CN114548983A - Block chain private data processing method, carbon transaction implementation method and system - Google Patents

Block chain private data processing method, carbon transaction implementation method and system Download PDF

Info

Publication number
CN114548983A
CN114548983A CN202110987864.7A CN202110987864A CN114548983A CN 114548983 A CN114548983 A CN 114548983A CN 202110987864 A CN202110987864 A CN 202110987864A CN 114548983 A CN114548983 A CN 114548983A
Authority
CN
China
Prior art keywords
data
processing
hash
signature
carbon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110987864.7A
Other languages
Chinese (zh)
Inventor
林滨
杨顺福
龙江江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Haxi Technology Co ltd
Original Assignee
Xiamen Haxi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Haxi Technology Co ltd filed Critical Xiamen Haxi Technology Co ltd
Priority to CN202110987864.7A priority Critical patent/CN114548983A/en
Publication of CN114548983A publication Critical patent/CN114548983A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/80Management or planning
    • Y02P90/84Greenhouse gas [GHG] management systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a block chain privacy data processing method, a carbon transaction implementation method and a system, wherein the method comprises the following steps: the method comprises the steps that an application layer obtains original data to be transmitted by a user, and first encryption processing is carried out on the original data to obtain first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to the blockchain; the block chain intelligent contract layer carries out second decryption processing on second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data. The invention can ensure the data security in the interaction process of the block chain and maintain the benefits of users.

Description

Block chain private data processing method, carbon transaction implementation method and system
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain privacy data processing method, a carbon transaction implementation method and a system.
Background
The BlockChain technology is a new emerging technology appearing in the field of financial technology (FinTech) in recent years, has unique properties of decentralization, information non-tampering, multi-node collective maintainability, publicity, privacy protection and the like, and can record and provide credible transaction information data in the internet based on the non-credibility. The block chain mainly comprises four components of a P2P network, cryptography, a consensus mechanism and an intelligent contract, and unique characteristics of the block chain are guaranteed through technical integration in four fields.
In the process of combining the blockchain and the scene application, data interaction is often needed, and particularly, an intelligent contract of the blockchain needs service data to complete certain service logic verification.
In the prior art, data provided by an application layer (such as an application platform) to a block chain is usually desensitized data or plain text; however, in some scenarios, the aforementioned data interaction method cannot meet application requirements, for example, information related to personal dimensions such as points and accounts checking is expected to be established in a blockchain, rather than a pure evidence storage service.
In the existing carbon trust transaction scene, a blockchain technology is used as an asset retention certificate of a user, but in the current application layer and blockchain information interaction, the plaintext or desensitization data is used before, and in the scene, if the user asset is registered in the blockchain in an application, the interaction has certain risks. And the encryption algorithm commonly used by the application layer is difficult to use in the intelligent contract at present, so that a decryption processing method which can be used for encryption in the application layer and is used in the block chain intelligent contract layer is needed.
Disclosure of Invention
The invention mainly aims to overcome the defects in the prior art and provides a block chain privacy data processing method, a carbon transaction implementation method and a system.
The invention adopts the following technical scheme:
in a first aspect, a method for processing block chain privacy data includes:
the method comprises the steps that an application layer obtains original data to be transmitted by a user, and first encryption processing is carried out on the original data to obtain first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain;
the block chain intelligent contract layer carries out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
Preferably, the first encryption process is implemented in the same manner as the second encryption process.
Preferably, the method for implementing the first encryption processing and the method for implementing the second encryption processing specifically include:
converting the original data/splicing data into character strings, and performing cyclic traversal on the character strings to obtain each character in the character strings; and each character is converted into ASCII code; and combining and splicing each converted character and a character randomly acquired from the ASCII code comparison table to obtain first encrypted data/second encrypted data.
Preferably, the hashing the original data to obtain hash data, and the signing the hash data to obtain signature data specifically include:
carrying out hash processing on the original data to obtain hash data, and carrying out signature processing on the hash data by using a user private key and an elliptic curve algorithm secp256k1 to obtain signature data;
the method includes the steps of carrying out hash processing on original data to obtain hash data, carrying out signature verification on signature data based on the hash data, and specifically including:
and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data and the user key.
In a second aspect, a blockchain private data processing system includes:
the application layer is used for acquiring original data to be transmitted by a user and carrying out first encryption processing on the original data to acquire first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain;
the intelligent contract layer of the block chain is used for carrying out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
In a third aspect, a carbon transaction implementation method includes:
the method comprises the steps that an application platform obtains data to be traded of a user, encrypts and signs the data to be traded to obtain encrypted data, and transmits the encrypted data to a block chain; the data to be traded comprises low carbon behavior data, carbon emission reduction data or carbon energy reward data;
and the block chain transaction platform decrypts and checks the encrypted data received by the block chain, and if the check is successful, the decrypted data is operated according to a pre-stored intelligent contract to complete the carbon-related transaction.
Preferably, the method for processing the block chain comprises the steps that the application platform obtains data to be traded of a user, encrypts and signs the data to be traded to obtain encrypted data, and transmits the encrypted data to the block chain, and specifically comprises the following steps:
the method comprises the steps that an application platform obtains data to be traded of a user, and first encryption processing is carried out on the data to be traded to obtain first encrypted data; carrying out hash processing on the data to be traded to obtain hash data, and carrying out signature processing on the hash data by using a user private key and an elliptic curve algorithm secp256k1 to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain.
Preferably, the blockchain transaction platform decrypts and checks the encrypted data received by the blockchain, and if the check of the encrypted data is successful, operates the decrypted data according to a pre-stored intelligent contract to complete the carbon-related transaction, specifically including:
the block chain transaction platform carries out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; carrying out first decryption processing on the first encrypted data to obtain data to be traded; performing hash processing on data to be transacted to obtain hash data, and verifying the signature of the signature data based on the hash data and a user key; and if the signature verification is successful, operating the decrypted data to be traded according to a pre-stored intelligent contract to complete the carbon-related transaction.
Preferably, the low-carbon behavior data comprises one or more of low-carbon traffic behavior data, power-on energy-saving behavior data and forestry carbon sink behavior; the carbon emission reduction data is carbon dioxide emissions reduced by low carbon activity; the carbon energy reward data is a reward based on carbon reduction conversion, and comprises one or more of points, vouchers, item redemption tickets and software members.
In a fourth aspect, a carbon transaction fulfillment system, comprising:
the application platform is used for acquiring data to be traded of a user, encrypting and signing the data to be traded to obtain encrypted data, and transmitting the encrypted data to the block chain; the data to be traded comprises low carbon behavior data, carbon emission reduction data or carbon energy reward data;
and the blockchain transaction platform is used for decrypting and checking the encrypted data received by the blockchain, and if the checking is successful, operating the decrypted data according to a pre-stored intelligent contract to complete the carbon-related transaction.
As can be seen from the above description of the present invention, compared with the prior art, the present invention has the following advantages:
(1) the invention encrypts and signs the data to be transmitted on the application layer, decrypts and signs the data on the block chain intelligent contract layer, namely, the encryption and decryption algorithm based on the solid intelligent contract is realized; on one hand, data transmission through a ciphertext is supported (namely sensitive/private data transmission can be supported), on the other hand, private key signature and signature verification are supported, whether the process is tampered (such as packet grabbing tampering) or not can be verified, authenticity and safety of data in a block chain interaction process are guaranteed, and user benefits are maintained;
(2) according to the invention, the original data of the data to be transmitted is subjected to the first encryption processing and the signature processing, the data subjected to the first encryption processing and the signature processing is spliced, and the spliced data is subjected to the second encryption processing, so that the security of ciphertext transmission is further improved by twice encryption;
(3) according to the invention, the carbon related data to be traded of the user is acquired at the application platform for encryption and signature processing, decryption and signature verification processing are carried out at the block chain trading platform, the transmission of the carbon related trading data through a ciphertext is supported, and signature verification on the data is supported, so that the safety of personal/enterprise asset trading is effectively protected, and the enthusiasm of the personal/enterprise for participating in carbon emission reduction and carbon trading is promoted.
The above description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the description of the technical means more comprehensible.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
FIG. 1 is a flow chart of a method for processing block chain private data according to an embodiment of the present invention;
FIG. 2 is a schematic data processing diagram of a method for processing block chain privacy data according to an embodiment of the present invention;
FIG. 3 is a block chain private data processing system according to an embodiment of the present invention;
FIG. 4 is a flow chart of a carbon transaction implementation method of an embodiment of the invention;
FIG. 5 is an interaction diagram of a carbon transaction implementation method according to an embodiment of the invention;
fig. 6 is a schematic structural diagram of a carbon transaction implementation system according to an embodiment of the present invention;
fig. 7 is a block diagram of an electronic device according to an embodiment of the invention.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Referring to fig. 1, a method for processing block chain private data according to the present invention includes:
s101, an application layer obtains original data to be transmitted by a user, and first encryption processing is carried out on the original data to obtain first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain;
s102, the intelligent contract layer of the block chain performs second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
Specifically, the first decryption process is a process corresponding to the first encryption process, and can decrypt the ciphertext subjected to the first encryption process; the second decryption process is a process corresponding to the second encryption process, and can decrypt the ciphertext after the second encryption process.
In this embodiment, the implementation method of the first encryption process may be the same as the implementation method of the second encryption process.
The implementation method of the first encryption processing specifically includes:
converting the original data into character strings, and performing cyclic traversal on the character strings to obtain each character in the character strings;
and each character is converted into ASCII code; and combining and splicing each converted character and a character randomly acquired from the ASCII code comparison table to obtain first encrypted data.
The implementation method of the second encryption processing specifically includes:
converting the splicing data into character strings, and performing cyclic traversal on the character strings to obtain each character in the character strings;
and each character is converted into ASCII code; and combining and splicing each converted character and one character randomly acquired from the ASCII code comparison table to obtain second encrypted data.
It should be noted that the implementation method of the first encryption process may be different from the implementation method of the second encryption process. For example, the first encryption process may be implemented by the method described above, and the second encryption process may be implemented by another method, or the first encryption process may be implemented by another method and the second encryption process may be implemented by the method described above. The method is specifically set according to practical applications, and the embodiment is not limited.
Further, performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data specifically includes:
carrying out hash processing on the original data to obtain hash data, and carrying out signature processing on the hash data by using a user private key and an elliptic curve algorithm secp256k1 to obtain signature data;
the method includes the steps of carrying out hash processing on original data to obtain hash data, carrying out signature verification on signature data based on the hash data, and specifically including:
and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data and the user key.
Referring to fig. 2, in order to describe the block chain privacy data processing method of the present invention by taking a specific original data as an example, specifically, the method includes the following steps:
step 1, an application layer acquires original data RS to be transmitted by a user;
step 2, resolving the RS into a character string array which is represented by T [ ], wherein the length of the RS character string is represented by len;
step 3, for the character string T [, ]]And performing circular traversal, wherein x represents an index bit, and the index bit is increased. For example: original data RS ═ 123 qwipq 0x', then when x ═ 0, T [0 ═ 0]When x is 1, T1]When x is 9, T9 ═ 2', …]And x'. By cyclic traversalT[]And will be paired with T [ x ]]The value of (A) is converted into an ASCII code to obtain QxThen randomly obtaining a character S from the ASCII code comparison tablexEach of which is composed of T [ x ]]The value of (A) is converted into an ASCII code to obtain QxWith one random character S obtained at a timexCalculate rule (Q)x,Sx) To obtain Rx
Step 4, repeating step 3, and enabling R0+R1+......Rlen-1Splicing the character strings to finally obtain complete first encrypted data TRS;
step 5, performing hash calculation on the original data RS by using an SHA256 hash algorithm to obtain HS;
step 6, setting a user private key as P, and signing the HS by using the private key P and an elliptic curve algorithm secp256k1 to obtain a signature character string secpSignStr;
step 7, splicing the signature character string secpSignStr and the TRS obtained in the step 4 to obtain an SRS;
step 8, repeating the step 3 and the step 4 to perform traversal calculation on the SRS obtained in the step 7, and finally obtaining a complete signature encryption result ESRS, wherein the ESRS is second encryption data;
step 9, the application layer transmits the second encrypted data to a block chain;
step 10, the block chain intelligent contract layer performs second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
Referring to fig. 3, a blockchain private data processing system includes:
the application layer 301 is configured to obtain original data to be transmitted by a user, and perform first encryption processing on the original data to obtain first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain;
the block chain intelligent contract layer 302 is used for performing second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
The same block chain privacy data processing method is implemented by a block chain privacy data processing system, and the description is not repeated here.
In this embodiment, a method/system for processing block chain private data implements an encryption and decryption algorithm based on a security intelligent contract. Specifically, data to be transmitted is encrypted and signed at an application layer, and data is decrypted and signed at a block chain intelligent contract layer, so that on one hand, data transmission through a ciphertext (namely sensitive/private data transmission can be supported), on the other hand, private key signature and signature verification are supported, whether the process is tampered (such as package capture tampering) can be verified, the authenticity and the safety of the data in the block chain interaction process are ensured, and the benefit of a user is maintained; furthermore, the original data of the data to be transmitted is subjected to first encryption processing and signature processing, the data subjected to the first encryption processing and the signature processing are spliced, the spliced data is subjected to second encryption processing, and the security of ciphertext transmission is further improved through twice encryption.
Referring to fig. 4 and 5, a carbon transaction implementation method includes:
s401, an application platform acquires data to be traded of a user, encrypts and signs the data to be traded to obtain encrypted data, and transmits the encrypted data to a block chain; the data to be traded comprises low carbon behavior data, carbon emission reduction data or carbon energy reward data;
s402, the block chain transaction platform decrypts and checks the encrypted data received by the block chain, and if the check is successful, the decrypted data is operated according to a pre-stored intelligent contract to complete the carbon-related transaction.
In this embodiment, the obtaining, by the application platform, data to be traded of a user, encrypting and signing the data to be traded to obtain encrypted data, and transmitting the encrypted data to the block chain specifically includes:
the method comprises the steps that an application platform obtains data to be traded of a user, and first encryption processing is carried out on the data to be traded to obtain first encrypted data; carrying out hash processing on the data to be traded to obtain hash data, and carrying out signature processing on the hash data by using a user private key and an elliptic curve algorithm secp256k1 to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain.
The block chain transaction platform decrypts and checks the encrypted data received by the block chain, and if the check is successful, the decrypted data is operated according to a pre-stored intelligent contract to complete the carbon-related transaction, which specifically comprises the following steps:
the block chain transaction platform carries out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; carrying out first decryption processing on the first encrypted data to obtain data to be traded; performing hash processing on data to be transacted to obtain hash data, and verifying the signature of the signature data based on the hash data and a user key; and if the signature verification is successful, operating the decrypted data to be traded according to a pre-stored intelligent contract to finish the carbon-related transaction.
It should be noted that the implementation method of the first encryption process may be different from the implementation method of the second encryption process. For example, the first encryption process may be implemented by the method described above, and the second encryption process may be implemented by another method, or the first encryption process may be implemented by another method and the second encryption process may be implemented by the method described above. The method is specifically set according to practical applications, and the embodiment is not limited.
Specifically, the low-carbon behavior data includes one or more of low-carbon traffic behavior data, energization energy-saving behavior data and forestry carbon sink behavior, and of course, other low-carbon behavior data may also be included; the carbon emission reduction data is the emission of carbon dioxide reduced by low-carbon behaviors, and the specific calculation method can be the conventional calculation method or an agreed calculation method; the carbon energy reward data is a reward based on carbon reduction conversion, and comprises one or more of points, vouchers, item redemption tickets and software members, and can also comprise other carbon energy reward data.
The low-carbon transportation behaviors can comprise walking behaviors, riding behaviors, traveling behaviors through public transportation and the like of the user.
It should be noted that the data to be traded obtained by the application platform may include low carbon behavior data, carbon emission reduction data, or carbon energy reward data. If the low-carbon behavior data are transmitted to the blockchain trading platform for decryption, trading can be directly carried out according to trading rules, or the low-carbon behavior data are transmitted into a corresponding intelligent contract, the low-carbon behavior data are converted into carbon emission reduction data and then trade is carried out, or the low-carbon behavior data are transmitted into a corresponding intelligent contract, the low-carbon behavior data are converted into carbon emission reduction data and further converted into carbon energy reward data and then trade is carried out; if the carbon emission reduction data is transmitted to the blockchain transaction platform for decryption, the transaction can be directly carried out according to transaction rules, or the carbon emission reduction data is transmitted into a corresponding intelligent contract, and the transaction is carried out after the carbon emission reduction data is converted into carbon energy reward data (in this scenario, the conversion from carbon behavior data to carbon emission reduction data can be realized on an application platform); if the data is carbon energy reward data, the data is transmitted to a blockchain trading platform for decryption, and then trading can be directly carried out according to trading rules (in this scenario, conversion from carbon behavior data to carbon emission reduction data and conversion from carbon emission reduction data to carbon energy reward data can be realized on an application platform).
It should be noted that, the implementation method of the first encryption process/the second encryption process in the carbon transaction implementation method may be the same as the block chain private data processing method, and a description thereof is not repeated here.
Referring to fig. 6, a carbon transaction implementation system includes:
the application platform 601 is configured to obtain data to be transacted of a user, encrypt and sign the data to be transacted to obtain encrypted data, and transmit the encrypted data to a block chain; the data to be traded comprises low carbon behavior data, carbon emission reduction data or carbon energy reward data;
and the blockchain transaction platform 602 is configured to decrypt and check the encrypted data received by the blockchain, and if the check is successful, operate the decrypted data according to a pre-stored intelligent contract to complete the carbon-related transaction.
The carbon transaction implementation system implements the same carbon transaction implementation method, and the description is not repeated here.
In the embodiment, the application platform acquires the carbon-related data to be traded of the user for encryption and signature processing, and the block chain trading platform decrypts and checks the signature, so that the transmission of the carbon-related trading data through a ciphertext is supported, and the signature checking of the data is supported, thereby effectively protecting the security of personal/enterprise asset trading and promoting the enthusiasm of the personal/enterprise for participating in carbon emission reduction and carbon trading.
According to an embodiment of the present application, the present application further provides an electronic device, where the carrier of the application platform may be an electronic device, and the carrier of the blockchain transaction platform may also be an electronic device, but the electronic devices corresponding to the two electronic devices are not the same electronic device.
Referring to fig. 7, a block diagram of an electronic device for implementing a carbon transaction according to an embodiment of the present disclosure is shown. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, internet of things terminals, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
Referring to fig. 7, the electronic device includes: one or more processors 701, a memory 702, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 7, one processor 701 is taken as an example.
The memory 702 is a non-transitory computer readable storage medium as provided herein. Wherein the memory stores instructions executable by at least one processor to cause the at least one processor to perform the carbon transaction implementation methods provided herein. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to perform the carbon transaction implementation method provided herein.
The memory 702, which is a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the carbon transaction implementation method in the embodiments of the present application. The processor 701 executes various functional applications of the server and data processing by executing the non-transitory software programs, instructions, and modules stored in the memory 702, that is, implements the carbon transaction implementation method in the above-described method embodiment.
The memory 702 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device of the block chain-based carbon transaction implementation method, and the like. Further, the memory 702 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 702 may optionally include memory located remotely from the processor 701, and such remote memory may be connected to the electronic device implementing the carbon transaction method via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the carbon transaction implementation method may further include: an input device 703 and an output device 704. The processor 701, the memory 702, the input device 703 and the output device 704 may be connected by a bus or other means, and fig. 7 illustrates an example of a connection by a bus.
The input device 703 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus of the carbon transaction implementing method, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or other input devices. The output devices 704 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), the internet, and blockchain networks.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element. In addition, the expressions of "S101", "S102", and the like with respect to the steps are merely for convenience of description, and do not represent the order of actual execution.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method for processing block chain private data, comprising:
the method comprises the steps that an application layer obtains original data to be transmitted by a user, and first encryption processing is carried out on the original data to obtain first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain;
the block chain intelligent contract layer carries out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
2. The blockchain private data processing method according to claim 1, wherein an implementation method of the first encryption process is the same as an implementation method of the second encryption process.
3. The method for processing block chain private data according to claim 2, wherein the implementation method of the first encryption process and the implementation method of the second encryption process specifically include:
converting the original data/splicing data into character strings, and performing cyclic traversal on the character strings to obtain each character in the character strings; and each character is converted into ASCII code; and combining and splicing each converted character and one character randomly acquired from the ASCII code comparison table to obtain first encrypted data/second encrypted data.
4. The method for processing the privacy data of the blockchain according to claim 1, wherein the hash processing is performed on the original data to obtain hash data, and the signature processing is performed on the hash data to obtain signature data, specifically comprising:
carrying out hash processing on the original data to obtain hash data, and carrying out signature processing on the hash data by using a user private key and an elliptic curve algorithm secp256k1 to obtain signature data;
the method includes the steps of carrying out hash processing on original data to obtain hash data, carrying out signature verification on signature data based on the hash data, and specifically including:
and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data and the user key.
5. A blockchain private data processing system, comprising:
the application layer is used for acquiring original data to be transmitted by a user and carrying out first encryption processing on the original data to acquire first encrypted data; performing hash processing on the original data to obtain hash data, and performing signature processing on the hash data to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain;
the intelligent contract layer of the block chain is used for carrying out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; performing first decryption processing on the first encrypted data to obtain original data; and carrying out hash processing on the original data to obtain hash data, and carrying out signature verification on the signature data based on the hash data.
6. A method for implementing a carbon transaction, comprising:
the method comprises the steps that an application platform obtains data to be traded of a user, encrypts and signs the data to be traded to obtain encrypted data, and transmits the encrypted data to a block chain; the data to be traded comprises low carbon behavior data, carbon emission reduction data or carbon energy reward data;
and the block chain transaction platform decrypts and checks the encrypted data received by the block chain, and if the check is successful, the decrypted data is operated according to a pre-stored intelligent contract to complete the carbon-related transaction.
7. The carbon transaction implementation method of claim 6, wherein the application platform obtains data to be transacted of a user, encrypts and signs the data to be transacted to obtain encrypted data, and transmits the encrypted data to the blockchain, specifically comprising:
the method comprises the steps that an application platform obtains data to be traded of a user, and first encryption processing is carried out on the data to be traded to obtain first encrypted data; carrying out hash processing on the data to be traded to obtain hash data, and carrying out signature processing on the hash data by using a user private key and an elliptic curve algorithm secp256k1 to obtain signature data; splicing the first encrypted data and the signature data to obtain spliced data, and performing second encryption processing on the spliced data to obtain second encrypted data; transmitting the second encrypted data to a blockchain.
8. The carbon transaction implementation method of claim 7, wherein the blockchain transaction platform decrypts and verifies the encrypted data received by the blockchain, and if the verification is successful, the decrypted data is operated according to a pre-stored intelligent contract to complete the carbon-related transaction, specifically including:
the block chain transaction platform carries out second decryption processing on the second encrypted data received by the block chain to obtain signature data and first encrypted data; carrying out first decryption processing on the first encrypted data to obtain data to be traded; performing hash processing on the data to be traded to obtain hash data, and verifying the signature of the signature data based on the hash data and a user key; and if the signature verification is successful, operating the decrypted data to be traded according to a pre-stored intelligent contract to finish the carbon-related transaction.
9. The carbon transaction implementation method of claim 6, wherein the low-carbon behavior data comprises one or more of low-carbon traffic behavior data, power-on energy-saving behavior data and forestry carbon sink behavior; the carbon emission reduction data is carbon dioxide emissions reduced by low carbon activity; the carbon energy reward data is a reward based on carbon reduction conversion, and comprises one or more of points, vouchers, item redemption tickets and software members.
10. A carbon transaction fulfillment system, comprising:
the application platform is used for acquiring data to be traded of a user, encrypting and signing the data to be traded to obtain encrypted data, and transmitting the encrypted data to the block chain; the data to be traded comprises low carbon behavior data, carbon emission reduction data or carbon energy reward data;
and the blockchain transaction platform is used for decrypting and checking the encrypted data received by the blockchain, and if the checking is successful, operating the decrypted data according to a pre-stored intelligent contract to complete the carbon-related transaction.
CN202110987864.7A 2021-08-26 2021-08-26 Block chain private data processing method, carbon transaction implementation method and system Pending CN114548983A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110987864.7A CN114548983A (en) 2021-08-26 2021-08-26 Block chain private data processing method, carbon transaction implementation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110987864.7A CN114548983A (en) 2021-08-26 2021-08-26 Block chain private data processing method, carbon transaction implementation method and system

Publications (1)

Publication Number Publication Date
CN114548983A true CN114548983A (en) 2022-05-27

Family

ID=81668648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110987864.7A Pending CN114548983A (en) 2021-08-26 2021-08-26 Block chain private data processing method, carbon transaction implementation method and system

Country Status (1)

Country Link
CN (1) CN114548983A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117614707A (en) * 2023-11-29 2024-02-27 金网络(北京)数字科技有限公司 Block chain transaction method, system, electronic equipment and medium based on intelligent contract

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117614707A (en) * 2023-11-29 2024-02-27 金网络(北京)数字科技有限公司 Block chain transaction method, system, electronic equipment and medium based on intelligent contract
CN117614707B (en) * 2023-11-29 2024-05-14 金网络(北京)数字科技有限公司 Block chain transaction method, system, electronic equipment and medium based on intelligent contract

Similar Documents

Publication Publication Date Title
US10200349B2 (en) Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
CN111769958B (en) Block chain cross-chain processing method, device, equipment and storage medium
JP2020518880A (en) Parallel execution of transactions in blockchain network based on smart contract whitelist
CN109075976A (en) Certificate depending on key authentication is issued
CN109074449A (en) Neatly supply proves key in Secure Enclave
US10169568B2 (en) Eye gazing passcode generation crossing augmented reality (AR) and virtual reality (VR) devices
CN113056741A (en) Profile verification based on distributed ledger
CN103051600A (en) File access control method and system
CN112883435B (en) Method and equipment for realizing safe communication with intelligent contract
CN111464297B (en) Transaction processing method, device, electronic equipment and medium based on block chain
CN112231652B (en) Trusted environment remote verification method, device, equipment, system and medium
CN113015974A (en) Verifiable consent for privacy protection
CN114448605A (en) Encrypted ciphertext verification method, system, equipment and computer readable storage medium
CN111339569A (en) Block chain data processing method and device, electronic equipment and medium
CN114363088B (en) Method and device for requesting data
US20140325066A1 (en) Monitoring Remote Access to an Enterprise Network
CN112308236A (en) Method, device, electronic equipment and storage medium for processing user request
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN113259901B (en) Message protection method and device for Internet of vehicles
CN114548983A (en) Block chain private data processing method, carbon transaction implementation method and system
CN109446751A (en) Generate the method, apparatus and storage medium of the data set including multiple subfiles
US8904508B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN115599959A (en) Data sharing method, device, equipment and storage medium
CN111339571B (en) Block chain key management method, device, equipment and storage medium
CN111371557A (en) Block chain data processing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination