CN113409144A - Block chain data transaction method with privacy protection - Google Patents

Block chain data transaction method with privacy protection Download PDF

Info

Publication number
CN113409144A
CN113409144A CN202110676998.7A CN202110676998A CN113409144A CN 113409144 A CN113409144 A CN 113409144A CN 202110676998 A CN202110676998 A CN 202110676998A CN 113409144 A CN113409144 A CN 113409144A
Authority
CN
China
Prior art keywords
transaction
data
user
seller
buyer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110676998.7A
Other languages
Chinese (zh)
Other versions
CN113409144B (en
Inventor
于汪源
田萌萌
刘园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN202110676998.7A priority Critical patent/CN113409144B/en
Publication of CN113409144A publication Critical patent/CN113409144A/en
Application granted granted Critical
Publication of CN113409144B publication Critical patent/CN113409144B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a block chain data transaction method with privacy protection, and relates to the technical field of block chains. The method comprises the steps that a user participating in a transaction obtains a seller, the original data of the user is encrypted through a public key inner product and then stored in an interplanetary file system, and a transaction request for creating an intelligent contract of the seller is initiated in a block chain; a buyer user initiates a transaction request for creating a buyer intelligent contract in the block chain; the consensus nodes on the block chain are used for carrying out validity check on the transaction requests initiated by the transaction users, if the check is passed, all the consensus nodes on the block chain record the transaction requests in the chain, and the seller users and the buyer users carry out data transaction based on the block chain; if the check is invalid, the transaction application is rejected. The method is based on the block chain, thereby ensuring the traceability of the data transaction process and the rights and interests of both buyers and sellers. The data transaction process uses the secret key for encryption, so that the transaction platform can not check and store the easily-accessed data.

Description

Block chain data transaction method with privacy protection
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain data transaction method with privacy protection.
Background
In the four years from 2011 to 2014, the big data in China is in the starting development stage, the market scale of the big data is accelerated stably, and the market scale is kept more than 20% every year. In 2015, the market size of large data has reached 98.9 billion yuan, which is on par with a 30.7% increase. In 2016, the large data market scale is increased to meet the climax, reaches 45 percent, and the market scale is continuously expanded to exceed 160 hundred million yuan. The market for big data is expected to be steadily increasing in the coming decade.
With the steady development of big data market, data-driven intelligent application is increasingly popularized, the value of data per se is increasingly highlighted, and for data analysis companies and big data researchers, collecting a sufficient amount of data is the key point of training accurate models. However, valuable data resources are scattered around, and efficient data transaction can realize efficient utilization of the data resources and increase data value. Therefore, an effective data transaction scheme has social utility value. The current forms of data transaction mainly include the following types:
first, private transactions between data sellers and data buyers. And the data seller sorts and packages the data, and pushes data information to possible data buyers through a certain marketing means. The data buyer seeks a trusted data owner through discovery, screening, etc. The two parties communicate privately, negotiate and negotiate the price, and finally reach the data transaction.
And secondly, a data transaction platform. Since the rise of big data concept, the big data trading platform is highly concerned by government and business industry, and in this background, many big data trading platforms are brought forward. The data seller and the data buyer register the identity on the data transaction platform and conduct buying and selling actions on the platform. And thirdly, a data transaction system based on the block chain. With the advent of blockchain technology, its de-centralization and tamper-resistance advantages are applied to data transaction systems. The research and design of a data transaction platform based on a block chain [ J ] small-sized computer system, 2021,42(05): 1109-.
Private transactions between data owners and data buyers often require private negotiation of both parties to achieve transactions, no three-party guarantee and traceable transaction behaviors exist, and the security and reliability of the transactions cannot be guaranteed. In addition, the communication relationship between the two parties of the transaction is difficult to establish, the buyer needs to call various resources to contact the data seller reliably, and the seller needs extra energy to sell the data, so that the transaction cost of the two parties is increased.
Although the data transaction platform solves the problems of communication between the buyer and the seller and transaction witnesses, the data transaction platform is a centralized platform, the safety and fairness of data transaction depend on the data platform, the platform standard is a unique judgment standard, and once the data platform takes malicious actions such as illegal access, the rights and interests of platform users are damaged.
The data transaction system based on the block chain solves the problem of a three-party transaction platform, ensures the safety and tamper resistance in the data transaction process, but the data information for finally completing the transaction is completely exposed, and a data buyer can copy seller data at low cost and carry out secondary resale, thereby damaging the rights and interests of the data seller and invading the privacy of the data seller.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a blockchain data transaction method with privacy protection, which utilizes an inner product encryption technology and a blockchain system to provide a decentralized data transaction method to standardize the transaction process and the behavior of the data traders, so as to ensure the security, fairness and transparency in the data transaction process, according to the use scenario of the data transaction. The defects of transaction traceability, service centralization and content replication in the conventional data transaction mode are overcome.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a block chain data transaction method with privacy protection specifically comprises the following steps:
users participating in the transaction initiate data transaction applications in the blockchain;
the consensus nodes on the block chain are used for checking the validity of the transaction request initiated by the transaction user, if the checking is passed, all the consensus nodes on the block chain record the transaction request in the chain, and the seller user and the buyer user perform data transaction based on the block chain; if the check is invalid, the transaction application is rejected.
Further, the users participating in the transaction are divided into seller users and buyer users; the seller user is the data owner and initiates a request for selling data; the buyer user is a data demander and initiates a data purchasing request; and the seller user stores the original data into an interplanetary file system after the original data is encrypted by public key inner product.
Further, the specific method for the user participating in the transaction to initiate the data transaction application to the blockchain is as follows:
a seller user participating in a transaction issues a selling data request, namely, the seller user initiates a transaction request for creating a seller intelligent contract in a block chain, the intelligent contract is used for selling data, and contract content comprises a data abstract, a data storage address, public key content used for inner product encryption and a selling operation; the buyer user issues a purchase data request, namely, the buyer user initiates a transaction request for creating a buyer intelligent contract in the block chain, the intelligent contract is used for purchasing data, and the contract content comprises a bid and a purchase operation.
Further, the specific method for checking the validity of the transaction request initiated by the user participating in the transaction by the consensus node on the block chain is as follows:
the common identification node on the block chain receives a transaction request of a user, checks whether a transaction format is correct or not, whether a transaction signature is legal or not, whether a transaction initiator address exists or not, and checks whether the balance of a user account initiating the transaction request meets the maximum transaction cost or not, if the verification fails, an error is returned, and the transaction request is rejected; if the verification is passed, the transaction request is put into a transaction pool on the blockchain and forwarded to other common identification nodes, and after the other common identification nodes on the blockchain receive the transaction request, the verification process is repeated until the transaction request is packaged into a block by the common identification node with the block right, and the block is broadcasted in the whole network.
Further, a specific method for recording the transaction request in the chain by all the consensus nodes on the blockchain is as follows:
and after all the consensus nodes on the block chain receive the blocks containing the transaction requests of the sellers or the buyers, verifying the blocks, if the verification is passed, synchronizing the blocks into the block chain of the consensus nodes, deleting the transaction requests from the transaction pool, completing block chain synchronization, and successfully deploying intelligent contracts of the sellers or the buyers into the block chain.
Further, the specific method for performing data transaction between the seller user and the buyer user based on the blockchain is as follows:
step 1, a buyer user calls an intelligent contract to request data of a seller user;
a buyer user initiates a transaction request for purchasing data on the blockchain, and the transaction request explicitly marks a receiving account address, namely an address for deploying the intelligent contract by a seller user; the transaction request comprises basic information of a public key of a buyer and a transaction bid;
step 2, the seller user responds to the transaction request of the buyer user and sends the encrypted data;
after receiving a data purchase request of a buyer user, a seller user sends a hash value of encrypted data which is stored in an interplanetary file system in a distributed manner to the buyer user;
step 3, the buyer user receives the data sent by the seller and initiates a verification request;
after receiving the hash value sent by the seller user, the buyer user obtains encrypted data corresponding to the hash value from the interplanetary file system, then randomly selects an encrypted data subset, and requests the seller to send corresponding original data so as to verify the validity of the encrypted data;
step 4, the seller user sends the raw data requested by the buyer to the buyer user;
after receiving the verification request, the seller user encrypts original data to be verified by using a public key of the buyer node and sends the encrypted original data to the buyer user for verification;
and 5, the buyer user completes verification according to the original data to be verified sent by the seller user and the public key operated by the seller inner product, and the buyer and the seller perform data transaction.
Further, the buyer user completes verification, and the specific method for the buyer and the seller to perform data transaction is as follows:
after receiving original data to be verified sent by a seller user, a buyer user encrypts the original data by using a public key operated by a seller inner product to obtain a verification set, compares the verification set with the selected verification encrypted data subset, and if the verification set does not meet the selected verification encrypted data subset, the buyer user considers that a false data set is received and terminates the transaction; if the data is in accordance with the valid data set, the received encrypted data set is determined to be valid data set; the buyer transfers the money to the seller according to the price agreed in advance; the seller sends the key for decrypting the encrypted data set to the buyer user, completing the entire transaction.
Adopt the produced beneficial effect of above-mentioned technical scheme to lie in: the block chain data transaction method with privacy protection provided by the invention is based on the block chain, and data transaction can be realized without a third-party trust mechanism. The transaction behaviors of the buyer and the seller are recorded on the chain and are identified by all the common identification nodes, so that the traceability of the data transaction process is ensured, and the rights and interests of the buyer and the seller are ensured. The transaction process uses the key encryption, so that the transaction platform can not check and store the data in the transaction. The seller data is encrypted by adopting an inner product encryption mode, so that a data buyer cannot obtain the original content of the data and cannot copy and resell the data, the privacy of the seller is guaranteed, and the secondary resell of the data is prevented. The final data obtained by the buyer is the result of the inner product encryption, the original data information is hidden, and the privacy of the data seller is guaranteed. The data after inner product encryption has usability for data buyers, and the data analysis requirements of the buyers are met. Under the mechanism, the behavior of copying and reselling data at low cost is avoided.
Drawings
Fig. 1 is a flowchart of a method for performing a blockchain data transaction with privacy protection according to an embodiment of the present invention;
fig. 2 is a flowchart of a public key inner product encryption method according to an embodiment of the present invention;
FIG. 3 is a block diagram of a data transaction between a seller user and a buyer user based on an Etherhouse according to an embodiment of the present invention;
fig. 4 is a flowchart of data transaction between a seller user and a buyer user based on an ethernet arcade according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
An etherhouse is a programmable block chain, and the core is an Etherhouse Virtual Machine (EVM). The EVM is a virtual machine with complete graphic and can realize various complex logics and execute intelligent contracts issued or called by users in an Ethernet workshop network. The smart contract is actually code executable by the EVM. The embodiment completes data transaction of both buyers and sellers on the Etherns.
In this embodiment, a method for performing a blockchain data transaction with privacy protection, as shown in fig. 1, specifically includes the following steps:
step 1, users participating in transaction initiate data transaction applications in a blockchain;
users participating in a transaction fall into two categories: a seller user and a buyer user; the seller user is the data owner and initiates a request for selling data; the buyer user is a data demander and initiates a data purchasing request; the transaction process is carried out by means of a blockchain. In this embodiment, a seller user issues a sell data request, that is, the seller user initiates a transaction request for creating an intelligent contract for the seller in an ethernet, where the intelligent contract is used for selling data, and contract content includes a data summary, a data storage address, public key content for inner product encryption, and a selling operation; the buyer user issues a purchase data request, namely, the buyer user initiates a transaction request for creating a buyer intelligent contract in the Ethernet workshop, the intelligent contract is used for purchasing data, and the contract content comprises a bid and a purchase operation.
Considering that the transaction speed and the cost for invoking the intelligent contract are influenced by storing a large amount of data on a block chain, the seller user stores the original data into an interplanetary file system (IPFS) after performing public key inner product encryption, the data storage efficiency is improved, meanwhile, the anti-counterfeiting performance and the anti-tamper performance of the data are guaranteed, and the data content in the intelligent contract of the seller is represented in the form of a series of hash values.
In order to protect the privacy of data transaction contents, the data stored in the IPFS by the seller user is not original data, but a data set encrypted through public key inner product; public key inner product encryption, also called asymmetric key encryption, refers to an encryption method composed of a corresponding pair of unique keys (i.e., a public key and a private key), and the specific encryption manner is shown in fig. 2.
Step 2, the consensus node on the ether house checks the validity of the transaction request initiated by the user participating in the transaction, if the check is passed, step 3 is executed, and if the check is invalid, the transaction application is rejected;
the consensus node on the ether house receives a transaction request of a user, checks whether a transaction format is correct, whether a transaction signature is legal, whether a transaction initiator address exists, and checks whether the balance of a user account initiating the transaction request meets the maximum transaction cost, if the verification fails, an error is returned, and the transaction request is rejected; if the verification is passed, the transaction request is placed in a transaction pool on the Ethernet workshop and forwarded to other consensus nodes, and after the other consensus nodes on the Ethernet workshop receive the transaction request, the verification process is repeated until the transaction request is packaged into a block by the consensus nodes with the block right, and the block right is broadcasted in the whole network; the transaction pool is also called as a memory pool and is used for temporarily storing transaction records which are not added to the block; meanwhile, the consensus node broadcasts the transaction to the network, and other consensus nodes verify the transaction and add the transaction into a transaction pool after the verification is passed;
step 3, all the consensus nodes on the Etherns record the transaction requests in a chain;
after all the consensus nodes on the Ethernet workshop receive the blocks containing the transaction requests of the sellers or the buyers, the blocks are verified, if the verification is passed, the consensus nodes synchronize the blocks into own block chains, delete the transaction requests from the transaction pool, complete the block chain synchronization, and successfully deploy intelligent contracts of the sellers or the buyers into the block chains;
step 4, the seller user and the buyer user perform data transaction based on the Etherhouse, as shown in FIGS. 3 and 4, the consensus of the whole transaction process in the block chain is completed according to the methods of step 2 and step 3;
step 4.1, the buyer user calls the intelligent contract to request the data of the seller user;
a buyer user initiates a transaction request for purchasing data on an Etherhouse, and the transaction request explicitly marks a receiving account address, namely an address for deploying an intelligent contract by a seller user; the transaction request comprises basic information of a public key of a buyer and a transaction bid;
step 4.2, the seller user responds to the transaction request of the buyer user and sends the encrypted data;
after receiving a data purchase request of a buyer user, a seller user sends a hash value of encrypted data which is stored in an interplanetary file system (IPFS) in a distributed manner to the buyer user; (function "set _ ipfs _ hash ()" in vendor user Intelligent contract in FIG. 3 to achieve this function)
4.3, the buyer user receives the data sent by the seller and initiates a verification request;
after receiving the hash value sent by the seller user, the buyer user obtains encrypted data corresponding to the hash value from the interplanetary file system, then randomly selects an encrypted data subset, and asks the seller for corresponding original data to verify the validity of the encrypted data; (the function "choose _ dataset ()" in the buyer-user intelligent contract in FIG. 3 realizes this function)
Step 4.4, the seller user sends the raw data requested by the buyer to the buyer user;
after receiving the verification request, the seller user encrypts the original data to be verified with the public key of the buyer node and sends the encrypted data to the buyer user for verification (the function "send _ dataset ()" in the intelligent contract of the seller user in FIG. 3 realizes the function)
Step 4.5, the buyer user completes verification according to the original data to be verified sent by the seller user and the public key of the seller inner product operation, and the buyer and the seller perform data transaction;
after receiving original data to be verified sent by a seller user, a buyer user encrypts the original data by using a public key operated by a seller inner product to obtain a verification set, compares the verification set with the selected verification encrypted data subset, and if the verification set does not meet the selected verification encrypted data subset, the buyer user considers that a false data set is received and terminates the transaction; if the data is matched with the data, the verification is passed, and the buyer determines that the received encrypted data set is a valid data set (the function 'data _ verification ()' in the intelligent contract of the buyer user in the figure 3 realizes the function); the buyer will transfer to the seller at the price agreed in advance (the function "value _ transfer ()" in the buyer user intelligent contract in fig. 3 accomplishes this function). The seller sends the key for decrypting the encrypted data set to the buyer user (this function is implemented as the function "generate _ sk ()" in the seller user smart contract in fig. 3), completing the entire transaction process.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions and scope of the present invention as defined in the appended claims.

Claims (7)

1. A block chain data transaction method with privacy protection is characterized in that:
users participating in the transaction initiate data transaction applications in the blockchain;
the consensus nodes on the block chain are used for checking the validity of the transaction request initiated by the transaction user, if the checking is passed, all the consensus nodes on the block chain record the transaction request in the chain, and the seller user and the buyer user perform data transaction based on the block chain; if the check is invalid, the transaction application is rejected.
2. The method of claim 1, wherein the method comprises: the users participating in the transaction are divided into seller users and buyer users; the seller user is the data owner and initiates a request for selling data; the buyer user is a data demander and initiates a data purchasing request; and the seller user stores the original data into an interplanetary file system after the original data is encrypted by public key inner product.
3. The method of claim 2, wherein the method comprises: the specific method for the user participating in the transaction to initiate the data transaction application to the blockchain is as follows:
a seller user participating in a transaction issues a selling data request, namely, the seller user initiates a transaction request for creating a seller intelligent contract in a block chain, the intelligent contract is used for selling data, and contract content comprises a data abstract, a data storage address, public key content used for inner product encryption and a selling operation; the buyer user issues a purchase data request, namely, the buyer user initiates a transaction request for creating a buyer intelligent contract in the block chain, the intelligent contract is used for purchasing data, and the contract content comprises a bid and a purchase operation.
4. The method of claim 3, wherein the method comprises: the specific method for checking the validity of the transaction request initiated by the user participating in the transaction by the consensus node on the block chain comprises the following steps:
the common identification node on the block chain receives a transaction request of a user, checks whether a transaction format is correct or not, whether a transaction signature is legal or not, whether a transaction initiator address exists or not, and checks whether the balance of a user account initiating the transaction request meets the maximum transaction cost or not, if the verification fails, an error is returned, and the transaction request is rejected; if the verification is passed, the transaction request is put into a transaction pool on the blockchain and forwarded to other common identification nodes, and after the other common identification nodes on the blockchain receive the transaction request, the verification process is repeated until the transaction request is packaged into a block by the common identification node with the block right, and the block is broadcasted in the whole network.
5. The method of claim 4, wherein the method comprises: the specific method for recording the transaction request in the chain by all the consensus nodes on the block chain is as follows:
and after all the consensus nodes on the block chain receive the blocks containing the transaction requests of the sellers or the buyers, verifying the blocks, if the verification is passed, synchronizing the blocks into the block chain of the consensus nodes, deleting the transaction requests from the transaction pool, completing block chain synchronization, and successfully deploying intelligent contracts of the sellers or the buyers into the block chain.
6. The method of claim 5, wherein the method comprises: the specific method for performing data transaction between the seller user and the buyer user based on the blockchain is as follows:
step 1, a buyer user calls an intelligent contract to request data of a seller user;
a buyer user initiates a transaction request for purchasing data on the blockchain, and the transaction request explicitly marks a receiving account address, namely an address for deploying the intelligent contract by a seller user; the transaction request comprises basic information of a public key of a buyer and a transaction bid;
step 2, the seller user responds to the transaction request of the buyer user and sends the encrypted data;
after receiving a data purchase request of a buyer user, a seller user sends a hash value of encrypted data which is stored in an interplanetary file system in a distributed manner to the buyer user;
step 3, the buyer user receives the data sent by the seller and initiates a verification request;
after receiving the hash value sent by the seller user, the buyer user obtains encrypted data corresponding to the hash value from the interplanetary file system, then randomly selects an encrypted data subset, and requests the seller to send corresponding original data so as to verify the validity of the encrypted data;
step 4, the seller user sends the raw data requested by the buyer to the buyer user;
after receiving the verification request, the seller user encrypts original data to be verified by using a public key of the buyer node and sends the encrypted original data to the buyer user for verification;
and 5, the buyer user completes verification according to the original data to be verified sent by the seller user and the public key operated by the seller inner product, and the buyer and the seller perform data transaction.
7. The method of claim 5, wherein the method comprises: the buyer user completes verification, and the concrete method for the buyer and the seller to carry out data trading is as follows:
after receiving original data to be verified sent by a seller user, a buyer user encrypts the original data by using a public key operated by a seller inner product to obtain a verification set, compares the verification set with the selected verification encrypted data subset, and if the verification set does not meet the selected verification encrypted data subset, the buyer user considers that a false data set is received and terminates the transaction; if the data is in accordance with the valid data set, the received encrypted data set is determined to be valid data set; the buyer transfers the money to the seller according to the price agreed in advance; the seller sends the key for decrypting the encrypted data set to the buyer user, completing the entire transaction.
CN202110676998.7A 2021-06-18 2021-06-18 Blockchain data transaction method with privacy protection function Active CN113409144B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110676998.7A CN113409144B (en) 2021-06-18 2021-06-18 Blockchain data transaction method with privacy protection function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110676998.7A CN113409144B (en) 2021-06-18 2021-06-18 Blockchain data transaction method with privacy protection function

Publications (2)

Publication Number Publication Date
CN113409144A true CN113409144A (en) 2021-09-17
CN113409144B CN113409144B (en) 2024-03-22

Family

ID=77681384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110676998.7A Active CN113409144B (en) 2021-06-18 2021-06-18 Blockchain data transaction method with privacy protection function

Country Status (1)

Country Link
CN (1) CN113409144B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113821828A (en) * 2021-11-22 2021-12-21 武汉龙津科技有限公司 Data privacy protection method, device, equipment and storage medium
CN113821474A (en) * 2021-11-22 2021-12-21 武汉龙津科技有限公司 Data processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170017935A1 (en) * 2015-07-17 2017-01-19 Mastercard International Incorporated Systems and methods for establishing message routing paths through a computer network
US20200058023A1 (en) * 2018-08-14 2020-02-20 Grandata Inc. Decentralized Data Marketplace
CN111681002A (en) * 2020-06-10 2020-09-18 浙江工商大学 Fair data transaction method and system based on block chain
CN112286872A (en) * 2020-08-20 2021-01-29 深圳市易链信息技术有限公司 Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170017935A1 (en) * 2015-07-17 2017-01-19 Mastercard International Incorporated Systems and methods for establishing message routing paths through a computer network
CN107836003A (en) * 2015-07-17 2018-03-23 万事达卡国际股份有限公司 The method and system of message routing path is established by computer network
US20200058023A1 (en) * 2018-08-14 2020-02-20 Grandata Inc. Decentralized Data Marketplace
CN111681002A (en) * 2020-06-10 2020-09-18 浙江工商大学 Fair data transaction method and system based on block chain
CN112286872A (en) * 2020-08-20 2021-01-29 深圳市易链信息技术有限公司 Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汪靖伟等: "基于区块链的数据市场", 《大数据》, 11 March 2020 (2020-03-11), pages 21 - 35 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113821828A (en) * 2021-11-22 2021-12-21 武汉龙津科技有限公司 Data privacy protection method, device, equipment and storage medium
CN113821474A (en) * 2021-11-22 2021-12-21 武汉龙津科技有限公司 Data processing method, device, equipment and storage medium
CN113821828B (en) * 2021-11-22 2022-02-08 武汉龙津科技有限公司 Data privacy protection method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113409144B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
CN110349056B (en) Service processing system and method based on block chain
CN107798650B (en) Digital asset infringement judgment method and device based on block chain
TWI764037B (en) Interaction method and system across blockchain, computer equipment and storage medium
CN108711051B (en) Intellectual property trading sharing platform and method based on block chain
CN109377363B (en) Block chain-based Internet of things data transaction architecture and transaction security method thereof
CN111814156B (en) Data acquisition method, device and equipment based on trusted equipment
CN112348717A (en) Knowledge uplink and acquisition method and system based on block chain
CN113409144A (en) Block chain data transaction method with privacy protection
WO2020156008A1 (en) Blockchain-based information distribution method and system
CN116743768B (en) Method, apparatus, device and computer readable storage medium for trading computing power resources
CN114066456B (en) ERC 1155-based cross-chain NFT transfer and settlement system
CN114913013A (en) House renting transaction system and house renting transaction method based on block chain
WO2018210097A1 (en) Method and device for execution transaction mode by classification
CN108650279A (en) Network information security acquisition method and network trading method and network safety system
KR102205765B1 (en) Method And Apparatus for Providing Wallet for Enhancing Security And keeping Crypto-currency
WO2021017635A1 (en) Digital asset financial system
CN110189143B (en) Block chain-based marketing label authenticity verification method and system
CN111311341A (en) Bill processing method, apparatus and medium
Wu et al. Privacy-friendly Blockchain Based Data Trading and Tracking
Chuang et al. A reliable IoT data economic system based on edge computing
CN116028982A (en) Processing method, device and system based on non-homogeneous general evidence
He et al. A new privacy-preserving searching model on blockchain
Moreaux et al. Blockchain assisted near-duplicated content detection
Kumar et al. Decentralized used cars Bidding application using Ethereum
Yu et al. A Copyright-Preserving and Fair Image Trading Scheme Based on Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant