CN113222593B - Authorized big data transaction scheme based on intelligent contract and digital watermark - Google Patents

Authorized big data transaction scheme based on intelligent contract and digital watermark Download PDF

Info

Publication number
CN113222593B
CN113222593B CN202110316445.0A CN202110316445A CN113222593B CN 113222593 B CN113222593 B CN 113222593B CN 202110316445 A CN202110316445 A CN 202110316445A CN 113222593 B CN113222593 B CN 113222593B
Authority
CN
China
Prior art keywords
transaction
buyer
big data
seller
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110316445.0A
Other languages
Chinese (zh)
Other versions
CN113222593A (en
Inventor
陈玉玲
彭长根
任晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou University
Original Assignee
Guizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou University filed Critical Guizhou University
Priority to CN202110316445.0A priority Critical patent/CN113222593B/en
Publication of CN113222593A publication Critical patent/CN113222593A/en
Application granted granted Critical
Publication of CN113222593B publication Critical patent/CN113222593B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Multimedia (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical fields of intelligent contracts, digital watermarks and blockchains and application thereof, in particular to a scheme for authorizing big data transaction based on the intelligent contracts and the digital watermarks; in the traditional data transaction market, the traditional transaction mode cannot ensure that data is not subjected to unauthorized transaction by a user, if one large data is subjected to frequent unauthorized transaction, the problems of data value shrinkage and data abuse can occur, and thus the data transaction market is greatly and negatively influenced; moreover, all transaction data are transacted through a big data exchange, so that the big data transaction is subjected to the problem of overlarge data storage burden; in order to solve the problems, the invention provides an authorized big data transaction scheme based on intelligent contracts and digital watermarks, so as to prevent unauthorized transaction of big data; according to the scheme, the watermark embedded big data with strong robustness is generated through a digital watermarking technology and is used as a big data identifier, so that the identifier is not easy to tamper with or damage by an attacker. The large data seller deploys the intelligent contract on the blockchain, and sets response conditions by initializing parameters of the intelligent contract template, so that automatic transaction processing is realized, the efficiency of large data transaction and the transparency of the transaction are greatly improved, and copyright of large data is protected while large data transaction is promoted.

Description

Authorized big data transaction scheme based on intelligent contract and digital watermark
Technical Field
The invention relates to the technical fields of intelligent contracts, digital watermarks and blockchains and application thereof, and mainly constructs a scheme for authorizing big data transaction based on the intelligent contracts and the digital watermarks. And the copyright of the big data is protected while the big data transaction is promoted.
Background
Current state of industry technology and defects, reasons: the traditional data transaction framework cannot ensure that big data is not subjected to unauthorized transaction by a buyer after being transacted, a monitoring mechanism and a traceability mechanism for the transacted big data are not provided, and once the big data is subjected to continuous unauthorized transaction, the data value is reduced and the data are abused, so that the loss brought to a data source is irreversible. And the negative effects of data abuse caused by big data unauthorized transactions on the big data transaction market are also not visible.
Competitor product solutions and published patents are known:
big data transaction method and system
Applicants: communication stock Limited of Zhongxing
Main classification number: G06Q30/06 (2012.01) I
Classification number: G06Q30/06 (2012.01) I
Disclosure of Invention
S1, designing an intelligent contract template SCT and a reward and punishment mechanism RP: the intelligent contract template SCT mainly comprises three modules, namely a transaction module, wherein the module is responsible for realizing a transaction flow; secondly, a hash module provides a hash algorithm G1 to verify the integrity of the data; thirdly, the report response module can receive report information R from the buyer E2, and all other users can verify the report; in addition, the reward and punishment mechanism RP requires the seller E1 to pay a guarantee SD before the transaction, and if the transaction is illegal, the seller E1 reports and verifies the transaction, and the seller E1 refunds and pays the guarantee to the buyer E2; s2 vendor E1 initializes the smart contract SC: the seller E1 firstly generates a watermark W and embeds the watermark W into big data D1 to be transacted, and then the seller E1 encrypts big data D2 embedded with the watermark W by using a secret key K1 of the seller E1 to obtain encrypted big data D3 embedded with the watermark; the seller E1 calculates a hash value H2 of the big data D3 of the hash value H1 of the key K1 using the hash algorithm G1 provided in the smart contract, and uploads the calculated value into the smart contract SC; after the completion, the seller E1 stores the big data D3 into the address AD, and uploads the amount N1 required by the transaction, the address AD, the hash value H1 of the key K1 and the hash value H3 of the big data D3 into the intelligent contract, and then deploys the contract on the blockchain BC; finally, the seller E1 pays the deposit N2 to the intelligent contract SC; in addition, the response time T of each step of the transaction is set in the intelligent contract template SCT, and if a certain step of the transaction is not completed within T, the transaction is automatically terminated;
the BLOCK data structure in the blockchain BC1 includes:
a1 difficulty;
a2 Gas limitation;
a3 The usage amount of Gas;
a4, miners packing the blocks;
a5, numbering the blocks;
a6, hash value of the block data of the block;
a7 the size of the block;
transactions recorded in block A8;
a9, merkleRoot values of all transactions;
a10, generating a timestamp of the block;
in the above steps, the big data watermark information W is generated by the buyer according to the watermark generation algorithm G2, and is embedded into the big data D1 according to the big data watermark embedding algorithm G3 to obtain the big data D2, and the big data D2 embedded with the watermark is encrypted by the key K1 to obtain the encrypted big data D3 embedded with the watermark, and the specific parameters and algorithms required by the generated watermark W are:
W=Hash(D3)||Sig(Hash(D3),PriK1),
wherein Hash refers to a Hash algorithm G1 stored in the smart contract SC, D3 refers to encrypted big data embedded with a watermark, sig refers to a private key PriK1 signature of the watermark using a vendor E1; in the above steps, the buyer E2 can obtain more information from the watermark by different watermark types, and the existing transaction scheme can be expanded according to different watermark types and corresponding meanings; for example, big data containing a type-one watermark may be traded with multiple times; big data containing type two watermarks can only be traded once; big data containing type three watermarks can only be traded at specific time; big data containing type four watermarks can only be traded thirty days after purchase; the parameters and algorithms specifically required are:
W=Hash(D3)||Sig(Hash(D3)||Type,PriK1),
wherein, hash refers to the Hash algorithm G1 stored in the smart contract SC, D3 refers to the encrypted big data embedded with the watermark, type is the Type embedded with the watermark, sig refers to the private key PriK1 signature of the watermark using the vendor E1; s3, buyer E2 initiates a transaction: the buyer E2 accesses and downloads the big data D3 uploaded by the seller according to the address AD stored in the intelligent contract SC provided by the seller E1, and the buyer E2 can verify whether the data D3 uploaded by the seller E is consistent with the claim of the data D3 according to the hash algorithm provided by the intelligent contract SC; if the result obtained by E2 calculation is consistent with H2 in the intelligent contract SC, a transaction can be initiated; if not, the seller B can send a report R to the intelligent contract SC; if the verification is correct, the buyer E2 continues to conduct the transaction, the buyer E2 pays the amount N1 required by the transaction to the intelligent contract, and meanwhile, the public key PubK2 of the buyer E2 is uploaded to the intelligent contract SC; s4, the seller E1 confirms the transaction: after the seller E1 confirms that the amount N1 paid by the buyer and the public key PubK2 of the buyer E2 are received, the seller E1 encrypts the key K using the public key PubK2 of the buyer to obtain an encrypted key EnK; vendor E1 then uploads the encrypted key EnK to the smart contract; s5, the buyer E2 checks the commodity provided by the seller E1: the buyer E2 downloads the encryption key EnK uploaded by the seller, and decrypts the encryption key by using the private key Prik2 of the buyer E2 to obtain K1; the buyer E2 calculates a hash value H3 of the key K1 according to a hash algorithm G1 provided in the intelligent contract SC, if H3 is equal to H1 in the intelligent contract, the key uploaded by the seller is proved to be correct, the next verification can be carried out, otherwise, the buyer E2 sends a report R to the intelligent contract SC; if the verification is continued, the buyer E2 decrypts the big data D3 by using the obtained secret key K1 to obtain big data D2 containing the watermark; the buyer E2 extracts the watermark in the D2, if a plurality of watermarks or watermark confusion occurs, the large data D2 is proved to be the data which is not needed by the buyer E2 or the data which is transacted for a plurality of times, and the buyer E2 can submit report R to the intelligent contract SC at the moment; s6, transaction results: if the transaction is normally performed, the transaction is successfully completed in each step and the time is within T; if a certain step is not completed within the time T in the transaction process, automatically ending the transaction, and if the buyer E2 has paid, returning the payment paid by the buyer E2; if the buyer E2 finds that the data D3 sold by the seller E1 is illegal in the transaction process, the buyer E2 may send report information R to the intelligent contract SC, and the intelligent contract SC verifies the report information R, if the verification report is correct, the intelligent contract SC refunds the amount N1 to the buyer E2, and pays the deposit N2 of the seller E1 to the buyer E2 together, and if the verification report is incorrect, the intelligent contract does not respond.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a diagram of a smart contract template design;
FIG. 2 is a vendor parameter initialization diagram;
FIG. 3 is a transaction flow diagram;
fig. 4 is a flow chart of reporting responses.
Detailed Description
(1) Intelligent contract template design
The intelligent contract template design mainly comprises three modules.
The first module, the transaction module. The transaction module is mainly responsible for controlling the transaction flow and specifically comprises an uploading parameter module, a parameter obtaining module, a transaction response module and the like. Wherein the parameters mainly comprise: transaction amount N1, deposit amount N2, key K1, time parameter T big data address AD, etc.
The second module, the hash module. The hash module is mainly responsible for storing hash values and providing a hash algorithm G1, except that the seller E1 can upload hash values H1 of large data and hash values H2 of keys, and further both the buyer E1 and the seller E2 of the transaction can query the hash values therefrom and calculate the hash values using the hash algorithm G1 to ensure the integrity of the data and the credibility of the transaction.
And a third module, a reporting module. The reporting module is mainly responsible for responding to the reporting information R, and if the buyer E2 finds that the seller E1 has fraud during the transaction, for example, the buyer E2 cannot obtain correct data or extracts multiple watermarks from the data, in this case, the buyer E2 needs to submit the key K1 of the seller E1 to the smart contract SC as the reporting evidence. If the transaction is deemed to be a violation, the smart contract SC refunds the buyer E2 and pays the buyer E2 the seller's deposit N2; if there is no violation in the transaction, the smart contract does not respond any further.
(2) The smart contract initializing seller E1 initializes the contract by modifying parameters of the smart contract SC. Specific parameters that the seller E1 needs to set are: the transaction amount N1, the deposit amount N2 (N1 or more is necessary), the address where the big data D3 is stored, the hash value H1 of the big data D3, the hash value H2 of the buyer key K1, the payment address AP, and the response time T per transaction step (T has a range limit, cannot be too long or too short). The initialization process of some parameters is detailed in the transaction flow, and other parameters not given are already completed at the beginning of initialization.
(3) Transaction flow
First, the method includes the steps of. The seller E1 generates digital watermark information W by a specific method of w=hash (D3) |sig (Hash (D3), priK 1), where Hash refers to a Hash algorithm G1 stored in the smart contract SC, D3 refers to encrypted big data embedded with the watermark, and Sig refers to a signature of the watermark using a private key PriK1 of the seller E1. After the watermark W is generated, the seller E1 embeds the watermark W into the big data D1 by the watermark embedding algorithm G2, to obtain the big data D2. After completion, the seller E1 encrypts the big data D2 using the key K1 to obtain the big data D3, and uploads the big data D3 to the address AD for storage. The seller E1 calculates the hash value H1 of the key K1 and the hash value H2 of the big data D3 according to the hash algorithm G1 in the smart contract SC, after which the seller E1 uploads the transaction amount N1, the paid address AP, the hash value H1 of the key, the hash value H2 of the big data D3, and the data storage address AD into the smart contract SC. After the upload is completed, the buyer E2 can browse details of the transaction created by the seller E1 through the smart contract SC. If the buyer E2 wants to initiate a transaction, it can first access the data address AD in the smart contract SC and download the watermark embedded encrypted big data D3. After the downloading is completed, the buyer E2 may calculate a hash value H3 of the downloaded big data D3 according to the hash algorithm G1 in the smart contract SC. If H3 is equal to H2, proving that the data uploaded by the seller is the data declared by the seller, and the buyer E2 can continue the transaction; if H3 is not equal to H2, the buyer E2 may choose not to transact or send reporting information R to the smart contract SC for processing. If the transaction continues without violation, buyer E2 may initiate the transaction. The buyer E2 needs to pay the amount N1 to the smart contract SC while sending its own public key PubK2 to the smart contract SC. When the seller E1 confirms receipt of the transaction funds of the amount N1 transmitted by the buyer E2 and the buyer's public key PubK2, the seller E1 encrypts its own key K1 using the buyer's public key PubK2 to obtain an encrypted key EnK, and then the seller E1 uploads the encrypted key EnK to the smart contract SC. After the seller E1 uploads the encrypted key EnK to the smart contract SC, the buyer E2 may download the encrypted key EnK from the smart contract SC and decrypt the encrypted key EnK with its own public key PubK2 to obtain the seller's key K1. After the buyer E2 obtains the key K1, the downloaded encrypted big data D3 embedded with the watermark is decrypted, and the big data D2 embedded with the watermark is obtained. The watermark information may be extracted from the watermark embedded big data D2 by the buyer E2. If the watermark information is correct, proving that the big data transaction accords with the specification; if the watermark information is disordered or a plurality of watermarks are extracted, the seller E1 is indicated to have illegal transaction behaviors, and the buyer E2 can submit the reporting information R to the intelligent contract SC and upload the reporting evidence, namely the secret key K1 received by the buyer E2. If the transaction is successful, the smart contract SC sends the received transaction amount N1 of the buyer E2 to a payment address AP preset to the seller E1, and the transaction ends.
(4) Reporting response flow
If the smart contract SC receives a report R from the buyer E2, then the other users U can read the smart contract SC and verify whether the report R of the buyer E2 is authentic. If the other user U verifies that the report is true, the intelligent contract SC refunds to the buyer E2 and sends the guarantee N2 to the buyer E2; if the other user U verifies that the report is not authentic, the intelligent contract SC does not respond to the report information R of the buyer E2.

Claims (5)

1. A scheme for authorizing big data transactions based on smart contracts and digital watermarks, comprising the steps of:
s1, designing an intelligent contract template SCT and a reward and punishment mechanism RP: the intelligent contract template SCT mainly comprises three modules, namely a transaction module, wherein the module is responsible for realizing a transaction flow; secondly, a hash module provides a hash algorithm G1 to verify the integrity of the data; the report response module receives report information R from the buyer E2, and all other users can verify the report; in addition, the reward and punishment mechanism RP requires the seller E1 to pay a guarantee SD before the transaction, and if the transaction is illegal, the seller E1 reports and verifies the transaction, and the seller E1 refunds and pays the guarantee to the buyer E2;
s2 vendor E1 initializes the smart contract SC: the seller E1 firstly generates a watermark W and embeds the watermark W into big data D1 to be transacted, and then the seller E1 encrypts big data D2 embedded with the watermark W by using a secret key K1 of the seller E1 to obtain encrypted big data D3 embedded with the watermark; the seller E1 calculates a hash value H2 of the big data D3 of the hash value H1 of the key K1 using the hash algorithm G1 provided in the smart contract, and uploads the calculated value into the smart contract SC; after the completion, the seller E1 stores the big data D3 into the address AD, and uploads the amount N1 required by the transaction, the address AD, the hash value H1 of the key K1 and the hash value H3 of the big data D3 into the intelligent contract, and then deploys the contract on the blockchain BC; finally, the seller E1 pays the deposit N2 to the intelligent contract SC; in addition, the response time T of each step of the transaction is set in the intelligent contract template SCT, and if a certain step of the transaction is not completed within T, the transaction is automatically terminated;
the BLOCK data structure in the blockchain BC includes:
a1 difficulty;
a2 Gas limitation;
a3 The usage amount of Gas;
a4, miners packing the blocks;
a5, numbering the blocks;
a6, hash value of the block data of the block;
a7 the size of the block;
transactions recorded in block A8;
a9, merkleRoot values of all transactions;
a10, generating a timestamp of the block;
in the above steps, the big data watermark information W is generated by the buyer according to the watermark generation algorithm G2, and is embedded into the big data D1 according to the big data watermark embedding algorithm G3 to obtain the big data D2, and the big data D2 embedded with the watermark is encrypted by the key K1 to obtain the encrypted big data D3 embedded with the watermark, and the specific parameters and algorithms required by the generated watermark W are
W=Hash(D3)||Sig(Hash(D3),PriK1),
Wherein Hash refers to a Hash algorithm G1 stored in the smart contract SC, D3 refers to encrypted big data embedded with a watermark, sig refers to a private key PriK1 signature of the watermark using a vendor E1; in the above steps, the buyer E2 obtains more information from the watermark by different watermark types, and expands the existing transaction scheme according to the different watermark types and corresponding meanings; big data containing a type-one watermark is traded multiple times; big data containing type two watermarks can only be traded once; big data containing type three watermarks can only be traded at specific time; big data containing type four watermarks can only be traded thirty days after purchase; the parameters and algorithms specifically required are:
W=Hash(D3)||Sig(Hash(D3)||Type,PriK1),
wherein, hash refers to the Hash algorithm G1 stored in the smart contract SC, D3 refers to the encrypted big data embedded with the watermark, type is the Type embedded with the watermark, sig refers to the private key PriK1 signature of the watermark using the vendor E1;
s3, the buyer E2 initiates a transaction;
s4, the seller E1 confirms the transaction;
s5, the buyer E2 checks the commodity provided by the seller E1;
s6, transaction results.
2. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S3 buyer E2 initiates a transaction: the buyer E2 accesses and downloads big data D3 uploaded by the seller according to the address AD stored in the intelligent contract SC provided by the seller E1, and the buyer E2 verifies whether the data D3 uploaded by the seller E1 is consistent with the claim of the data D3 according to the hash algorithm provided by the intelligent contract SC; if the result obtained by E2 calculation is consistent with H2 in the intelligent contract SC, initiating transaction; if the intelligent contract SC is inconsistent, the seller B sends a report R to the intelligent contract SC; if the verification is correct, the buyer E2 proceeds with the transaction, and the buyer E2 pays the amount N1 required for the transaction to the smart contract, and at the same time uploads the public key PubK2 of the buyer to the smart contract SC.
3. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S4 seller E1 confirms the transaction: after the seller E1 confirms that the amount N1 paid by the buyer and the public key PubK2 of the buyer E2 are received, the seller E1 encrypts the key K using the public key PubK2 of the buyer to obtain an encrypted key EnK; vendor E1 then uploads the encrypted key EnK to the smart contract.
4. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S5 buyer E2 verifies the goods offered by the seller E1: the buyer E2 downloads the encryption key EnK uploaded by the seller, and decrypts the encryption key by using the private key Prik2 of the buyer E2 to obtain K1; the buyer E2 calculates a hash value H3 of the key K1 according to a hash algorithm G1 provided in the intelligent contract SC, if H3 is equal to H1 in the intelligent contract, the key uploaded by the seller is proved to be correct, the next verification is carried out, and otherwise, the buyer E2 sends a report R to the intelligent contract SC; if the verification is continued, the buyer E2 decrypts the big data D3 by using the obtained secret key K1 to obtain big data D2 containing the watermark; the buyer E2 extracts the watermark in D2, and if multiple watermarks or watermark confusion occurs, the big data D2 is proved to be data required by the non-buyer E2 or data which are transacted for multiple times, and at this time, the buyer E2 submits report R to the intelligent contract SC.
5. The scheme for authorizing big data transactions based on smart contracts and digital watermarks according to claim 1, characterised in that,
the S6 transaction result: if the transaction is normally performed, the transaction is successfully completed in each step and the time is within T; if a certain step is not completed within the time T in the transaction process, automatically ending the transaction, and if the buyer E2 has paid, returning the payment paid by the buyer E2; if the buyer E2 finds that the data D3 sold by the seller E1 is illegal in the transaction process, the buyer E2 sends report information R to the intelligent contract SC, the intelligent contract SC verifies the report information R by all members in the network, if the verification report is correct, the intelligent contract SC refunds the amount N1 to the buyer E2, and pays the deposit N2 of the seller E1 to the buyer E2 together, and if the verification report is incorrect, the intelligent contract does not respond.
CN202110316445.0A 2021-03-24 2021-03-24 Authorized big data transaction scheme based on intelligent contract and digital watermark Active CN113222593B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110316445.0A CN113222593B (en) 2021-03-24 2021-03-24 Authorized big data transaction scheme based on intelligent contract and digital watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110316445.0A CN113222593B (en) 2021-03-24 2021-03-24 Authorized big data transaction scheme based on intelligent contract and digital watermark

Publications (2)

Publication Number Publication Date
CN113222593A CN113222593A (en) 2021-08-06
CN113222593B true CN113222593B (en) 2024-03-15

Family

ID=77084076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110316445.0A Active CN113222593B (en) 2021-03-24 2021-03-24 Authorized big data transaction scheme based on intelligent contract and digital watermark

Country Status (1)

Country Link
CN (1) CN113222593B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114418578A (en) * 2022-03-30 2022-04-29 北京溪塔科技有限公司 Block chain account risk query method and device
CN117454433B (en) * 2023-12-22 2024-02-23 北京天润基业科技发展股份有限公司 Transaction processing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160076184A (en) * 2014-12-22 2016-06-30 (주)파츠스트라이크 Parts brokerage system with changing deposit amount depending on the reports of defective parts
CN110188137A (en) * 2019-04-19 2019-08-30 杭州电子科技大学 A kind of block chain common recognition mechanism based on sincerity
CN110298661A (en) * 2019-07-01 2019-10-01 贵州大学 Big data Secure Fair based on intelligent contract exchanges method
CN110428351A (en) * 2019-07-29 2019-11-08 电子科技大学 Semi vehicle violation based on block chain reports method
CN111161017A (en) * 2019-12-10 2020-05-15 北京航天云路有限公司 Cloud marketing system and method based on mobile terminal and block chain
CN111369248A (en) * 2020-03-03 2020-07-03 南京大学 Digital product safe transaction method and system based on block chain technology
KR20200104590A (en) * 2019-02-27 2020-09-04 주식회사 노다멘 System for Dealing Visual Art in Digital Contents based on BlockChain
EP3712798A1 (en) * 2019-03-21 2020-09-23 Thales Distributed registers for managing the life cycle of data in aeronautics
CN112016520A (en) * 2020-09-15 2020-12-01 平安国际智慧城市科技股份有限公司 AI-based traffic violation voucher generation method, device, terminal and storage medium
CN112464178A (en) * 2020-09-27 2021-03-09 中国科学技术大学苏州研究院 Data transaction copyright protection method based on block chain and homomorphic encryption

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160076184A (en) * 2014-12-22 2016-06-30 (주)파츠스트라이크 Parts brokerage system with changing deposit amount depending on the reports of defective parts
KR20200104590A (en) * 2019-02-27 2020-09-04 주식회사 노다멘 System for Dealing Visual Art in Digital Contents based on BlockChain
EP3712798A1 (en) * 2019-03-21 2020-09-23 Thales Distributed registers for managing the life cycle of data in aeronautics
CN110188137A (en) * 2019-04-19 2019-08-30 杭州电子科技大学 A kind of block chain common recognition mechanism based on sincerity
CN110298661A (en) * 2019-07-01 2019-10-01 贵州大学 Big data Secure Fair based on intelligent contract exchanges method
CN110428351A (en) * 2019-07-29 2019-11-08 电子科技大学 Semi vehicle violation based on block chain reports method
CN111161017A (en) * 2019-12-10 2020-05-15 北京航天云路有限公司 Cloud marketing system and method based on mobile terminal and block chain
CN111369248A (en) * 2020-03-03 2020-07-03 南京大学 Digital product safe transaction method and system based on block chain technology
CN112016520A (en) * 2020-09-15 2020-12-01 平安国际智慧城市科技股份有限公司 AI-based traffic violation voucher generation method, device, terminal and storage medium
CN112464178A (en) * 2020-09-27 2021-03-09 中国科学技术大学苏州研究院 Data transaction copyright protection method based on block chain and homomorphic encryption

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
区块链在数字版权领域的应用;刘宗媛;《网络空间安全》;全文 *
基于信誉度的主从多链区块链共识机制;刘昊哲;李莎莎;吕伟龙;魏松杰;;南京理工大学学报(03);全文 *

Also Published As

Publication number Publication date
CN113222593A (en) 2021-08-06

Similar Documents

Publication Publication Date Title
CN109544160B (en) Transaction authenticity verification method and system based on block chain and intelligent contract
CN107798650B (en) Digital asset infringement judgment method and device based on block chain
KR102355550B1 (en) Method, apparatus and system for converting real assets to digital assets based on blockchain
CN109376504B (en) Picture privacy protection method based on block chain technology
WO2020211462A1 (en) Blockchain-based service data chaining method and system
US4658093A (en) Software distribution system
CN111538784B (en) Digital asset transaction method, device and storage medium based on blockchain
CN110135819B (en) Block chain-based third-party trusted data transaction system and method
US7099479B1 (en) Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method
CN109697365B (en) Information processing method, block chain node and electronic equipment
CN110766406B (en) Resource transfer method, resource transfer device, storage medium and electronic equipment
CN111027028A (en) Copyright data processing method and device based on intelligent contract
CN109657424B (en) Remote sensing result copyright management method based on block chain
CN111951106B (en) Data transaction system and method based on blockchain intelligent contract technology
US20020010684A1 (en) Systems, methods and devices for trusted transactions
CN113222593B (en) Authorized big data transaction scheme based on intelligent contract and digital watermark
EP4050542B1 (en) Blockchain-based data processing method and apparatus, and device and readable storage medium
CN111563823B (en) Network work copyright transaction processing method, device and system based on blockchain
KR20010052796A (en) Information processing device and method, and providing medium
CN110570313A (en) data transaction method, data transaction device and system based on block chain
CN112862477B (en) Digital commodity atomic transaction method and system based on blockchain
JP2000124890A (en) Device and method for information processing, device and method for management, information use system, provision medium and external storage medium
CN113409144B (en) Blockchain data transaction method with privacy protection function
CN113283957B (en) Entity product transaction method based on blockchain
WO2001043026A1 (en) Systems, methods and devices for trusted transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant