the transaction is successful, the smart contract SC sends the received transaction amount N1 of the buyer E2 to a payment address AP preset to the seller E1, and the transaction ends.
(4) Reporting response flow
If the smart contract SC receives a report R from the buyer E2, then the other users U can read the smart contract SC and verify whether the report R of the buyer E2 is authentic. If the other user U verifies that the report is true, the intelligent contract SC refunds to the buyer E2 and sends the guarantee N2 to the buyer E2; if the other user U verifies that the report is not authentic, the intelligent contract SC does not respond to the report information R of the buyer E2.
Claims (5)
1. A scheme for authorizing big data transactions based on smart contracts and digital watermarks, comprising the steps of:
s1, designing an intelligent contract template SCT and a reward and punishment mechanism RP: the intelligent contract template SCT mainly comprises three modules, namely a transaction module, wherein the module is responsible for realizing a transaction flow; secondly, a hash module provides a hash algorithm G1 to verify the integrity of the data; the report response module receives report information R from the buyer E2, and all other users can verify the report; in addition, the reward and punishment mechanism RP requires the seller E1 to pay a guarantee SD before the transaction, and if the transaction is illegal, the seller E1 reports and verifies the transaction, and the seller E1 refunds and pays the guarantee to the buyer E2;
s2 vendor E1 initializes the smart contract SC: the seller E1 firstly generates a watermark W and embeds the watermark W into big data D1 to be transacted, and then the seller E1 encrypts big data D2 embedded with the watermark W by using a secret key K1 of the seller E1 to obtain encrypted big data D3 embedded with the watermark; the seller E1 calculates a hash value H2 of the big data D3 of the hash value H1 of the key K1 using the hash algorithm G1 provided in the smart contract, and uploads the calculated value into the smart contract SC; after the completion, the seller E1 stores the big data D3 into the address AD, and uploads the amount N1 required by the transaction, the address AD, the hash value H1 of the key K1 and the hash value H3 of the big data D3 into the intelligent contract, and then deploys the contract on the blockchain BC; finally, the seller E1 pays the deposit N2 to the intelligent contract SC; in addition, the response time T of each step of the transaction is set in the intelligent contract template SCT, and if a certain step of the transaction is not completed within T, the transaction is automatically terminated;
the BLOCK data structure in the blockchain BC includes:
a1 difficulty;
a2 Gas limitation;
a3 The usage amount of Gas;
a4, miners packing the blocks;
a5, numbering the blocks;
a6, hash value of the block data of the block;
a7 the size of the block;
transactions recorded in block A8;
a9, merkleRoot values of all transactions;
a10, generating a timestamp of the block;
in the above steps, the big data watermark information W is generated by the buyer according to the watermark generation algorithm G2, and is embedded into the big data D1 according to the big data watermark embedding algorithm G3 to obtain the big data D2, and the big data D2 embedded with the watermark is encrypted by the key K1 to obtain the encrypted big data D3 embedded with the watermark, and the specific parameters and algorithms required by the generated watermark W are
W=Hash(D3)||Sig(Hash(D3),PriK1),
Wherein Hash refers to a Hash algorithm G1 stored in the smart contract SC, D3 refers to encrypted big data embedded with a watermark, sig refers to a private key PriK1 signature of the watermark using a vendor E1; in the above steps, the buyer E2 obtains more information from the watermark by different watermark types, and expands the existing transaction scheme according to the different watermark types and corresponding meanings; big data containing a type-one watermark is traded multiple times; big data containing type two watermarks can only be traded once; big data containing type three watermarks can only be traded at specific time; big data containing type four watermarks can only be traded thirty days after purchase; the parameters and algorithms specifically required are:
W=Hash(D3)||Sig(Hash(D3)||Type,PriK1),
wherein, hash refers to the Hash algorithm G1 stored in the smart contract SC, D3 refers to the encrypted big data embedded with the watermark, type is the Type embedded with the watermark, sig refers to the private key PriK1 signature of the watermark using the vendor E1;
s3, the buyer E2 initiates a transaction;
s4, the seller E1 confirms the transaction;
s5, the buyer E2 checks the commodity provided by the seller E1;
s6, transaction results.
2. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S3 buyer E2 initiates a transaction: the buyer E2 accesses and downloads big data D3 uploaded by the seller according to the address AD stored in the intelligent contract SC provided by the seller E1, and the buyer E2 verifies whether the data D3 uploaded by the seller E1 is consistent with the claim of the data D3 according to the hash algorithm provided by the intelligent contract SC; if the result obtained by E2 calculation is consistent with H2 in the intelligent contract SC, initiating transaction; if the intelligent contract SC is inconsistent, the seller B sends a report R to the intelligent contract SC; if the verification is correct, the buyer E2 proceeds with the transaction, and the buyer E2 pays the amount N1 required for the transaction to the smart contract, and at the same time uploads the public key PubK2 of the buyer to the smart contract SC.
3. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S4 seller E1 confirms the transaction: after the seller E1 confirms that the amount N1 paid by the buyer and the public key PubK2 of the buyer E2 are received, the seller E1 encrypts the key K using the public key PubK2 of the buyer to obtain an encrypted key EnK; vendor E1 then uploads the encrypted key EnK to the smart contract.
4. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S5 buyer E2 verifies the goods offered by the seller E1: the buyer E2 downloads the encryption key EnK uploaded by the seller, and decrypts the encryption key by using the private key Prik2 of the buyer E2 to obtain K1; the buyer E2 calculates a hash value H3 of the key K1 according to a hash algorithm G1 provided in the intelligent contract SC, if H3 is equal to H1 in the intelligent contract, the key uploaded by the seller is proved to be correct, the next verification is carried out, and otherwise, the buyer E2 sends a report R to the intelligent contract SC; if the verification is continued, the buyer E2 decrypts the big data D3 by using the obtained secret key K1 to obtain big data D2 containing the watermark; the buyer E2 extracts the watermark in D2, and if multiple watermarks or watermark confusion occurs, the big data D2 is proved to be data required by the non-buyer E2 or data which are transacted for multiple times, and at this time, the buyer E2 submits report R to the intelligent contract SC.
5. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S6 transaction result: if the transaction is normally performed, the transaction is successfully completed in each step and the time is within T; if a certain step is not completed within the time T in the transaction process, automatically ending the transaction, and if the buyer E2 has paid, returning the payment paid by the buyer E2; if the buyer E2 finds that the data D3 sold by the seller E1 is illegal in the transaction process, the buyer E2 sends report information R to the intelligent contract SC, the intelligent contract SC verifies the report information R by all members in the network, if the verification report is correct, the intelligent contract SC refunds the amount N1 to the buyer E2, and pays the deposit N2 of the seller E1 to the buyer E2 together, and if the verification report is incorrect, the intelligent contract does not respond.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110316445.0A CN113222593B (en) | 2021-03-24 | 2021-03-24 | Authorized big data transaction scheme based on intelligent contract and digital watermark |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110316445.0A CN113222593B (en) | 2021-03-24 | 2021-03-24 | Authorized big data transaction scheme based on intelligent contract and digital watermark |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113222593A CN113222593A (en) | 2021-08-06 |
CN113222593B true CN113222593B (en) | 2024-03-15 |
Family
ID=77084076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110316445.0A Active CN113222593B (en) | 2021-03-24 | 2021-03-24 | Authorized big data transaction scheme based on intelligent contract and digital watermark |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113222593B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114418578A (en) * | 2022-03-30 | 2022-04-29 | 北京溪塔科技有限公司 | Block chain account risk query method and device |
CN117454433B (en) * | 2023-12-22 | 2024-02-23 | 北京天润基业科技发展股份有限公司 | Transaction processing method and device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20160076184A (en) * | 2014-12-22 | 2016-06-30 | (주)파츠스트라이크 | Parts brokerage system with changing deposit amount depending on the reports of defective parts |
CN110188137A (en) * | 2019-04-19 | 2019-08-30 | 杭州电子科技大学 | A kind of block chain common recognition mechanism based on sincerity |
CN110298661A (en) * | 2019-07-01 | 2019-10-01 | 贵州大学 | Big data Secure Fair based on intelligent contract exchanges method |
CN110428351A (en) * | 2019-07-29 | 2019-11-08 | 电子科技大学 | Semi vehicle violation based on block chain reports method |
CN111161017A (en) * | 2019-12-10 | 2020-05-15 | 北京航天云路有限公司 | Cloud marketing system and method based on mobile terminal and block chain |
CN111369248A (en) * | 2020-03-03 | 2020-07-03 | 南京大学 | Digital product safe transaction method and system based on block chain technology |
KR20200104590A (en) * | 2019-02-27 | 2020-09-04 | 주식회사 노다멘 | System for Dealing Visual Art in Digital Contents based on BlockChain |
EP3712798A1 (en) * | 2019-03-21 | 2020-09-23 | Thales | Distributed registers for managing the life cycle of data in aeronautics |
CN112016520A (en) * | 2020-09-15 | 2020-12-01 | 平安国际智慧城市科技股份有限公司 | AI-based traffic violation voucher generation method, device, terminal and storage medium |
CN112464178A (en) * | 2020-09-27 | 2021-03-09 | 中国科学技术大学苏州研究院 | Data transaction copyright protection method based on block chain and homomorphic encryption |
-
2021
- 2021-03-24 CN CN202110316445.0A patent/CN113222593B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20160076184A (en) * | 2014-12-22 | 2016-06-30 | (주)파츠스트라이크 | Parts brokerage system with changing deposit amount depending on the reports of defective parts |
KR20200104590A (en) * | 2019-02-27 | 2020-09-04 | 주식회사 노다멘 | System for Dealing Visual Art in Digital Contents based on BlockChain |
EP3712798A1 (en) * | 2019-03-21 | 2020-09-23 | Thales | Distributed registers for managing the life cycle of data in aeronautics |
CN110188137A (en) * | 2019-04-19 | 2019-08-30 | 杭州电子科技大学 | A kind of block chain common recognition mechanism based on sincerity |
CN110298661A (en) * | 2019-07-01 | 2019-10-01 | 贵州大学 | Big data Secure Fair based on intelligent contract exchanges method |
CN110428351A (en) * | 2019-07-29 | 2019-11-08 | 电子科技大学 | Semi vehicle violation based on block chain reports method |
CN111161017A (en) * | 2019-12-10 | 2020-05-15 | 北京航天云路有限公司 | Cloud marketing system and method based on mobile terminal and block chain |
CN111369248A (en) * | 2020-03-03 | 2020-07-03 | 南京大学 | Digital product safe transaction method and system based on block chain technology |
CN112016520A (en) * | 2020-09-15 | 2020-12-01 | 平安国际智慧城市科技股份有限公司 | AI-based traffic violation voucher generation method, device, terminal and storage medium |
CN112464178A (en) * | 2020-09-27 | 2021-03-09 | 中国科学技术大学苏州研究院 | Data transaction copyright protection method based on block chain and homomorphic encryption |
Non-Patent Citations (2)
Title |
---|
区块链在数字版权领域的应用;刘宗媛;《网络空间安全》;全文 * |
基于信誉度的主从多链区块链共识机制;刘昊哲;李莎莎;吕伟龙;魏松杰;;南京理工大学学报(03);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113222593A (en) | 2021-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109544160B (en) | Transaction authenticity verification method and system based on block chain and intelligent contract | |
CN107798650B (en) | Digital asset infringement judgment method and device based on block chain | |
KR102355550B1 (en) | Method, apparatus and system for converting real assets to digital assets based on blockchain | |
CN109376504B (en) | Picture privacy protection method based on block chain technology | |
WO2020211462A1 (en) | Blockchain-based service data chaining method and system | |
US4658093A (en) | Software distribution system | |
CN111538784B (en) | Digital asset transaction method, device and storage medium based on blockchain | |
CN110135819B (en) | Block chain-based third-party trusted data transaction system and method | |
US7099479B1 (en) | Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method | |
CN109697365B (en) | Information processing method, block chain node and electronic equipment | |
CN110766406B (en) | Resource transfer method, resource transfer device, storage medium and electronic equipment | |
CN111027028A (en) | Copyright data processing method and device based on intelligent contract | |
CN109657424B (en) | Remote sensing result copyright management method based on block chain | |
CN111951106B (en) | Data transaction system and method based on blockchain intelligent contract technology | |
US20020010684A1 (en) | Systems, methods and devices for trusted transactions | |
CN113222593B (en) | Authorized big data transaction scheme based on intelligent contract and digital watermark | |
EP4050542B1 (en) | Blockchain-based data processing method and apparatus, and device and readable storage medium | |
CN111563823B (en) | Network work copyright transaction processing method, device and system based on blockchain | |
KR20010052796A (en) | Information processing device and method, and providing medium | |
CN110570313A (en) | data transaction method, data transaction device and system based on block chain | |
CN112862477B (en) | Digital commodity atomic transaction method and system based on blockchain | |
JP2000124890A (en) | Device and method for information processing, device and method for management, information use system, provision medium and external storage medium | |
CN113409144B (en) | Blockchain data transaction method with privacy protection function | |
CN113283957B (en) | Entity product transaction method based on blockchain | |
WO2001043026A1 (en) | Systems, methods and devices for trusted transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |