CN115941773A - Project transaction method, system, terminal device and medium based on cloud service sharing - Google Patents

Project transaction method, system, terminal device and medium based on cloud service sharing Download PDF

Info

Publication number
CN115941773A
CN115941773A CN202211364609.8A CN202211364609A CN115941773A CN 115941773 A CN115941773 A CN 115941773A CN 202211364609 A CN202211364609 A CN 202211364609A CN 115941773 A CN115941773 A CN 115941773A
Authority
CN
China
Prior art keywords
user
service
item transaction
operation data
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211364609.8A
Other languages
Chinese (zh)
Inventor
马赫
倪小明
郭南明
杜育林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Nanfang Human Resources Evaluation Center Co ltd
Original Assignee
Guangzhou Nanfang Human Resources Evaluation Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Nanfang Human Resources Evaluation Center Co ltd filed Critical Guangzhou Nanfang Human Resources Evaluation Center Co ltd
Priority to CN202211364609.8A priority Critical patent/CN115941773A/en
Publication of CN115941773A publication Critical patent/CN115941773A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application discloses a project transaction method, a system, terminal equipment and a medium based on cloud service sharing, which comprises the steps of receiving a user operation data uplink request uploaded by a user, wherein the user operation data uplink request comprises user ID information, and the user operation data comprises project data to be transacted; inquiring a user public key corresponding to the user ID according to the user ID; verifying the user public key, inquiring a user private key corresponding to the user public key when the user public key passes the verification, and signing the user operation data uplink request by using the user private key; receiving a user operation data uplink request with a user private key signature, and sending the user operation data uplink request to any one block chain node to verify the user private key; and establishing an item transaction channel with the user after the verification is passed. The project transaction method with better performance is provided based on the cloud server, the resource allocation of the system is optimized, the user experience is improved through the block chain technology, and meanwhile, the safety of data transmission is greatly improved through the hybrid encryption algorithm.

Description

Project transaction method, system, terminal device and medium based on cloud service sharing
Technical Field
The application relates to the technical field of cloud service and sharing economy, in particular to a project transaction method, a system, terminal equipment and a medium based on cloud service sharing.
Background
The sharing economy generally refers to a new economic mode based on strangers and with temporary transfer of the use right of an article, with the main purpose of obtaining a certain reward. Such as shared bicycles, shared umbrellas, shared charging poles, etc., which are now relatively mature. The essence of the method is to integrate various resources under the line and obtain economic benefits from respective angles of a server and a user.
With the increasing maturity of shared economy development, it has been applied to various resource systems, such as talent market networks, project trading systems, and the like. Then, the existing project trading platform based on the sharing economy has many problems: first, since the data resources and user sources involved are distributed, data security problems are usually caused when data transmission is performed, for example, some network hackers or other lawbreakers attack the network transaction system, obtain profits by reselling personal information, and the like, which seriously affect privacy and property of individuals. Secondly, in the existing project sharing transaction method, the resource allocation link is relatively weak, so that the problem of resource waste is serious, and the resource allocation efficiency is to be improved.
In view of the above, a new method for trading items is needed to solve the above problems.
Disclosure of Invention
The application aims to provide a project transaction method, a project transaction system, a terminal device and a medium based on cloud service sharing, and at least solve one of the technical problems that the existing project transaction method for sharing is easy to have data security problem and low resource allocation efficiency.
In order to achieve the above object, in a first aspect, the present application provides a project transaction method based on cloud service sharing, which is applied to a cloud server, and includes:
receiving a user operation data uplink request uploaded by a user, wherein the user operation data uplink request comprises user ID information, and the user operation data comprises item data to be traded;
inquiring a user public key corresponding to the user ID according to the user ID;
verifying the user public key, inquiring a user private key corresponding to the user public key when the user public key passes the verification, and signing the uplink request of the user operation data by using the user private key;
receiving a user operation data uplink request with a user private key signature, and sending the user operation data uplink request to any one block chain node so that the any one block chain node verifies the user private key; and when the verification is passed, establishing an item transaction channel with the user.
In some implementations of the first aspect, the item transaction method based on cloud service sharing further includes:
integrating idle computing capacity and/or storage capacity of all networked terminals by using a service integrator, and submitting the integrated computing capacity and/or storage capacity as service content to a platform manager;
providing corresponding paid service or non-paid service for the user by using the platform manager according to the project transaction requirements uploaded by the user; wherein the content of the first and second substances,
the service integrator and the platform manager are both deployed in the cloud server.
In some implementations of the first aspect, after the establishing the item transaction channel with the user, further comprising:
providing item transaction services for users, including a lookup service, a subscription service and a download service; the consulting service comprises a service for consulting project information, project progress and project settlement conditions; the signing service comprises a service signed by an electronic contract; the downloading service comprises a service for downloading required project data.
In some implementations of the first aspect, the providing the item transaction service to the user includes:
the provided item transaction service data is encrypted and then transmitted to the user, and an item transaction process can be carried out after the user decrypts the data; wherein the encrypting the provided item transaction service data comprises:
encrypting the item transaction service data by using an AES algorithm to generate a first key;
extracting a file number of the item transaction service data, and encrypting the file number by using a hash function to generate a number ciphertext; and iterating the number cipher text by using an iteration function to generate a second key.
In some implementations of the first aspect, the iterating the numbered ciphertext with an iterating function to generate the second key includes:
and iterating the serial number ciphertext by using a divergent non-invertible function Fun to generate a key of a 128-bit AES encryption algorithm as a second key.
In some implementations of the first aspect, the providing the item transaction service to the user further includes:
sending a digital signature request to a user, receiving and verifying a digital signature returned by the user, and providing project transaction service for the user when the verification is passed; the generation process of the digital signature comprises the following steps:
encrypting a user private key by using an RSA algorithm to generate a random number;
and acquiring a legal certificate capable of proving the identity of the user, calculating the random number and the hash value of the legal certificate of the client by using an SHA algorithm, and encrypting the hash value by using an AES algorithm to generate a digital signature.
In a second aspect, the present application further provides a project transaction system based on cloud service sharing, applied to a cloud server, including:
the uplink request receiving module is used for receiving a user operation data uplink request uploaded by a user, wherein the user operation data uplink request comprises user ID information, and the user operation data comprises item data to be traded;
the user public key inquiry module is used for inquiring a user public key corresponding to the user ID according to the user ID;
the user private key inquiry module is used for verifying the user public key, inquiring a user private key corresponding to the user public key when the user public key passes the verification, and signing the uplink request of the user operation data by using the user private key;
the transaction channel establishing module is used for receiving a user operation data uplink request with a user private key signature and sending the user operation data uplink request to any one block chain node so as to verify the user private key by the any one block chain node; and when the verification is passed, establishing an item transaction channel with the user.
In some implementations of the second aspect, the cloud service sharing-based item transaction system further includes a resource integration module, including:
the service integrator unit is used for integrating idle computing capacity and/or storage capacity of all the networked terminals by using the service integrator and then submitting the integrated computing capacity and/or storage capacity as service content to the platform manager;
the platform manager unit is used for providing corresponding paid services or non-paid services for the user according to the project transaction requirements uploaded by the user by using the platform manager; wherein the content of the first and second substances,
the service integrator and the platform manager are both deployed in the cloud server.
In a third aspect, the present application further provides a terminal device, including:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a cloud services sharing based item transaction method as any one of above.
In a fourth aspect, the present application further provides a computer-readable storage medium having a computer program stored thereon, where the computer program, when executed by a processor, implements the cloud service sharing-based item transaction method as described in any one of the above.
In a fifth aspect, the present application further provides a computer program product, which when running on a terminal device, enables the computer device to implement the method for setting business process attributes according to the first aspect when executed.
Compared with the prior art, the beneficial effects of this application lie in:
1) The project transaction method is provided based on the cloud server, project transaction sharing can be achieved, and system performance is optimized.
2) By adopting the block chain technology, the management authority of the private key can be given to the server, and the user equipment does not need to store the private key; the server ensures the safety of the private key and can help the user equipment to sign; therefore, the user can experience the service of the block chain under the condition of not perceiving the private key, and the experience of the user is further improved.
3) When providing item transaction data, providing a mixed encryption algorithm, encrypting the item transaction service data through an AES algorithm, encrypting the file number by using a hash function, and generating a number ciphertext; then, iteration is carried out on the numbered ciphertext by using an iteration function to generate a second secret key; the digital signature is generated by combining the SHA algorithm and the AES algorithm, and compared with other mixed encryption algorithms, the digital signature generation method has the advantages that the calculation complexity is lower, the consumed time is shorter, the probability of data safety problems is greatly reduced, and the safety is higher.
4) The data number is extracted, the number is encrypted by using a hash function to generate a version ciphertext, then the number ciphertext is iterated by using a divergent non-reversible function Fun to generate a key of a 128-bit AES encryption algorithm, the indecomposability of the encryption algorithm is enhanced, and the security of data transmission is greatly improved.
Drawings
In order to more clearly illustrate the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flow chart of an item transaction method based on cloud service sharing according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a method for item transaction based on cloud service sharing according to another embodiment of the present application;
FIG. 3 is a schematic flow chart of the substeps of step S50 in FIG. 1;
fig. 4 is a schematic diagram of an encryption process of an AES algorithm provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of an item transaction system based on cloud service sharing according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an item transaction system based on cloud service sharing according to another embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be understood that the step numbers used herein are for convenience of description only and are not intended as limitations on the order in which the steps are performed.
It is to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The terms "comprises" and "comprising" indicate the presence of the described features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The term "and/or" refers to any and all possible combinations of one or more of the associated listed items and includes such combinations.
Referring to fig. 1, in an embodiment of the first aspect of the present application, a method for item transaction based on cloud service sharing is provided, which is mainly applied to a cloud server. As shown in fig. 1, the cloud service sharing-based item transaction method includes steps S10 to S40. The method comprises the following steps:
s10, receiving a user operation data uplink request uploaded by a user, wherein the user operation data uplink request comprises user ID information, and the user operation data comprises item data to be traded;
s20, inquiring a user public key corresponding to the user ID according to the user ID;
s30, verifying the user public key, inquiring a user private key corresponding to the user public key when the user public key passes the verification, and signing the uplink request of the user operation data by using the user private key;
s40, receiving a user operation data uplink request with a user private key signature, and sending the user operation data uplink request to any block chain node so that the user private key is verified by any block chain node; and when the verification is passed, establishing an item transaction channel with the user.
In this embodiment, the user public key, the user operation data uplink request, and the cloud server private key signature information are mainly sent to a signing machine, so that the signing machine performs signature on the cloud server private key, after the signature passes verification, a user private key corresponding to the user public key is queried, and the user private key is used to sign the user operation data uplink request; the cloud server private key signature information comprises a private key signature information of the cloud server private key on the user public key and the user operation data uplink request, the signature machine stores at least one user private key and at least one user public key, and the at least one user private key and the at least one user public key are in one-to-one correspondence.
In the embodiment, based on the technology of the block chain, the management authority of the private key can be given to the server, and the user equipment does not need to store the private key; the cloud server ensures the safety of the private key and can help the user equipment to sign; therefore, the user can experience the service of the block chain in a user name and password mode under the condition of not perceiving the private key, and the user experience is further improved; in addition, the private key is stored in the signature machine, the signature machine can only access through an intranet, and the server cannot acquire the private key, so that the storage safety of the private key is further ensured.
In addition, the private key of the user is not lost, and the operation authority of the user is limited; when the operation of the user is illegal, the cloud server does not execute the signing process.
In an exemplary embodiment, the item transaction method based on cloud service sharing further includes:
1) Integrating idle computing capacity and/or storage capacity of all networked terminals by using a service integrator, and submitting the integrated computing capacity and/or storage capacity as service content to a platform manager;
2) Providing corresponding paid service or non-paid service for the user by using the platform manager according to the project transaction requirements uploaded by the user; wherein the service integrator and the platform manager are both deployed in the cloud server.
In this embodiment, when performing a project transaction of cloud service sharing, the method is divided into the following steps in terms of logical relationship: the system comprises a cloud server and a user, wherein the cloud server comprises a cloud service shared item transaction platform. And users can be divided into service providers and service consumers. In the actual operation process, all the networking terminals contained by the three parties form hardware equipment of the cloud service shared item transaction platform. Any one of the networked terminals can serve as any one of the two parties, or serve as both parties, or serve as three parties, for example, while the networked terminal serving as a service user provides services, different services may be acquired from the cloud service shared item transaction platform according to the identity of the service user; the networked terminal serving as the cloud service sharing project transaction platform may also have idle storage capacity and/or computing capacity, and may provide services to the user in the identity of the service provider after integrating the idle storage capacity and/or computing capacity.
Further, in this embodiment, the service integrator integrates idle computing power and/or storage power of all networked terminals together and submits the integrated power as service content to the platform manager, and the platform manager provides the service to the user in a free or paid manner according to the user demand.
In a preferred embodiment, the platform manager may include a management unit, and a communication unit and a service list generation unit respectively connected to the management unit; the resource integrator submits the integrated services to the platform manager through the communication unit, and the service list generating unit of the platform manager generates a service list in real time.
In a preferred embodiment, the platform manager further comprises an account funds management unit connected to the management unit for ensuring that funds involved in the service transaction are available immediately to the account of the service provider.
In a preferred embodiment, the platform manager further comprises an identity authentication unit connected to the management unit for identifying a terminal device condition providing idle computing and/or storage capacity to the service integrator.
In a preferred embodiment, the platform manager further comprises a credit evaluation unit connected to the management unit, and configured to identify different networked terminals based on the identity authentication unit and to give credit ratings of the networked terminals.
In a preferred embodiment, the platform manager further includes a status supervision unit connected to the management unit, and configured to track presence status information of each networked terminal, and send the detected information to the management unit, and the management unit allocates the service in real time according to the status of each networked terminal.
In a preferred embodiment, the platform manager further includes a decision generation unit connected to the management unit, and configured to decompose a service required by a service user into a plurality of sub-services that can be independently completed by the networked terminals, and distribute the sub-services to the networked terminals.
In a preferred embodiment, the platform manager further includes an execution unit connected to the decision generation unit, and specifies a specific networked terminal to complete the instruction according to the sub-service allocated by the decision generation unit.
Therefore, the above-mentioned embodiment utilizes the online transaction system to share or trade the existing idle computing capacity and storage capacity, and particularly provides a cloud service shared item transaction platform, and the networked terminal users can submit the idle resources of their terminal devices to the platform at any time, such as storage space, and integrate the idle resources through the service integrator to form a complete network resource system, so that the service users can purchase the required services at any time according to their needs, such as the size of the required storage space, the purchase computing capacity, and the like. All service users and service providers can share or trade computing capacity and storage capacity through the platform, so that resource allocation is optimized to a great extent, and resource utilization rate is improved.
Referring to fig. 2, in a specific embodiment, after the establishing of the item transaction channel with the user, the method further includes:
s50, providing item transaction services for the user, wherein the item transaction services comprise a consulting service, a signing service and a downloading service; the consulting service comprises a service for consulting project information, project progress and project settlement conditions; the signing service comprises a service signed by an electronic contract; the downloading service comprises a service for downloading required project data.
In this embodiment, the platform in the cloud server can at least provide item transaction services for the user, including a lookup service, a subscription service, and a download service; after the platform displays the project requirement information issued by the service provider and the service demander of the project through the information issuing unit, the demander can look up the project information, the project progress and the project settlement condition. The signing service mainly means that a service provider and a service demander of a project sign an electronic cooperation agreement on a platform, and the project requirement, the implementation completion time and the payment condition are defined. The project progress service mainly means that a service provider and a service demander of a project report the project progress condition in real time on a platform, and the two parties can conveniently and timely master the project progress. And the item settlement refers to the operation of receiving and paying by the service provider and the service demander of the item according to the project progress of the item.
According to the above, in the process of conducting project transaction, the data involved in the process of conducting project transaction, including the situations of electronic contract, project schedule and the like, necessarily involve enterprise and personal information, and once the information is leaked, irreparable loss may be caused to the enterprise or the individual, therefore, in order to solve the data security problem, in the following embodiments, when providing project transaction service to the user, an encryption algorithm needs to be used, and the service demander calls the data in an encryption and decryption manner, so as to ensure the security of platform data.
Referring to FIG. 3, in particular, the method includes
S501, encrypting the provided item transaction service data:
s5011, encrypting the item transaction service data by using an AES algorithm to generate a first secret key.
In this step, data encryption is performed by using an AES algorithm. It should be noted that the AES algorithm is a symmetric encryption algorithm, and is generally divided into 4 steps: byte substitution, row displacement, column mixing, round key addition. Each step is reversible, so the decryption algorithm is the corresponding inverse operation. Where byte substitution is a non-linear byte-by-byte substitution operation that follows a substitution table. The line shift is a linear transformation, and each line of the state matrix is circularly shifted to the right by taking a byte as a unit, and the linear shift is a multiple of 4. In the column mixing stage, four elements in each column of the state matrix are used as coefficients to form a column polynomial, and the column polynomial is subjected to modular multiplication with a specific polynomial. And a round key adding stage, namely performing exclusive OR operation on the column of the round key matrix byte by byte and the column of the state matrix. The AES algorithm will encrypt and decrypt hundreds of times faster than the asymmetric encryption algorithm. The encryption and decryption process of the AES algorithm is shown in fig. 4.
As can be seen from the encryption and decryption process of the AES algorithm provided in fig. 4, the key to the security is to secure the key, and the security of the key is secured by the AES algorithm in the encryption chain. According to the key length, the AES algorithm can be divided into three versions, namely AES-128, AES-192 and AES-256. In order to speed up its decryption, in a preferred embodiment the electronic archive data is processed using the AES-128 version to generate the first key.
S5012, extracting a file number of the item transaction service data, and encrypting the file number by using a hash function to generate a number ciphertext; and iterating the numbered ciphertext by using an iteration function to generate a second secret key.
In this step, a second key is generated by a hash function encryption method.
In order to enhance the security of encrypted transmission, in this step, a hash function is used to encrypt the file number to generate a number ciphertext. Specifically, the MD5 is adopted to encrypt the file number to obtain a ciphertext, and then an iteration function is used to iterate the version number ciphertext to generate a second key.
In a specific embodiment, the number ciphertext is iterated by using a divergent non-invertible function Fun to generate a key of a 128-bit AES encryption algorithm as the second key. The serial number is encrypted by combining the Hash algorithm MD5 and the advanced AES encryption algorithm, and the indecomposability of the encryption algorithm is enhanced by diverging the non-reversible function, so that the safety of data transmission is greatly improved.
And S502, transmitting the encrypted data to the user, and carrying out a project transaction process after the user decrypts the encrypted data.
And finally, transmitting the encrypted data to the user, and only after the user can successfully decrypt the encrypted data, successfully entering a cloud service shared item transaction platform to normally perform an item transaction process, otherwise, failing to perform any item transaction.
In a specific embodiment, the providing item transaction services for users further includes:
sending a digital signature request to a user, receiving and verifying a digital signature returned by the user, and providing project transaction service for the user when the verification is passed; the generation process of the digital signature comprises the following steps:
encrypting a user private key by using an RSA algorithm to generate a random number;
and acquiring a legal certificate capable of proving the identity of the user, calculating the random number and the hash value of the legal certificate of the client by using an SHA algorithm, and encrypting the hash value by using an AES algorithm to generate a digital signature.
It should be noted that the RSA algorithm is one of the most commonly used asymmetric encryption algorithms, belongs to the most typical and perfect public key block cipher system at present, can resist most of cryptographic attacks at present, and has better confidentiality. The algorithm first generates a pair of RSA secret keys by a receiving party, wherein a public key can be issued in a network, and a secret key is only owned by a user; the sender uses the public key to encrypt the file and then sends the file to the receiver, and the receiver can decrypt the file by using the private key to recover the plaintext. Specifically, the core of the reciprocity of RSA encryption and decryption is euler's theorem, and the algorithm first needs to generate a pair of public keysp k And a private keys k Then need to usep k Encrypting the inscription, uses k And decrypting the ciphertext.
The SHA algorithm is the most widely used hash encryption algorithm following the MD5 algorithm, which has encryption irreversibility and is generally used as a digital signature to verify the validity of a data signature.
In the embodiment, in order to further enhance the security in the data transmission process, the user private key is encrypted by using the RSA algorithm to generate any random number; then, a legal certificate which can prove the identity of the user, such as an electronic identity certificate, a double-issue approved electronic protocol and the like, is obtained, finally, the random number and the hash value of the client side legal certificate are calculated by using an SHA algorithm, and the hash value is encrypted by an AES algorithm to generate a digital signature. Thus, the data security in the item transaction is further ensured.
In summary, the embodiments of the first aspect of the present application can achieve at least the following beneficial effects:
1) The project transaction method is provided based on the cloud server, project transaction sharing can be achieved, and system performance is optimized.
2) By adopting the block chain technology, the management authority of the private key can be given to the server, and the user equipment does not need to store the private key; the server ensures the safety of the private key and can help the user equipment to sign; therefore, the user can experience the service of the block chain without sensing the private key, and the user experience is further improved.
3) When providing item transaction data, providing a mixed encryption algorithm, encrypting the item transaction service data through an AES algorithm, encrypting the file number by using a hash function, and generating a number ciphertext; then, iteration is carried out on the numbered ciphertext through an iteration function, and a second secret key is generated; the digital signature is generated by combining the SHA algorithm and the AES algorithm, and compared with other mixed encryption algorithms, the digital signature generation method has the advantages that the calculation complexity is lower, the consumed time is shorter, the probability of data security problems is greatly reduced, and the security is higher.
4) The data number is extracted, the number is encrypted by the Hash function to generate a version ciphertext, and then the number ciphertext is iterated by the divergent non-reversible function Fun to generate a key of a 128-bit AES encryption algorithm, so that the indecomposability of the encryption algorithm is enhanced, and the safety of data transmission is greatly improved.
Referring to fig. 5, in a second aspect, an embodiment of the present application further provides a cloud service sharing-based item transaction system, applied to a cloud server, including:
a uplink request receiving module 01, configured to receive a user operation data uplink request uploaded by a user, where the user operation data uplink request includes user ID information, and the user operation data includes item data to be traded;
the user public key query module 02 is used for querying a user public key corresponding to the user ID according to the user ID;
the user private key query module 03 is configured to verify the user public key, query a user private key corresponding to the user public key when the user public key passes the verification, and sign the uplink request of the user operation data with the user private key;
the transaction channel establishing module 04 is configured to receive a user operation data uplink request with a user private key signature, and send the user operation data uplink request to any one block chain node, so that the user private key is verified by the any one block chain node; and when the verification is passed, establishing an item transaction channel with the user.
In a specific embodiment, the cloud service sharing-based item transaction system further includes a resource integration module 05, as shown in fig. 6, where the resource integration module 05 includes:
the service integrator unit 051 is used for integrating idle computing capacity and/or storage capacity of all the networked terminals by using the service integrator and then submitting the integrated computing capacity and/or storage capacity as service content to the platform manager;
a platform manager unit 052, configured to provide a corresponding paid service or a corresponding non-paid service to the user according to the item transaction requirement uploaded by the user by using a platform manager; wherein the service integrator and the platform manager are both deployed in the cloud server.
It is understood that the cloud service sharing-based item transaction apparatus may implement the cloud service sharing-based item transaction method of the above method embodiments. The alternatives in the above-described method embodiments are also applicable to this embodiment and will not be described in detail here. The rest of the embodiments of the present application may refer to the contents of the above method embodiments, and in this embodiment, details are not described again.
Referring to fig. 7, in an embodiment of the third aspect of the present application, there is further provided a terminal device, including:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a cloud service sharing based item transaction method as described above.
The processor is used for controlling the overall operation of the terminal device so as to complete all or part of the steps of the item transaction method based on cloud service sharing. The memory is used to store various types of data to support operation at the terminal device, and these data may include, for example, instructions for any application or method operating on the terminal device, as well as application-related data. The Memory may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically Erasable Programmable Read-Only Memory (EEPROM), erasable Programmable Read-Only Memory (EPROM), programmable Read-Only Memory (PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk.
In an exemplary embodiment, the terminal Device may be implemented by one or more Application Specific 1 integrated Circuit (AS 1C), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and is configured to perform the cloud service sharing based project transaction method according to any one of the above embodiments, and achieve technical effects consistent with the above methods.
In another exemplary embodiment, a computer readable medium is also provided, which includes a computer program, which when executed by a processor, implements the steps of the cloud service sharing based item transaction method according to any one of the above embodiments. For example, the computer readable medium may be the above-mentioned memory including a computer program, and the above-mentioned computer program may be executed by a processor of a terminal device to complete the item transaction method based on cloud service sharing according to any one of the above-mentioned embodiments, and achieve the technical effects consistent with the above-mentioned method.
The computer readable media of the embodiments of the present application may be computer readable signal media or computer readable storage media or any combination of the two. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable read-only memory (CDROM). Additionally, the computer-readable storage medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
In embodiments of the present application, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, input method, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, radio Frequency (RF), etc., or any suitable combination of the preceding.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following technologies, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware that is related to instructions of a program, and the program may be stored in a computer-readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium. The storage medium may be a read-only memory, a magnetic or optical disk, or the like.
The above-mentioned embodiments are further detailed to explain the objects, technical solutions and advantages of the present application, and it should be understood that the above-mentioned embodiments are only examples of the present application and are not intended to limit the scope of the present application. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the present application, may occur to those skilled in the art and are intended to be included within the scope of the present application.

Claims (10)

1. A project transaction method based on cloud service sharing is applied to a cloud server and comprises the following steps:
receiving a user operation data uplink request uploaded by a user, wherein the user operation data uplink request comprises user ID information, and the user operation data comprises item data to be traded;
inquiring a user public key corresponding to the user ID according to the user ID;
verifying the user public key, inquiring a user private key corresponding to the user public key when the user public key passes the verification, and signing the uplink request of the user operation data by using the user private key;
receiving a user operation data uplink request with a user private key signature, and sending the user operation data uplink request to any one block chain node so that the any one block chain node verifies the user private key; and when the verification is passed, establishing an item transaction channel with the user.
2. The cloud service sharing based item transaction method of claim 1, further comprising:
integrating idle computing capacity and/or storage capacity of all networked terminals by using a service integrator, and submitting the integrated computing capacity and/or storage capacity as service content to a platform manager;
providing corresponding paid service or non-paid service for the user by using the platform manager according to the project transaction requirements uploaded by the user; wherein, the first and the second end of the pipe are connected with each other,
the service integrator and the platform manager are both deployed in the cloud server.
3. The item transaction method based on cloud service sharing according to claim 1, further comprising, after establishing an item transaction channel with a user:
providing item transaction services for users, including a lookup service, a subscription service and a download service; the consulting service comprises a service for consulting project information, project progress and project settlement conditions; the signing service comprises a service for signing an electronic contract; the downloading service comprises a service for downloading required project data.
4. The cloud service sharing-based item transaction method according to claim 3, wherein the providing of the item transaction service for the user comprises:
encrypting the provided item transaction service data and transmitting the encrypted item transaction service data to the user, and performing an item transaction process after the user decrypts the encrypted item transaction service data; wherein the encrypting the provided item transaction service data comprises:
encrypting the item transaction service data by using an AES algorithm to generate a first key;
extracting a file number of the item transaction service data, and encrypting the file number by using a hash function to generate a number ciphertext; and iterating the number cipher text by using an iteration function to generate a second key.
5. The cloud service sharing-based item transaction method according to claim 4, wherein the iterating the number ciphertext by using an iterating function to generate a second key comprises:
and iterating the serial number ciphertext by using a divergent non-invertible function Fun to generate a key of a 128-bit AES encryption algorithm as a second key.
6. The item transaction method based on cloud service sharing according to claim 3, wherein the providing of the item transaction service to the user further comprises:
sending a digital signature request to a user, receiving and verifying a digital signature returned by the user, and providing project transaction service for the user when the verification is passed; the generation process of the digital signature comprises the following steps:
encrypting a user private key by using an RSA algorithm to generate a random number;
and acquiring a legal certificate capable of proving the identity of the user, calculating the random number and the hash value of the legal certificate of the client by using an SHA algorithm, and encrypting the hash value by using an AES algorithm to generate a digital signature.
7. An item transaction system based on cloud service sharing is applied to a cloud server and comprises the following components:
the uplink request receiving module is used for receiving a user operation data uplink request uploaded by a user, wherein the user operation data uplink request comprises user ID information, and the user operation data comprises item data to be traded;
the user public key inquiry module is used for inquiring a user public key corresponding to the user ID according to the user ID;
the user private key inquiry module is used for verifying the user public key, inquiring a user private key corresponding to the user public key when the user public key passes the verification, and signing the uplink request of the user operation data by using the user private key;
the transaction channel establishing module is used for receiving a user operation data uplink request with a user private key signature and sending the user operation data uplink request to any one block chain node so as to verify the user private key by the any one block chain node; and when the verification is passed, establishing an item transaction channel with the user.
8. The cloud service sharing based item transaction system of claim 7, further comprising a resource integration module comprising:
the service integrator unit is used for integrating idle computing capacity and/or storage capacity of all the networked terminals by using the service integrator and then submitting the integrated computing capacity and/or storage capacity as service content to the platform manager;
the platform manager unit is used for providing corresponding paid services or non-paid services for the user according to the project transaction requirements uploaded by the user by using the platform manager; wherein the content of the first and second substances,
the service integrator and the platform manager are both deployed in the cloud server.
9. A terminal device, comprising:
one or more processors;
a memory coupled to the processor for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the cloud services sharing based item transaction method of any of claims 1-6.
10. A computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the cloud service sharing-based item transaction method of any one of claims 1-6.
CN202211364609.8A 2022-11-02 2022-11-02 Project transaction method, system, terminal device and medium based on cloud service sharing Pending CN115941773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211364609.8A CN115941773A (en) 2022-11-02 2022-11-02 Project transaction method, system, terminal device and medium based on cloud service sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211364609.8A CN115941773A (en) 2022-11-02 2022-11-02 Project transaction method, system, terminal device and medium based on cloud service sharing

Publications (1)

Publication Number Publication Date
CN115941773A true CN115941773A (en) 2023-04-07

Family

ID=86699769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211364609.8A Pending CN115941773A (en) 2022-11-02 2022-11-02 Project transaction method, system, terminal device and medium based on cloud service sharing

Country Status (1)

Country Link
CN (1) CN115941773A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913672A (en) * 2022-11-02 2023-04-04 广州市南方人力资源评价中心有限公司 Electronic file encryption transmission method, system, terminal equipment and computer medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546722A (en) * 2010-12-27 2012-07-04 北京爱国者信息技术有限公司 Cloud service sharing and trading platform and system
CN103684750A (en) * 2013-11-27 2014-03-26 武汉铁路局科学技术研究所 Method for encrypting and decrypting in file transmission
CN109245905A (en) * 2018-11-01 2019-01-18 四川长虹电器股份有限公司 The method that message is digitally signed and is encrypted based on RSA and aes algorithm
CN109756343A (en) * 2019-01-31 2019-05-14 平安科技(深圳)有限公司 Authentication method, device, computer equipment and the storage medium of digital signature
CN110175885A (en) * 2019-04-26 2019-08-27 武汉欧铭达科技有限公司 A kind of project Real-Time Sharing trading platform system
CN110543786A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 method and device for signing block chain private key of shared economic platform user
CN110545177A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for life service platform user
CN110661621A (en) * 2018-06-28 2020-01-07 中车株洲电力机车研究所有限公司 Mixed encryption and decryption method based on HMAC, AES and RSA
US10742422B1 (en) * 2019-08-14 2020-08-11 OX Labs Inc. Digital transaction signing for multiple client devices using secured encrypted private keys

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546722A (en) * 2010-12-27 2012-07-04 北京爱国者信息技术有限公司 Cloud service sharing and trading platform and system
CN103684750A (en) * 2013-11-27 2014-03-26 武汉铁路局科学技术研究所 Method for encrypting and decrypting in file transmission
CN110661621A (en) * 2018-06-28 2020-01-07 中车株洲电力机车研究所有限公司 Mixed encryption and decryption method based on HMAC, AES and RSA
CN109245905A (en) * 2018-11-01 2019-01-18 四川长虹电器股份有限公司 The method that message is digitally signed and is encrypted based on RSA and aes algorithm
CN109756343A (en) * 2019-01-31 2019-05-14 平安科技(深圳)有限公司 Authentication method, device, computer equipment and the storage medium of digital signature
CN110175885A (en) * 2019-04-26 2019-08-27 武汉欧铭达科技有限公司 A kind of project Real-Time Sharing trading platform system
US10742422B1 (en) * 2019-08-14 2020-08-11 OX Labs Inc. Digital transaction signing for multiple client devices using secured encrypted private keys
CN110543786A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 method and device for signing block chain private key of shared economic platform user
CN110545177A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for life service platform user

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蒋汉生: "电子商务安全导论自学考试大纲", 辽宁教育出版社, pages: 69 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115913672A (en) * 2022-11-02 2023-04-04 广州市南方人力资源评价中心有限公司 Electronic file encryption transmission method, system, terminal equipment and computer medium
CN115913672B (en) * 2022-11-02 2023-09-01 广州市南方人力资源评价中心有限公司 Electronic file encryption transmission method, system, terminal equipment and computer medium

Similar Documents

Publication Publication Date Title
CN109067539B (en) Alliance chain transaction method, alliance chain transaction equipment and computer readable storage medium
CN110601816B (en) Lightweight node control method and device in block chain system
CN111292041B (en) Electronic contract generation method, device, equipment and storage medium
CN113162752B (en) Data processing method and device based on hybrid homomorphic encryption
CN109104279A (en) A kind of encryption method of electric power data, system and terminal device
CN108964922A (en) mobile terminal token activation method, terminal device and server
CN109741068A (en) Internetbank inter-bank contracting method, apparatus and system
CN112766962A (en) Method for receiving and sending certificate, transaction system, storage medium and electronic device
CN115913672B (en) Electronic file encryption transmission method, system, terminal equipment and computer medium
CN111756529A (en) Quantum session key distribution method and system
CN111160908A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
CN108476134A (en) It is used for the encryption key using the service provided by operator by client device security provisions
CN115203749A (en) Data transaction method and system based on block chain
CN113191863A (en) Bidding method, third party device, sponsor device and bidder device
CN112073196A (en) Service data processing method and device, electronic equipment and storage medium
CN107994995A (en) A kind of method of commerce, system and the terminal device of lower security medium
JP2004030121A (en) Electronic contract system
CN115941773A (en) Project transaction method, system, terminal device and medium based on cloud service sharing
CN113162915B (en) Block chain based transaction method, node, electronic device, medium and system
CN103546428A (en) File processing method and device
CN110519045B (en) Anti-quantum computing alliance chain transaction method and system based on group asymmetric key pool
WO2021035295A1 (en) "secure environment for cryptographic key generation"
CN111753321A (en) Block chain-based data security sharing method and system
Kuntze et al. Trusted ticket systems and applications
Chenli et al. Fairtrade: Efficient atomic exchange-based fair exchange protocol for digital data trading

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination