CN114119043A - Supplier credit information credible sharing management method based on block chain - Google Patents
Supplier credit information credible sharing management method based on block chain Download PDFInfo
- Publication number
- CN114119043A CN114119043A CN202111328380.8A CN202111328380A CN114119043A CN 114119043 A CN114119043 A CN 114119043A CN 202111328380 A CN202111328380 A CN 202111328380A CN 114119043 A CN114119043 A CN 114119043A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- supplier
- credit information
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 14
- 238000013475 authorization Methods 0.000 claims abstract description 26
- 238000000034 method Methods 0.000 claims abstract description 20
- 238000012545 processing Methods 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims abstract description 17
- 238000004364 calculation method Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Entrepreneurship & Innovation (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a supplier credit information credible sharing management method based on a block chain, which comprises the following steps: s1, constructing a block chain network bottom platform and supporting data sharing exchange; s2, linking the contracting party with the blockchain network, and distributing an independent blockchain distributed identity; s3, when the contractor uploads the data, processing the uploaded data based on the block chain distributed identity, and uploading the data to the block chain network after the processing is finished; and S4, when the user acquires the data, the user initiates authorization to the transmitter, verifies and processes the signature data, and feeds back the data processing or verification result to the user after the verification is completed. The credible sharing overall process security of the credit information of the supplier is strong, the purpose that the desired result or information element can be obtained only in the final link is achieved through identity verification of a requesting party, encryption protection of private data and decryption calculation of an intelligent contract, and a block chain, a digital signature and an authorization control flow are combined to form a new application flow.
Description
Technical Field
The invention relates to the technical field of block chain data sharing, in particular to a supplier credit information credible sharing management method based on a block chain.
Background
At present, the trusted sharing of credit information of a provider generally refers to trusted sharing data of credit information provided by the provider, such as management information, business license information, and the like. Under the traditional information framework, each supplier manages the basic data of each supplier by a purchasing platform to form an information isolated island, so that the difficult problem of mutual distrust between a purchasing party and the supplier or a multi-party main body is caused. Through information-based construction in recent years, more and more areas adopt a data sharing architecture to perform information application of material purchasing data, and a data sharing center is formed to receive, manage and open material purchasing basic data, so that a purchasing party or a multi-party main body can acquire the corresponding purchasing basic data in various ways.
However, such application mode is difficult to give a greater contribution to data value, and the main reason is that most data generated by multiple parties are confidential information existing in the purchasing process, and the confidential information is difficult to open supplier data in the existing data sharing center mode, and is difficult to ensure that the whole process of data sharing and exchange has a good confidential protection mechanism, so that the multiple parties are difficult to generate uniform trust, and the data wanted by the data application party is not open, and the open data is not wanted.
Therefore, the technology and the security mechanism for realizing the whole traceable process of the credit information data of the supplier and the invisible available secret information of the supplier are realized, the data security worry generated by a multi-party main body is eliminated, and the sharing of the basic information of the supplier is promoted, which is a problem to be solved by the technical personnel in the field.
Disclosure of Invention
In view of the above, the present invention provides a block chain-based trusted sharing management method for provider credit information, which has high security in the whole trusted sharing process of provider credit information, and realizes that a desired result or information element can be obtained only in the final link from identity verification of a requesting party, encryption protection of private data, and decryption calculation of an intelligent contract, and combines a block chain, a digital signature, and an authorization control flow to form a new application flow.
In order to achieve the purpose, the invention adopts the following technical scheme:
a supplier credit information credible sharing management method based on a block chain comprises the following steps:
s1, constructing a block chain network bottom platform and supporting data sharing exchange;
s2, linking a contractual party with the blockchain network, issuing a CA certificate for identifying identity to each supplier through the blockchain, and issuing the CA certificate for identifying identity to a distributed blockchain for storage;
s3, when the contractor uploads the data, processing the uploaded data based on the block chain distributed identity, and uploading the data to the block chain network after the processing is finished;
and S4, when the user acquires the data, the user initiates authorization to the transmitter, verifies and processes the signature data, and feeds back the data processing or verification result to the user after the verification is completed.
Preferably, the contracting party in the step S2 includes a transmitting party and a using party, and specifically includes: supplier, certification service provider, administration, purchasing entity.
Preferably, the step S3 specifically includes:
s31, signing the data through the block chain distributed identity;
s32, in the material procurement application mode, in order to ensure mutual trust between multiple parties, the supplier links the relevant credit information to the block chain, and the linked trusted data includes: the system comprises a supplier business license, an operating license and company related information, and is characterized in that a CA certificate bound to a supplier is bound with trusted data, and trusted inquiry service is provided for the trusted data of the supplier through a block chain.
Preferably, the step S4 specifically includes:
s41, the user initiates authorization to the data transmitter;
s42, generating and recording an authorization request based on the block chain network, providing the authorization request service to a user for authorization, and forming a record on the block chain;
s43, in order to ensure credibility of supplier credit information by a partner, triggering an intelligent contract rule on a block chain through a block chain intelligent contract with service characteristics, checking corresponding service data and signature data, checking authorization information, and providing encryption guarantee for confidential data based on block chain encryption service;
and S44, feeding back the final supplier credible data processing or supplier credible verification result to the user.
According to the technical scheme, compared with the prior art, the supplier credit information credible sharing management method based on the block chain is provided, the supplier credit information credible sharing overall process is high in safety, the purpose that the desired result or information element can be obtained only in the final link is achieved through identity verification of a requester, encryption protection of private data and decryption calculation of an intelligent contract, and the block chain, the digital signature and the authorization control flow are combined to form a new application flow.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a block chain structure diagram according to the present invention.
Fig. 2 is a schematic diagram of a management flow structure provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a supplier credit information credible sharing management method based on a block chain, which comprises the following steps:
s1, constructing a block chain network bottom platform and supporting data sharing exchange;
s2, linking a contractual party with the blockchain network, issuing a CA certificate for identifying identity to each supplier through the blockchain, and issuing the CA certificate for identifying identity to a distributed blockchain for storage;
s3, when the contractor uploads the data, processing the uploaded data based on the block chain distributed identity, and uploading the data to the block chain network after the processing is finished;
and S4, when the user acquires the data, the user initiates authorization to the transmitter, verifies and processes the signature data, and feeds back the data processing or verification result to the user after the verification is completed.
In order to further optimize the above technical solution, the contracting party in step S2 includes a transmitting party and a using party, and specifically includes: supplier, certification service provider, administration, purchasing entity.
To further optimize the above technical solution, step S3 specifically includes:
s31, signing the data through the block chain distributed identity;
s32, in the material procurement application mode, in order to ensure mutual trust between multiple parties, the supplier links the relevant credit information to the block chain, and the linked trusted data includes: the system comprises a supplier business license, an operating license and company related information, and is characterized in that a CA certificate bound to a supplier is bound with trusted data, and trusted inquiry service is provided for the trusted data of the supplier through a block chain.
To further optimize the above technical solution, step S4 specifically includes:
s41, the user initiates authorization to the data transmitter;
s42, generating and recording an authorization request based on the block chain network, providing the authorization request service to a user for authorization, and forming a record on the block chain;
s43, in order to ensure credibility of supplier credit information by a partner, triggering an intelligent contract rule on a block chain through a block chain intelligent contract with service characteristics, checking corresponding service data and signature data, checking authorization information, and providing encryption guarantee for confidential data based on block chain encryption service;
and S44, feeding back the final supplier credible data processing or supplier credible verification result to the user.
Establishing a block chain network bottom platform for supporting data sharing exchange, wherein related units such as a supplier, an authentication service provider, a supervision unit, a purchase unit and the like are used as participants of a block chain network, and are respectively distributed with an exclusive block chain distributed identity; secondly, processing is carried out before the secret data of material purchase generated by the multi-party main body is shared, the block chain distributed identity is used for signing the data, and data services or data packets are provided according to different application modes to carry out data confirmation through the block chain; when the data is applied, the data using party initiates authorization, generates and records an authorization request based on a block chain, finally checks signature data, checks authorization information and processes confidential data based on intelligent contract service through a block chain intelligent contract with service characteristics, and feeds back the final data processing or verification result to the data using party.
The credible sharing of the credit information of the supplier is completed by the participation of the supplier, the authentication service provider, the supervision and purchase unit and other multi-party main bodies, and the multi-node certification of the block chain is realized.
The credible sharing overall process of the credit information of the supplier has strong safety, and the method realizes that the desired result or information element can be obtained only in the final link from the identity verification of a requesting party, the encryption protection of private data and the decryption calculation of an intelligent contract.
The innovation of the technical application, the common block chain and digital signature application are simply applied in the signature and signature verification process, and the block chain, the digital signature and the authorization control process are combined to form a new application process by considering distrusted factors existing in human, technical codes and the like.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (4)
1. A supplier credit information credible sharing management method based on a block chain is characterized by comprising the following steps:
s1, constructing a block chain network bottom platform and supporting data sharing exchange;
s2, linking a contractual party with the blockchain network, issuing a CA certificate for identifying identity to each supplier through the blockchain, and issuing the CA certificate for identifying identity to a distributed blockchain for storage;
s3, when the contractor uploads the data, processing the uploaded data based on the block chain distributed identity, and uploading the data to the block chain network after the processing is finished;
and S4, when the user acquires the data, the user initiates authorization to the transmitter, verifies and processes the signature data, and feeds back the data processing or verification result to the user after the verification is completed.
2. The block chain-based trusted provider credit information sharing management method according to claim 1, wherein said contractual party in step S2 includes a transmitting party and a using party, and specifically includes: supplier, certification service provider, administration, purchasing entity.
3. The method for trusted sharing management of provider credit information based on block chain according to claim 1, wherein the step S3 specifically includes:
s31, signing the data through the block chain distributed identity;
s32, in the material procurement application mode, in order to ensure mutual trust between multiple parties, the supplier links the relevant credit information to the block chain, and the linked trusted data includes: the system comprises a supplier business license, an operating license and company related information, and is characterized in that a CA certificate bound to a supplier is bound with trusted data, and trusted inquiry service is provided for the trusted data of the supplier through a block chain.
4. The method for trusted sharing management of provider credit information based on block chain according to claim 1, wherein the step S4 specifically includes:
s41, the user initiates authorization to the data transmitter;
s42, generating and recording an authorization request based on the block chain network, providing the authorization request service to a user for authorization, and forming a record on the block chain;
s43, in order to ensure credibility of supplier credit information by a partner, triggering an intelligent contract rule on a block chain through a block chain intelligent contract with service characteristics, checking corresponding service data and signature data, checking authorization information, and providing encryption guarantee for confidential data based on block chain encryption service;
and S44, feeding back the final supplier credible data processing or supplier credible verification result to the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111328380.8A CN114119043A (en) | 2021-11-10 | 2021-11-10 | Supplier credit information credible sharing management method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111328380.8A CN114119043A (en) | 2021-11-10 | 2021-11-10 | Supplier credit information credible sharing management method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114119043A true CN114119043A (en) | 2022-03-01 |
Family
ID=80378433
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111328380.8A Pending CN114119043A (en) | 2021-11-10 | 2021-11-10 | Supplier credit information credible sharing management method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114119043A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108765058A (en) * | 2018-04-28 | 2018-11-06 | 中国科学院信息工程研究所 | A kind of safe Synergistic method of manufacture link multiple entity based on block chain |
CN110309634A (en) * | 2019-04-04 | 2019-10-08 | 深圳大通实业股份有限公司 | A kind of credible advertisement data management system based on block chain |
US20200065761A1 (en) * | 2017-03-05 | 2020-02-27 | Shona TATCHELL | System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts |
CN112417510A (en) * | 2020-12-09 | 2021-02-26 | 南威软件股份有限公司 | Credible sharing method for protecting government affair private data based on block chain |
CN112685790A (en) * | 2021-03-19 | 2021-04-20 | 中企链信(北京)科技有限公司 | Block chain data security and privacy protection method |
-
2021
- 2021-11-10 CN CN202111328380.8A patent/CN114119043A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200065761A1 (en) * | 2017-03-05 | 2020-02-27 | Shona TATCHELL | System and method for provision of supply chain financing of ethically verified product where there has been verification of production processes and products inspection using blockchain smart contracts |
CN108765058A (en) * | 2018-04-28 | 2018-11-06 | 中国科学院信息工程研究所 | A kind of safe Synergistic method of manufacture link multiple entity based on block chain |
CN110309634A (en) * | 2019-04-04 | 2019-10-08 | 深圳大通实业股份有限公司 | A kind of credible advertisement data management system based on block chain |
CN112417510A (en) * | 2020-12-09 | 2021-02-26 | 南威软件股份有限公司 | Credible sharing method for protecting government affair private data based on block chain |
CN112685790A (en) * | 2021-03-19 | 2021-04-20 | 中企链信(北京)科技有限公司 | Block chain data security and privacy protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107180350B (en) | Method, device and system for multi-party sharing transaction metadata based on block chain | |
CN108564353B (en) | Payment system and method based on block chain | |
CN109345438B (en) | Privacy-protection alliance taxi taking method and system | |
CN111970129B (en) | Data processing method and device based on block chain and readable storage medium | |
CN108667612B (en) | Trust service architecture and method based on block chain | |
CN107528835B (en) | User privacy protection method based on security intelligent contract k-anonymous incentive mechanism | |
CN1184767C (en) | Digitally signing agreements from remotely located nodes | |
CN111400749B (en) | Government affair financial data sharing platform based on block chain and implementation method thereof | |
US7184988B1 (en) | Methods for operating infrastructure and applications for cryptographically-supported services | |
KR102307574B1 (en) | Cloud data storage system based on blockchain and method for storing in cloud | |
CN115699000A (en) | Method, apparatus and computer readable medium for secure multilateral data exchange over a computer network | |
WO2022121058A1 (en) | Blockchain-based trusted sharing method for protection of privacy-related government data | |
CN110414270B (en) | Personal data protection system and method based on block chain | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
US20100275015A1 (en) | Anonymous register system and method thereof | |
CN114329529A (en) | Asset data management method and system based on block chain | |
JP2023527811A (en) | Method, apparatus, and computer readable medium for authentication and authorization of networked data transactions | |
EP3376708A1 (en) | Anonymous communication system and method for subscribing to said communication system | |
CN111865917B (en) | Block chain-based safe delivery method, system and medium for Internet of things equipment | |
CN113515756B (en) | High-credibility digital identity management method and system based on block chain | |
CN113657978A (en) | Distributed energy auction method and system based on block chain and privacy protection | |
CN114565386A (en) | Block chain escrow transaction method and system with multi-party cooperative privacy protection | |
CN115396096A (en) | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm | |
CN115310071A (en) | Method for digital loading design and application of government affair credible certificate | |
CN115913513A (en) | Distributed credible data transaction method, system and device supporting privacy protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |