CN113765875A - Feedback method and device of data verification information - Google Patents

Feedback method and device of data verification information Download PDF

Info

Publication number
CN113765875A
CN113765875A CN202011285006.XA CN202011285006A CN113765875A CN 113765875 A CN113765875 A CN 113765875A CN 202011285006 A CN202011285006 A CN 202011285006A CN 113765875 A CN113765875 A CN 113765875A
Authority
CN
China
Prior art keywords
information
data
intelligent contract
basic data
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011285006.XA
Other languages
Chinese (zh)
Other versions
CN113765875B (en
Inventor
马奔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Qianshi Technology Co Ltd
Beijing Jingdong Zhenshi Information Technology Co Ltd
Original Assignee
Beijing Jingdong Qianshi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Qianshi Technology Co Ltd filed Critical Beijing Jingdong Qianshi Technology Co Ltd
Priority to CN202011285006.XA priority Critical patent/CN113765875B/en
Publication of CN113765875A publication Critical patent/CN113765875A/en
Application granted granted Critical
Publication of CN113765875B publication Critical patent/CN113765875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application discloses a feedback method and a feedback device of data verification information, which are applied to a alliance link server and comprise the following steps: receiving an information verification request; determining a data verification target; acquiring corresponding intelligent contract attribute information, basic data set and basic data abstract attribute information from a block chain network; the intelligent contract attribute information comprises an intelligent contract and an attribution party electronic signature value of the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and a corresponding attribution party electronic signature value; generating data analysis result information based on the intelligent contract and the basic data set; and feeding back data analysis result information, an attribution party electronic signature value of the intelligent contract and basic data summary information. The invention can provide the data verification information of the intelligent information and simultaneously ensure the safety of the data analysis code information and the basic data.

Description

Feedback method and device of data verification information
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for feeding back data verification information.
Background
At present, when a business intelligent information merchant sells business intelligent information, the authenticity of the business intelligent information needs to be self-proved so as to trust consumers.
The inventor discovers that in the process of implementing the invention: the existing method for verifying the authenticity of the commercial intelligent information has information safety hidden danger. The specific reason is analyzed as follows:
in the existing method for verifying the authenticity of the business intelligence information, code information and basic data of a data analysis algorithm for generating the business intelligence information need to be provided for a user, the user generates corresponding business intelligence information based on the code information and the basic data, and then the user can know the authenticity of the purchased business intelligence information by comparing the business intelligence information with the business intelligence information purchased by the user in a consistent manner. In the above authentication method, it is necessary to provide the code information and the basic data of the data analysis algorithm to the user, so that the user may sell the basic data and the code information of the data analysis algorithm to other merchants or users for a second time, thereby causing a risk of the code information and the basic data of the data analysis algorithm being leaked to competitors.
Disclosure of Invention
In view of the above, the present invention provides a method and an apparatus for feeding back data verification information, which can guarantee the security of code information and basic data of a corresponding data analysis algorithm while providing data verification information of intelligent information.
In order to achieve the above purpose, the embodiment of the present invention provides a technical solution:
a feedback method of data verification information is applied to a alliance link server and comprises the following steps:
receiving an information verification request;
determining a data verification target based on the information verification request;
acquiring intelligent contract attribute information, a basic data set and basic data abstract attribute information of the data verification target from a block chain network; wherein the intelligent contract attribute information includes an intelligent contract and a home-side electronic signature value for the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphically encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
generating data analysis result information based on the intelligent contract and the basic data set;
and feeding back the data analysis result information, the electronic signature value of the attribution party of the intelligent contract and the basic data summary information.
In one embodiment, the method further comprises:
acquiring and feeding back a key point attribute value and a value range attribute value of the key point of the data verification target from a block chain network; the key point attribute values are encrypted using a zero knowledge proof technique.
In one embodiment, the information verification request includes an intelligent contract identification of data to be verified.
In one embodiment, the determining a data validation target comprises:
and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
The embodiment of the invention provides a feedback device of data verification information, which is applied to a alliance link server and comprises the following steps:
the request receiving module is used for receiving an information verification request;
a target determination module for determining a data verification target based on the information verification request;
the information acquisition module is used for acquiring intelligent contract attribute information, a basic data set and basic data abstract attribute information of the data verification target from a block chain network; wherein the intelligent contract attribute information includes an intelligent contract and a home-side electronic signature value for the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphically encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
the data analysis module is used for generating data analysis result information based on the intelligent contract and the basic data set;
and the information feedback module is used for feeding back the data analysis result information, the attribution party electronic signature value of the intelligent contract and the basic data abstract information.
In one embodiment, the information obtaining module is further configured to obtain a key point attribute value of the data verification target and a value range attribute value of a key point from a blockchain network, where the key point attribute value is encrypted by using a zero knowledge proof technique;
and the information feedback module is further used for feeding back the attribute value of the key point and the value range attribute value of the key point.
In one embodiment, the information verification request includes an intelligent contract identification of data to be verified.
In one embodiment, the target determination module, specifically configured to determine a data verification target, includes: and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
The embodiment of the invention discloses a feedback device of data verification information, which comprises a processor and a memory;
the memory stores an application program executable by the processor for causing the processor to execute the feedback method of data authentication information as described above.
The embodiment of the invention discloses a computer readable storage medium, wherein computer readable instructions are stored, and the computer readable instructions are used for executing the feedback method of the data verification information.
It can be seen from the foregoing embodiments that, in the feedback scheme for data verification information provided in the present invention, a blockchain technology is used, code information for performing data analysis is stored in a blockchain network through an intelligent contract, basic data for performing data analysis is stored in the blockchain network after homomorphic encryption processing, and a digest and a signature value of the basic data after homomorphic encryption processing and a signature value of the intelligent contract are stored in the blockchain network. When the alliance link receives an information verification request of a client, the information of a data verification target is obtained from the block chain network, data analysis result information is regenerated based on the obtained intelligent contract and the basic data, and the data analysis result information, the abstract and the signature value of the basic data and the signature value of the intelligent contract are used as verification information and fed back to a user. Therefore, the user can judge the authenticity of the corresponding intelligent information based on the verification information acquired by the client. Meanwhile, all basic data and data analysis algorithms do not need to be sent to the user, and the verification information in the blockchain network is subjected to homomorphic encryption processing, so that the original information of the verification information and the verification information can be ensured not to be leaked. Therefore, the embodiment of the invention can provide the data verification information of the intelligent information and simultaneously ensure the safety of the corresponding data analysis code information and the basic data.
Drawings
FIG. 1 is a schematic flow chart of a method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 is a schematic flowchart of a method according to an embodiment of the present invention, where the method for feeding back data verification information implemented in the embodiment is applied to a federation link server, and as shown in fig. 1, the method mainly includes:
step 101, receiving an information verification request.
In one embodiment, a federation link server may receive a user's information verification request from a federation link client.
In one embodiment, in order to improve the efficiency of determining the data verification target by the federation chain server, the information verification request may carry an intelligent contract identifier of the data to be verified, so that the federation chain server may determine the data verification target.
The data to be verified is data analysis result information (such as business intelligence information purchased by the user) which is needed by the user to verify authenticity.
In practical application, the data verification target may also be indicated by carrying other information in the information verification request, for example, number information of data analysis result information purchased by the user, and a mapping relationship between the number information and the intelligent contract may be stored in the blockchain network in advance for the league chain server to query.
It should be noted that: a federation chain is commonly established for intelligent information providers, in conjunction with a publicly trusted certification authority (ca) to issue certificates identifying the identity of each information provider (i.e., the merchant supplying the intelligent information). A user may autonomously download a client of the federation chain to request from a federation chain server to verify data in the regional chain network of the federation chain and identity information (i.e., an electronic signature value) of the corresponding information provider.
Step 102, determining a data verification target based on the information verification request.
In one embodiment, the intelligent contract may identify the indicated intelligent contract as the data validation target.
And 103, acquiring intelligent contract attribute information, basic data set and basic data abstract attribute information of the data verification target from the block chain network.
Wherein the intelligent contract attribute information includes an intelligent contract and a home-side electronic signature value for the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphically encrypted basic data; the basic data digest attribute information includes a homomorphically encrypted basic data digest and an attribution side electronic signature value of the basic data digest.
In this step, the alliance link server needs to obtain the intelligent contract attribute information, the basic data set and the basic data abstract attribute information of the data verification target from the blockchain network.
The code information for data analysis is stored in the blockchain network in the form of an intelligent contract, and meanwhile, the basic data is also stored in the blockchain network after homomorphic encryption, so that the alliance chain server can calculate and obtain data analysis result information based on the information and provide the data analysis result information for a user to check on the premise of not revealing original information.
In order to ensure that the original information is not leaked after the basic data and the basic data abstract are provided for the user, homomorphic encryption is required to be adopted to process the data so as to ensure the security of the data.
In addition, in this step, the electronic signature value of the attribution side of the basic data digest and the electronic signature value of the attribution side of the intelligent contract need to be obtained, so as to be provided to the user, and the user can know the authenticity of the intelligent contract used by the federation chain server for generating the data analysis result information and the authenticity of the basic data digest fed back by the federation chain server based on the electronic signature values, and further can know the authenticity of the data to be verified by using the data analysis result information and the basic data digest fed back by the federation chain server.
In one embodiment, the homomorphic encrypted base data may be all or part of the base data used by the data analysis algorithm.
For the purpose of clearly illustrating the technical effects of the present invention, the following detailed descriptions of the blockchain, homomorphic encryption technology and intelligent contracts are provided as follows:
block chains: the system is essentially a decentralized database, and is a string of data blocks which are associated by using a cryptographic method, and each data block contains information of service data for verifying the validity of the information.
Homomorphic encryption: a function of processing encrypted data is provided. That is, others can process the encrypted data, but the process does not reveal any of the original content. Meanwhile, the user with the key decrypts the processed data to obtain the processed result. Let us take an example in real life. A user called Alice bought a large piece of gold that she wanted to make into a necklace. However, a worker may steal gold during the manufacturing process, namely …, which is a gram of gold and much money, so that there is no method for the worker to process the gold block (missing processing of your data), but not get any gold (missing accessing to it)? Of course, Alice can do this: alice locks the gold in a closed box, which houses a glove. The worker can carry the glove to treat the gold inside the box. However, the box is locked, so that the worker cannot not only take the gold blocks, but also any gold falling off in the treatment process. And (5) finishing the processing. Alice returns the box and opens the lock to obtain the gold.
Intelligent contract: a piece of code running on top of a blockchain, a computer protocol intended to propagate, verify, or execute contracts in an informational manner. Smart contracts allow trusted transactions to be conducted without third parties, which transactions are traceable and irreversible.
And 104, generating data analysis result information based on the intelligent contract and the basic data set.
And 105, feeding back the data analysis result information, the electronic signature value of the attribution party of the intelligent contract and the basic data abstract information.
Further, the alliance link server can provide basic data key point data and a value range of the key points for the user according to the information verification request, so that the user can further verify the authenticity of the purchased data analysis result information. Specifically, in one implementation, the method embodiment may further include:
acquiring and feeding back a key point attribute value and a value range attribute value of the key point of the data verification target from a block chain network; the key point attribute values are encrypted using a zero knowledge proof technique.
It should be noted that: a zero knowledge proof means that the prover can convince the verifier that some argument is correct without providing the verifier with any useful information. If a wants to prove to B that he has the key of a certain room, the room can be unlocked only by the key, but not by any other method. B determines that there is an object in the room, A opens the door of the room with its own key, and then takes the object out to show B, thus proving that it really has the key of the room. This is a zero knowledge proof. The key proof method has the advantages that the B can not see the key appearance all the time in the whole proving process, and therefore the key is prevented from being leaked.
In the method, the key points encrypted by the zero-knowledge proof technology and the value range of each key point are obtained, so that a user does not need to see all basic data, and whether the key points in the analysis result information of the data to be verified are in the corresponding value range fed back by the alliance link server or not is judged based on the value range of the key points, and the authenticity of the analysis result information of the data to be verified can be obtained.
It can be seen from the above embodiment that, in the scheme, all basic data and data analysis algorithms do not need to be provided for the user, but the alliance chain server obtains pre-stored intelligent contract attribute information, basic data set and basic data abstract attribute information of a data verification target from the blockchain network, generates data analysis result information based on the information, and feeds back the data analysis result information, the electronic signature value of the intelligent contract and the basic data abstract information to the user together, so that the security of the verification information can be ensured, and the user can know the authenticity of the held data analysis result information based on the verification information on the premise of not obtaining the data analysis algorithms and all the basic data.
Corresponding to the foregoing method embodiment, an embodiment of the present invention provides a feedback device for data verification information, which is applied to a federation link server, and includes:
a request receiving module 201, configured to receive an information verification request;
a target determination module 202, configured to determine a data verification target based on the information verification request;
an information obtaining module 203, configured to obtain, from a blockchain network, intelligent contract attribute information, a basic data set, and basic data summary attribute information of the data verification target; wherein the intelligent contract attribute information includes an intelligent contract and a home-side electronic signature value for the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphically encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
a data analysis module 204, configured to generate data analysis result information based on the intelligent contract and the basic data set;
and the information feedback module 205 is configured to feed back the data analysis result information, the electronic signature value of the owner of the intelligent contract, and the basic data summary information.
In an embodiment, the information obtaining module 203 is further configured to obtain a key point attribute value of the data verification target and a value range attribute value of a key point from a blockchain network, where the key point attribute value is encrypted by using a zero knowledge proof technique;
the information feedback module 205 is further configured to feed back the attribute value of the key point and the attribute value of the value range of the key point.
In one embodiment, the information verification request includes an intelligent contract identification of data to be verified.
In an embodiment, the target determining module 201 is specifically configured to determine a data verification target, and includes: and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
Based on the above method embodiment, the embodiment of the invention also discloses a feedback device of data verification information, which comprises a processor and a memory;
the memory stores an application program executable by the processor for causing the processor to execute the feedback method of data authentication information as described above.
Based on the above method embodiments, the present invention discloses a computer-readable storage medium, in which computer-readable instructions are stored, and the computer-readable instructions are used for executing the feedback method of data verification information as described above.
In the above embodiments, the memory may be specifically implemented as various storage media such as an Electrically Erasable Programmable Read Only Memory (EEPROM), a Flash memory (Flash memory), a Programmable Read Only Memory (PROM), and the like. The processor may be implemented to include one or more central processors or one or more field programmable gate arrays, wherein the field programmable gate arrays integrate one or more central processor cores. In particular, the central processor or central processor core may be implemented as a CPU or MCU.
It should be noted that not all steps and modules in the above flows and structures are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The division of each module is only for convenience of describing adopted functional division, and in actual implementation, one module may be divided into multiple modules, and the functions of multiple modules may also be implemented by the same module, and these modules may be located in the same device or in different devices.
The hardware modules in the various embodiments may be implemented mechanically or electronically. For example, a hardware module may include specially designed permanent circuits or logic devices (e.g., a special purpose processor such as an FPGA or ASiC) for performing specific operations. A hardware module may also include programmable logic devices or circuits (e.g., including a general-purpose processor or other programmable processor) that are temporarily configured by software to perform certain operations. The implementation of the hardware module in a mechanical manner, or in a dedicated permanent circuit, or in a temporarily configured circuit (e.g., configured by software), may be determined based on cost and time considerations.
Examples of the storage medium for supplying the program code include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs, DVD + RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or the cloud by a communication network.
"exemplary" means "serving as an example, instance, or illustration" herein, and any illustration, embodiment, or steps described as "exemplary" herein should not be construed as a preferred or advantageous alternative. For the sake of simplicity, the drawings are only schematic representations of the parts relevant to the invention, and do not represent the actual structure of the product. In addition, in order to make the drawings concise and understandable, components having the same structure or function in some of the drawings are only schematically illustrated or only labeled. In this document, "a" does not mean that the number of the relevant portions of the present invention is limited to "only one", and "a" does not mean that the number of the relevant portions of the present invention "more than one" is excluded. In this document, "upper", "lower", "front", "rear", "left", "right", "inner", "outer", and the like are used only to indicate relative positional relationships between relevant portions, and do not limit absolute positions of the relevant portions.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
In summary, the above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A feedback method of data verification information is applied to a alliance link server and comprises the following steps:
receiving an information verification request;
determining a data verification target based on the information verification request;
acquiring intelligent contract attribute information, a basic data set and basic data abstract attribute information of the data verification target from a block chain network;
wherein the intelligent contract attribute information includes an intelligent contract and a home-side electronic signature value for the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphically encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
generating data analysis result information based on the intelligent contract and the basic data set;
and feeding back the data analysis result information, the electronic signature value of the attribution party of the intelligent contract and the basic data summary information.
2. The method of claim 1, further comprising:
acquiring and feeding back a key point attribute value and a value range attribute value of the key point of the data verification target from a block chain network; the key point attribute values are encrypted using a zero knowledge proof technique.
3. The method of claim 1,
the information verification request comprises an intelligent contract identification of data to be verified.
4. The method of claim 3, wherein determining a data validation target comprises:
and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
5. A feedback device of data authentication information is applied to a federation link server, and comprises:
the request receiving module is used for receiving an information verification request;
a target determination module for determining a data verification target based on the information verification request;
the information acquisition module is used for acquiring intelligent contract attribute information, a basic data set and basic data abstract attribute information of the data verification target from a block chain network; wherein the intelligent contract attribute information includes an intelligent contract and a home-side electronic signature value for the intelligent contract; the intelligent contract is code information for data analysis; the basic data set comprises homomorphically encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
the data analysis module is used for generating data analysis result information based on the intelligent contract and the basic data set;
and the information feedback module is used for feeding back the data analysis result information, the attribution party electronic signature value of the intelligent contract and the basic data abstract information.
6. The apparatus according to claim 1, wherein the information obtaining module is further configured to obtain, from a blockchain network, a key point attribute value and a value range attribute value of a key point of the data verification target, where the key point attribute value is encrypted by using a zero knowledge proof technique;
and the information feedback module is further used for feeding back the attribute value of the key point and the value range attribute value of the key point.
7. The apparatus of claim 1,
the information verification request comprises an intelligent contract identification of data to be verified.
8. The apparatus of claim 7, wherein the target determination module, specifically configured to determine a data verification target, comprises: and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
9. The feedback device of the data authentication information is characterized by comprising a processor and a memory;
the memory stores an application program executable by the processor for causing the processor to perform the feedback method of data authentication information according to any one of claims 1 to 4.
10. A computer-readable storage medium having stored therein computer-readable instructions for performing the method of data validation information feedback according to any one of claims 1 to 4.
CN202011285006.XA 2020-11-17 2020-11-17 Feedback method and device for data verification information Active CN113765875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011285006.XA CN113765875B (en) 2020-11-17 2020-11-17 Feedback method and device for data verification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011285006.XA CN113765875B (en) 2020-11-17 2020-11-17 Feedback method and device for data verification information

Publications (2)

Publication Number Publication Date
CN113765875A true CN113765875A (en) 2021-12-07
CN113765875B CN113765875B (en) 2023-09-26

Family

ID=78786109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011285006.XA Active CN113765875B (en) 2020-11-17 2020-11-17 Feedback method and device for data verification information

Country Status (1)

Country Link
CN (1) CN113765875B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848058A (en) * 2018-05-07 2018-11-20 众安信息技术服务有限公司 Intelligent contract processing method and block catenary system
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN110210961A (en) * 2019-05-21 2019-09-06 平安普惠企业管理有限公司 Data capture method, server and computer storage medium based on alliance's chain
CN110782347A (en) * 2019-10-22 2020-02-11 全链通有限公司 Intelligent contract signing method based on block chain, initiating node and medium
CN111767578A (en) * 2020-08-31 2020-10-13 支付宝(杭州)信息技术有限公司 Data inspection method, device and equipment
CN111770112A (en) * 2020-08-31 2020-10-13 支付宝(杭州)信息技术有限公司 Information sharing method, device and equipment
CN111800252A (en) * 2020-07-22 2020-10-20 深圳壹账通智能科技有限公司 Information auditing method and device based on block chain and computer equipment
CN111931196A (en) * 2020-06-02 2020-11-13 山东浪潮质量链科技有限公司 Method, equipment and medium for realizing zero knowledge proof based on block chain intelligent contract

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848058A (en) * 2018-05-07 2018-11-20 众安信息技术服务有限公司 Intelligent contract processing method and block catenary system
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN110210961A (en) * 2019-05-21 2019-09-06 平安普惠企业管理有限公司 Data capture method, server and computer storage medium based on alliance's chain
CN110782347A (en) * 2019-10-22 2020-02-11 全链通有限公司 Intelligent contract signing method based on block chain, initiating node and medium
CN111931196A (en) * 2020-06-02 2020-11-13 山东浪潮质量链科技有限公司 Method, equipment and medium for realizing zero knowledge proof based on block chain intelligent contract
CN111800252A (en) * 2020-07-22 2020-10-20 深圳壹账通智能科技有限公司 Information auditing method and device based on block chain and computer equipment
CN111767578A (en) * 2020-08-31 2020-10-13 支付宝(杭州)信息技术有限公司 Data inspection method, device and equipment
CN111770112A (en) * 2020-08-31 2020-10-13 支付宝(杭州)信息技术有限公司 Information sharing method, device and equipment

Also Published As

Publication number Publication date
CN113765875B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
CN110377239B (en) Data signature method, device, server, system and storage medium
US11888974B1 (en) Secret sharing information management and security system
CN111327564B (en) Access method and device for alliance chain
CN107832632B (en) Asset certification authorization query method, system, electronic device and computer readable storage medium
US11711205B2 (en) Unified secure device provisioning
EP3702950B1 (en) Computer system and method for distributed privacy-preserving shared execution of one or more processes
US20210391991A1 (en) Linking identities in a distributed database
CN112491843A (en) Database multiple authentication method, system, terminal and storage medium
Niya et al. KYoT: Self-sovereign IoT identification with a physically unclonable function
CN115460019B (en) Method, apparatus, device and medium for providing digital identity-based target application
CN114881757A (en) Letter method, system and electronic equipment
CN108540447A (en) A kind of certification authentication method and system based on block chain
CN113326535B (en) Information verification method and device
Islam et al. Remote configuration of integrated circuit features and firmware management via smart contract
CN116132071B (en) Identity authentication method and device for identification analysis node based on blockchain
US11863689B1 (en) Security settlement using group signatures
CN116527330A (en) System login method and device, storage medium and electronic equipment
CN113765875B (en) Feedback method and device for data verification information
CN110866069B (en) Identity management metadata processing method and system based on block chain
Majd et al. Secure and Cost Effective IoT Authentication and Data Storage Framework using Blockchain NFT
CN117155553A (en) Certificate storing method, device, medium and equipment
CN114710362A (en) Identity authentication method and device based on block chain and electronic equipment
CN116975901A (en) Identity verification method, device, equipment, medium and product based on block chain
US20240046258A1 (en) Group payment accounts
CN114172666A (en) Block chain identification-based digital certificate multistage processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20221220

Address after: 6 / F, 76 Zhichun Road, Haidian District, Beijing 100086

Applicant after: Beijing Jingdong Zhenshi Information Technology Co.,Ltd.

Applicant after: Beijing Jingdong Qianshi Technology Co.,Ltd.

Address before: Room a1905, 19th floor, building 2, No.18, Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant before: Beijing Jingdong Qianshi Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant