CN117294451A - Purchasing collaboration method, device, equipment and storage medium - Google Patents

Purchasing collaboration method, device, equipment and storage medium Download PDF

Info

Publication number
CN117294451A
CN117294451A CN202210680681.5A CN202210680681A CN117294451A CN 117294451 A CN117294451 A CN 117294451A CN 202210680681 A CN202210680681 A CN 202210680681A CN 117294451 A CN117294451 A CN 117294451A
Authority
CN
China
Prior art keywords
purchase
node
cooperative
ciphertext
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210680681.5A
Other languages
Chinese (zh)
Inventor
吴进喜
任亚坤
吕寒冰
唐俊峰
江海龙
陈晓文
邓燕辉
张强
刘伟东
何孔阳
王红伟
方银城
李志晓
许榕洁
陈新江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SF Technology Co Ltd
Original Assignee
SF Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SF Technology Co Ltd filed Critical SF Technology Co Ltd
Priority to CN202210680681.5A priority Critical patent/CN117294451A/en
Priority to PCT/CN2023/112960 priority patent/WO2023241741A1/en
Publication of CN117294451A publication Critical patent/CN117294451A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06395Quality analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/04Manufacturing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The application provides a purchase collaboration method, a purchase collaboration device, purchase collaboration equipment and a storage medium; the method in the application comprises the following steps: acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext; group signature is carried out on the purchase cooperative ciphertext according to a preset node transaction group, and the purchase cooperative ciphertext after group signature is uplink; and acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext. The key scene in the purchasing flow is uplink, the information trusted sharing is realized, and the sensitive information safety and privacy protection of each purchasing node are effectively ensured in the sharing process.

Description

Purchasing collaboration method, device, equipment and storage medium
Technical Field
The application relates to the technical field of computers, in particular to a purchase collaboration method, a purchase collaboration device, purchase collaboration equipment and a storage medium.
Background
At present, in the existing purchasing process, a product manufacturer controls the quality and price of a finished product of a foundry by specifying a supplier, and the problem of information asymmetry among the product manufacturer, the foundry and the supplier is caused in the purchasing mode.
Disclosure of Invention
The embodiment of the application provides a purchase cooperation method, device, equipment and storage medium, and aims to solve the technical problems that real-time purchase is poor and sensitive information cannot be protected based on block chains in the prior art.
In one aspect, embodiments of the present application provide a purchase collaboration method, where the purchase collaboration method includes the following steps:
acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
group signature is carried out on the purchase cooperative ciphertext according to a preset node transaction group, and the purchase cooperative ciphertext after group signature is uplink;
and acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext.
In one possible implementation manner of the present application, before obtaining the purchase cooperative information and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext, the method further includes:
receiving node registration information, and acquiring a node certificate and a node private key of the node registration information;
and registering nodes in a preset purchasing alliance chain through the node certificate and the node private key, and creating a purchasing cooperative node, wherein the purchasing cooperative node comprises a manufacturing node, a substitute node and a provider node.
In one possible implementation manner of the present application, the obtaining purchase cooperative information, performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext includes:
acquiring the purchase cooperative information, and determining an associated target purchase cooperative node according to the purchase cooperative information;
acquiring the identity attribute of the target purchase cooperative node, and inputting the identity attribute into a preset strategy rule to obtain an attribute strategy of the purchase cooperative information;
and calling the attribute strategy and the encryption public key to perform attribute encryption on the purchase cooperative information to obtain the purchase cooperative ciphertext.
In one possible implementation manner of the present application, the preset node transaction group performs group signature on the purchase cooperative ciphertext, and before the purchase cooperative ciphertext after the group signature is uplink, the method further includes:
acquiring node type attributes of each purchase cooperative node, and classifying the node types according to the node type attributes to obtain node combinations with the same node type attributes;
creating each node group associated with the node type attribute, and adding each purchase cooperative node in the node combination to a corresponding node group to obtain each node transaction group, wherein the node transaction group comprises a manufacturing node group, a substitute node group and a provider node group.
In one possible implementation manner of the present application, the preset node transaction group performs group signature on the purchase cooperative ciphertext, and links the purchase cooperative ciphertext after group signature, including:
obtaining a group certificate of the node transaction group, wherein the group certificate comprises a group member private key and a group member public key;
group signature is carried out on the purchase cooperative ciphertext according to the group member private key and the group member public key;
and calling a preset purchase contract to confirm and uplink the purchase collaborative ciphertext after group signing.
In one possible implementation of the present application,
the obtaining the purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext, includes:
reading the purchase feedback ciphertext and determining an attribute strategy of the purchase feedback ciphertext;
acquiring a preset identity attribute set, decrypting the purchase feedback ciphertext according to the identity attribute set and the attribute strategy, and obtaining the purchase feedback information;
and executing corresponding purchase cooperative operation according to the purchase feedback information.
In one possible implementation manner of the present application, the executing the corresponding purchase cooperative operation according to the purchase feedback information includes:
Analyzing the purchase feedback ciphertext to determine purchase feedback information in the purchase feedback ciphertext;
if the purchase feedback information is purchase confirmation information, generating a production plan corresponding to the purchase confirmation information;
and executing corresponding purchase cooperative operation according to the production plan, generating a production plan ciphertext corresponding to the production plan, and uploading the production plan ciphertext.
In another aspect, the present application provides a purchase coordination apparatus, including:
the attribute encryption module is configured to acquire purchase cooperative information, and perform attribute encryption on the purchase cooperative information according to an attribute strategy corresponding to the purchase cooperative node to acquire a purchase cooperative ciphertext;
the ciphertext signature module is configured to perform group signature on the purchase cooperative ciphertext according to a preset node transaction group, and uplink the purchase cooperative ciphertext after group signature;
and the purchase feedback module is configured to acquire a purchase feedback ciphertext and execute corresponding purchase cooperative operation according to the purchase feedback ciphertext.
On the other hand, the application also provides a purchase cooperative device, which comprises:
one or more processors;
a memory; and
One or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement the procurement collaboration method.
In another aspect, the present application also provides a computer readable storage medium having stored thereon a computer program to be loaded by a processor to perform the steps of the purchase coordination method.
According to the method, the purchasing collaborative information of the purchasing collaborative node is obtained, attribute encryption is carried out on the purchasing collaborative information to obtain a purchasing collaborative ciphertext, and group signature and uplink are carried out on the purchasing collaborative ciphertext according to the node transaction group corresponding to the purchasing collaborative node, so that only the purchasing collaborative ciphertext points to in a purchasing alliance chain, and the node with the corresponding attribute can analyze and view the purchasing collaborative information carried by the purchasing collaborative ciphertext; and acquiring purchase feedback information transmitted by the target purchase cooperative node pointed by the attribute strategy associated with the purchase cooperative ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback information. The key scene in the purchasing flow is uplink, the information trusted sharing is realized, and the sensitive information safety and privacy protection of each purchasing node are effectively ensured in the sharing process.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic view of a scenario of a purchasing collaboration method according to an embodiment of the present application;
FIG. 2 is a flow diagram of one embodiment of a procurement collaboration method in an embodiment of the application;
FIG. 3 is a flowchart illustrating an embodiment of performing attribute encryption on purchase collaboration information in the purchase collaboration method according to the embodiment of the present application;
FIG. 4 is a flow chart of an embodiment of group signing a purchase synergy ciphertext in a purchase synergy method provided by an embodiment of the present application;
FIG. 5 is a schematic structural diagram of one embodiment of a procurement co-ordination device provided in an embodiment of the application;
fig. 6 is a schematic structural diagram of one embodiment of a purchase cooperative device provided in an embodiment of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
In the description of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", etc. indicate orientations or positional relationships based on the drawings are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more of the described features. In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In this application, the term "exemplary" is used to mean "serving as an example, instance, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. The following description is presented to enable any person skilled in the art to make and use the invention. In the following description, details are set forth for purposes of explanation. It will be apparent to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and processes have not been described in detail so as not to obscure the description of the invention with unnecessary detail. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
At present, in the existing purchasing process, a product manufacturer controls the quality and price of a finished product of a foundry by specifying a supplier, and the problem of information asymmetry among the product manufacturer, the foundry and the supplier is caused in the purchasing mode.
Based on the above, the application provides a purchase cooperation method, a device, equipment and a computer readable storage medium, so as to solve the technical problems that in the prior art, real-time purchase based on a blockchain is poor and sensitive information cannot be protected.
The purchasing cooperation method in the embodiment of the invention is applied to a purchasing cooperation device, the purchasing cooperation device is arranged in purchasing cooperation equipment, one or more processors, a memory and one or more application programs are arranged in the purchasing cooperation equipment, wherein the one or more application programs are stored in the memory and are configured to be executed by the processors to implement the purchasing cooperation method; the purchase cooperative equipment can be an intelligent terminal, such as a mobile phone, a tablet computer, an intelligent television, network equipment, an intelligent computer and the like; alternatively, the purchase cooperative device may be a server, or a service cluster formed by a plurality of servers.
As shown in fig. 1, fig. 1 is a schematic view of a scenario of a purchase collaboration method according to an embodiment of the present invention, where the purchase collaboration scenario includes a plurality of purchase collaboration devices 100 (purchase collaboration devices 100 are integrated with purchase collaboration devices), and a computer readable storage medium corresponding to the purchase collaboration method is run in the purchase collaboration devices 100 to execute steps of the purchase collaboration method.
It may be understood that the purchase cooperative device in the purchase cooperative method scenario shown in fig. 1, or the apparatus included in the purchase cooperative device, does not limit the embodiment of the present invention, that is, the number of devices and the type of devices of the purchase cooperative device included in the purchase cooperative method scenario, or the number of apparatuses and the type of apparatuses included in each device do not affect the overall implementation of the technical solution in the embodiment of the present invention, and may be calculated as equivalent replacement or derivative of the technical solution claimed in the embodiment of the present invention.
The purchase cooperative device 100 in the embodiment of the invention is mainly used for:
acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
group signature is carried out on the purchase cooperative ciphertext according to a preset node transaction group, and the purchase cooperative ciphertext after group signature is uplink;
And acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext.
The purchase cooperative device 100 in the embodiment of the invention may be a plurality of independent purchase cooperative devices, for example, an intelligent terminal such as a mobile phone, a tablet computer, an intelligent television, a network device, a server, an intelligent computer and the like, or may be a purchase cooperative network or a purchase cooperative cluster formed by a plurality of purchase cooperative devices.
The embodiment of the application provides a purchase cooperation method, a purchase cooperation device, purchase cooperation equipment and a computer readable storage medium, and the purchase cooperation method, the purchase cooperation device, the purchase cooperation equipment and the computer readable storage medium are respectively described in detail below.
It will be understood by those skilled in the art that the application environment shown in fig. 1 is only one application scenario related to the solution of the present application, and is not limited to the application scenario of the solution of the present application, and other application environments may further include more or fewer purchase cooperative devices than those shown in fig. 1, or a purchase cooperative network connection relationship, for example, only one purchase cooperative device is shown in fig. 1, and it is understood that the scenario of the purchase cooperative method may further include one or more purchase cooperative devices, which is not limited herein in particular; the procurement collaboration device 100 may further include a memory for storing procurement collaboration data and other data.
It should be noted that, the schematic view of the scenario of the purchase collaboration method shown in fig. 1 is only an example, and the scenario of the purchase collaboration method described in the embodiment of the present invention is for more clearly describing the technical solution of the embodiment of the present invention, and does not constitute a limitation to the technical solution provided by the embodiment of the present invention.
Based on the above scenario of the purchase collaboration method, various embodiments of the purchase collaboration method disclosed by the invention are provided.
As shown in fig. 2, fig. 2 is a flow chart of one embodiment of a purchase collaboration method in an embodiment of the present application, where the purchase collaboration method includes the following steps 201 to 204:
201. acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
the purchase collaboration method in this embodiment is applied to purchase collaboration devices, and the type and number of the purchase collaboration devices are not specifically limited, that is, the purchase collaboration devices may be one or more intelligent terminals or servers, and in a specific embodiment, the purchase collaboration devices are intelligent computers.
Specifically, the purchase cooperative device is configured to generate a purchase cooperative node, and perform attribute encryption on purchase cooperative information of the purchase cooperative node to obtain a purchase cooperative ciphertext and perform uplink. Optionally, the purchase cooperative node may be configured as a purchase cooperative node of a corresponding type according to different enterprise types in the purchase process, for example, if the enterprise type is a manufacturer, the purchase cooperative node corresponding to the enterprise type is a manufacturing node. Optionally, in one embodiment, the types of businesses in the procurement scenario include manufacturer, foundry, and supplier types of businesses. Different enterprise types in the purchasing scene correspond to different purchasing cooperative nodes.
Specifically, when the purchase cooperative equipment is in an operation state, a purchase cooperative request is received, wherein the purchase cooperative request is an operation instruction for requesting the purchase cooperative equipment to encrypt the purchase cooperative information and link the encrypted purchase cooperative information. Optionally, the manner of triggering the purchase collaboration request is not specifically limited herein, that is, the purchase collaboration request may be actively triggered by a user, for example, the user is a purchasing person of an enterprise, and the purchase collaboration request is triggered by inputting purchase collaboration information into the purchase collaboration device. In addition, the purchase collaboration request may be automatically triggered by the purchase collaboration device, for example, the purchase collaboration device presets a purchase collaboration process, and the purchase collaboration request is automatically triggered in a preset time period. The purchase cooperative information is information related to purchase of different types of enterprises in a purchase scene, for example, purchase demand information for representing raw materials required to be purchased in the operation process of the foundry; and purchase confirmation information generated by other enterprises associated with the purchase demand information in the purchase scene.
Optionally, before the purchase cooperative device receives the purchase cooperative request, a purchase cooperative node of each enterprise in the purchase scene is created in advance. Specifically, the purchase cooperative device receives node registration information and generates a node certificate and a node private key corresponding to the node registration information. After the node certificate and the node private key corresponding to the enterprise are acquired, node registration identity registration and authentication are carried out in a purchasing alliance chain, so that a purchasing cooperative node corresponding to the appointed enterprise in the purchasing scene is created. Wherein the purchase cooperative nodes corresponding to enterprises of different enterprise types are different, in one specific embodiment, the purchase cooperative nodes comprise a manufacturing node, a substitute node and a supplier node, and optionally, in other embodiments, the purchase cooperative nodes further comprise a supervision node.
After the purchasing cooperative equipment performs node registration on the purchasing cooperative node, a purchasing cooperative request is received, and purchasing cooperative information of the purchasing cooperative node is obtained, wherein the purchasing cooperative information comprises purchasing information related to purchasing and identity attributes of an associated target purchasing cooperative node. The purchase cooperative equipment acquires the purchase cooperative node, reads the identity attribute of the target purchase cooperative node, inputs the identity attribute into a preset attribute encryption rule, generates an attribute strategy corresponding to the identity attribute, and encrypts the purchase cooperative information through the attribute strategy and the encryption public key, so as to obtain a purchase cooperative ciphertext corresponding to the purchase cooperative information. In the alliance chain of the purchasing scene, only the target purchasing cooperative node with the corresponding identity attribute can decrypt the purchasing cooperative ciphertext.
Optionally, in a specific embodiment, the purchase cooperative device is an intelligent terminal associated with the foundry, the purchase cooperative device acquires node registration information of the foundry, performs node registration in a purchase alliance chain based on the node registration information, creates a foundry node corresponding to the foundry, and receives the purchase cooperative information after creating the foundry node, wherein the purchase cooperative information is purchase request information initiated by the foundry based on service requirements, and the purchase request information is request information of requesting purchase from a manufacturer enterprise by the foundry. The purchase cooperative equipment acquires a target purchase cooperative node pointed in the purchase request information, the target purchase cooperative node is a manufacturing node corresponding to a manufacturer enterprise, the identity attribute of the manufacturing node and the identity attribute of a related supervision node are acquired, an attribute strategy of the purchase request information is constructed through the identity attribute of the manufacturing node and the identity attribute of the related supervision node, and the purchase request information is subjected to attribute encryption according to the attribute strategy to obtain a purchase request ciphertext.
202. Performing group signature on the purchase cooperative ciphertext according to the node transaction group corresponding to the purchase cooperative node, and uploading the purchase cooperative ciphertext after group signature;
after the purchase cooperative device generates the purchase cooperative ciphertext, the purchase cooperative ciphertext is uplink and the target purchase cooperative node pointed by the purchase cooperative ciphertext is notified. Specifically, the purchase cooperative device performs group signature on the purchase cooperative ciphertext, and links the purchase cooperative ciphertext before and after the group, so that the target purchase cooperative node is enabled.
Specifically, in order to avoid that sensitive information purchased by enterprises is acquired by other nodes in the alliance chain, the purchase cooperative equipment groups each purchase cooperative node in a purchase scene in advance according to different enterprise types, and creates a corresponding node transaction group according to a grouping result. Optionally, the node transaction group includes a manufacturing node group, a proxy node group, and a supplier node group.
Specifically, the purchase cooperative device creates a plurality of node groups in the alliance chain in advance, and configures parameters of each node group to generate a group public key, a group main private key and a group parameter corresponding to the node group. The group parameters comprise group types of node groups, and the group types comprise manufacturer group types, foundry group types and provider node group types according to purchasing scene requirements. After the node group is created, the purchase cooperative device obtains the node type attribute of each purchase cooperative node in the purchase alliance chain, wherein the node type attribute is an enterprise type for representing each enterprise in a purchase scene, for example, if the purchase cooperative node is a foundry node, the node type is a foundry node type. Optionally, the node types include a foundry node type, a manufacturer node type, and a supplier node type.
After acquiring the node type attribute of the purchase cooperative node, the purchase cooperative device classifies the purchase cooperative node based on the node type attribute, and classifies and combines the purchase cooperative nodes with the same node type attribute to obtain the node combination with the same node type attribute. And matching the node combination with the node group, and adding the purchase cooperative node in the node combination into the node group with the same node attribute type. The procurement collaboration device also drives the node group to generate a group member private key for the procurement collaboration node.
After the purchase cooperative device acquires the purchase cooperative ciphertext, determining a node transaction group corresponding to the purchase cooperative node, generating a group signature associated with the node transaction group in the purchase cooperative ciphertext, performing group signature processing on the purchase cooperative ciphertext, and calling a purchase contract in a purchase alliance chain to uplink the purchase cooperative ciphertext after the group signature processing so as to inform the associated purchase cooperative node to perform purchase cooperative operation, wherein other nodes in the purchase alliance chain cannot determine the specific purchase cooperative node sending the purchase cooperative ciphertext.
203. And acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext.
After the specific purchase cooperative nodes in the purchase alliance chain perform group signature and uplink on the purchase cooperative ciphertext, other associated purchase cooperative devices schedule the corresponding purchase cooperative nodes to decrypt the purchase cooperative ciphertext, so that the target purchase node pointed by the purchase cooperative ciphertext can acquire the purchase cooperative information and feed back according to the purchase cooperative information.
Specifically, the purchase cooperative device corresponding to each purchase cooperative node reads the purchase cooperative ciphertext in the purchase alliance chain, and acquires the attribute policy in the purchase cooperative ciphertext. And determining whether the purchase cooperative node is a target purchase cooperative node pointed by the purchase cooperative ciphertext according to the attribute policy, wherein the target purchase cooperative node is a purchase cooperative node with identity attribute conforming to the attribute policy of the purchase cooperative ciphertext.
Specifically, the purchase cooperative device obtains an identity attribute set of a purchase cooperative node in a purchase alliance chain, and compares the identity attribute set with the attribute policy, so as to judge whether the purchase cooperative node is a target purchase cooperative node pointed by a purchase cooperative ciphertext, wherein the identity attribute set is an identity attribute value set representing the identity characteristics of the purchase cooperative node. Optionally, the identity attribute set includes attribute data such as enterprise name, enterprise type, node identifier, etc. capable of characterizing the identity of the purchasing collaborative node.
And the purchase cooperative equipment compares the identity attribute in the identity attribute set with the attribute policy, and if the identity attribute in the identity attribute set is matched with the attribute policy, the purchase cooperative node corresponding to the identity attribute set is determined to be the target purchase cooperative node pointed by the purchase cooperative ciphertext.
And the purchase cooperative equipment corresponding to the target purchase cooperative node inputs each identity attribute in the identity attribute set of the target purchase cooperative node into the attribute strategy of the purchase cooperative ciphertext, and decrypts the purchase cooperative ciphertext, so that the purchase cooperative information is obtained.
Optionally, in a specific embodiment, the purchase cooperative ciphertext is ciphertext data carrying purchase request information of a proxy node, an attribute policy set by the purchase cooperative ciphertext is identity attribute data of a manufacturing node a, purchase cooperative equipment corresponding to the proxy node signs the purchase cooperative ciphertext group and then links the purchase cooperative ciphertext group, the purchase cooperative equipment corresponding to the manufacturing node a obtains an identity attribute set of the manufacturing node a, compares the identity attribute set with the attribute policy of the purchase cooperative ciphertext, and determines that the manufacturing node a is a target cooperative node if identity attributes in the identity attribute set are matched with identity attributes preset by the attribute policy, and the purchase cooperative equipment corresponding to the manufacturing node a decrypts the purchase cooperative ciphertext of the proxy node through the identity attribute set to obtain the purchase request information.
After decrypting the purchase cooperative ciphertext to obtain the purchase cooperative information, the target purchase cooperative node and the corresponding purchase cooperative device audit the purchase cooperative information and generate a purchase feedback result corresponding to the purchase cooperative information. Optionally, the purchase feedback result is different according to the different purchase cooperative information and the different enterprise types of the target purchase cooperative node. For example, if the purchase cooperative information is purchase request information of the proxy node, the purchase feedback result is a purchase confirmation result and a purchase rejection result generated by the manufacturing node or the supplier node.
Specifically, the purchase cooperative device determines target feedback nodes of the purchase feedback result, wherein the target feedback nodes of the purchase feedback results of different types may be different, and optionally, if the purchase feedback result is a purchase confirmation result sent by the manufacturing node, the target feedback node corresponding to the purchase confirmation result is a supplier node designated by the manufacturing node; if the purchase feedback result is a purchase reject result sent by the manufacturing node, the target feedback node corresponding to the purchase reject result is a substitute node sending purchase cooperative information. Optionally, the number of target feedback nodes of the purchase feedback result may be multiple, for example, when the purchase feedback result is a feedback result of the provider node processing the purchase order, the target feedback nodes corresponding to the purchase feedback result are a substitute node and a manufacturing node.
After the purchasing cooperative equipment determines a target feedback node of the purchasing feedback result, acquiring the identity attribute of the target feedback node, creating a corresponding attribute strategy according to the identity attribute, and carrying out attribute encryption on the purchasing feedback result through the attribute strategy, thereby obtaining a purchasing feedback ciphertext.
The purchasing cooperative equipment further determines a node group where the target purchasing cooperative node is located, obtains a group member private key and a group member public key of the node group, performs group signature on the purchasing feedback ciphertext through the group member private key and the group member public key, and invokes the purchasing contract to perform uplink accounting storage on the purchasing feedback ciphertext after the group signature. Therefore, the target feedback node can decrypt and obtain the purchase feedback information corresponding to the purchase feedback ciphertext, and execute corresponding purchase cooperative operation according to the purchase feedback information. The group signature method comprises the steps that a group signature is carried out on a certain message by a group node through a group private key and a group public key, and the message is uploaded; the common node can verify the group signature through the public key of the group member, so as to determine the node group corresponding to the group signature; in the monitoring and examining scene, the node group owner can acquire the information of the signature group member corresponding to the group signature through the group owner private key, namely, only the purchasing cooperative node of the purchasing feedback ciphertext after the group signature can be determined by the group owner node in the monitoring and examining scene, and other nodes can only determine the node group of the purchasing feedback ciphertext and can not determine the specific node of the group signature, so that the privacy security of each purchasing cooperative node in purchasing is ensured.
Specifically, the purchase cooperative device corresponding to the target feedback node determines an attribute strategy corresponding to the purchase feedback ciphertext, acquires a preset identity attribute set, and decrypts the purchase feedback ciphertext according to the identity attribute set and the attribute strategy, so as to obtain the purchase feedback information.
Optionally, if the target feedback node is a proxy node, after the purchase cooperative device corresponding to the proxy node obtains the purchase feedback information, if the purchase feedback information is purchase confirmation information, generating a corresponding production plan according to the purchase confirmation information, executing corresponding proxy production operation according to the production plan, and performing attribute encryption and group signature processing on the production plan to obtain a production plan ciphertext and linking the production plan ciphertext, so that the target purchase cooperative node can effectively sense the purchase cooperative operation of the target feedback node.
Optionally, in order to ensure the requirement of supervision audit, when the purchase cooperative device encrypts the purchase cooperative information and the purchase feedback information, the identity attribute of the supervision node is correspondingly added, so that the supervision node can decrypt the purchase cooperative ciphertext or the purchase feedback ciphertext, and the purchase validity is ensured.
In this embodiment, the purchase cooperative device obtains a purchase cooperative ciphertext by obtaining purchase cooperative information of a purchase cooperative node, performing attribute encryption on the purchase cooperative information, and performing group signature and uplink on the purchase cooperative ciphertext according to a node transaction group corresponding to the purchase cooperative node, so that only the purchase cooperative ciphertext points to in a purchase alliance chain, and a node with a corresponding attribute can analyze and view the purchase cooperative information carried by the purchase cooperative ciphertext; and the target purchase cooperative node pointed by the attribute strategy associated with the purchase cooperative ciphertext is scheduled to decrypt the purchase cooperative ciphertext to obtain purchase information; and acquiring a purchase feedback result generated by the target purchase node based on the purchase cooperative information, and performing attribute encryption and group signature processing on the purchase feedback result, thereby acquiring a purchase feedback ciphertext and uploading the purchase feedback ciphertext. The key scene in the purchasing flow is uplink, the information trusted sharing is realized, and the sensitive information safety and privacy protection of each purchasing node are effectively ensured in the sharing process.
Fig. 3 is a schematic flow chart of an embodiment of attribute encryption for purchase cooperative information in the purchase cooperative method according to the embodiment of the present application.
Based on the above embodiment, in the embodiment of the present application, by determining a target purchase cooperative node to which purchase cooperative information points, setting an attribute policy of the purchase cooperative information according to the target purchase cooperative node, and calling the attribute policy to perform attribute encryption on the purchase cooperative information, specifically, the method includes steps 301 to 303:
301. acquiring purchase cooperative information of the purchase cooperative node and a target purchase cooperative node associated with the purchase cooperative information;
302. acquiring the identity attribute of the target purchase cooperative node, and inputting the identity attribute into a preset strategy rule to obtain an attribute strategy of the purchase cooperative information;
303. and calling the attribute strategy and the encryption public key to perform attribute encryption on the purchase cooperative information to obtain the purchase cooperative ciphertext.
In this embodiment, in order to avoid leakage of the purchase secret caused by acquisition of purchase information by other irrelevant nodes in the purchase federation chain, the purchase cooperative device performs attribute encryption on the purchase cooperative information after acquiring the purchase cooperative information of the purchase cooperative node.
The purchase cooperative equipment analyzes the purchase cooperative information, obtains the node identification of the target purchase cooperative node carried in the purchase cooperative information, and determines the target purchase cooperative node to be sent by the purchase cooperative information. After the purchasing cooperative equipment determines the target purchasing cooperative node, the node identification is input in a preset node database for inquiring, and the identity attribute of the target purchasing cooperative node is obtained, wherein the node database is optionally a database storing node registration information of each purchasing cooperative node.
The purchase cooperative equipment presets a strategy rule for encrypting the purchase cooperative information, wherein the strategy rule is an attribute strategy rule for determining that the purchase cooperative information can be accessed by a specific node. The policy rule is an association relationship specifying a feature capable of decrypting an attribute of the specified ciphertext, for example, in a specific embodiment, the policy rule of the purchase cooperative information is a policy rule, which indicates that one or more nodes exist and can each decrypt the purchase cooperative ciphertext corresponding to the purchase cooperative information. The policy rule is characterized as (node 1) or (node 2) or … or (node n).
After acquiring the identity attribute of the target purchase cooperative node, the purchase cooperative device inputs the identity attribute into a preset policy rule, so that the attribute policy of the purchase cooperative information is obtained through the identity attribute pair of the target purchase cooperative node, and optionally, in a specific embodiment, the attribute policy of the purchase cooperative information is (manufacturing node a) or (supervisory node 1) or … or (supervisory node n). After generating the attribute policy, the purchase cooperative device invokes the attribute policy and the encryption public key to encrypt the purchase cooperative information to obtain a purchase cooperative ciphertext corresponding to the purchase cooperative information, and then performs group signature and uplink on the purchase cooperative ciphertext, so that only target purchase cooperative nodes and supervision nodes conforming to related attributes in a purchase alliance chain can decrypt the purchase cooperative ciphertext.
In this embodiment, the purchase coordination device receives purchase coordination information of the purchase coordination node, and determines a target purchase coordination node corresponding to the purchase coordination information. After determining a target purchase cooperative node, acquiring an identity attribute of the target purchase cooperative node, inputting the identity attribute into a preset strategy rule, thereby obtaining an attribute strategy of the purchase cooperative information, and calling the attribute strategy and an encryption public key to perform attribute encryption on the purchase cooperative information, thereby obtaining a purchase cooperative ciphertext corresponding to the purchase cooperative information. The method and the device realize that other irrelevant nodes are restricted to decrypt and acquire the purchase cooperative information by setting the attribute strategy corresponding to the purchase cooperative information in the purchase scene, and protect the data privacy security of the purchase scene.
Fig. 4 is a schematic flow chart of an embodiment of group signing a purchase collaboration ciphertext in the purchase collaboration method according to the embodiment of the present application.
Based on the above embodiment, in the embodiment of the present application, by acquiring node types of different nodes, creating node transaction groups of different purchase scenes according to the node types, and performing group signature on the purchase collaborative ciphertext, the method specifically includes steps 401 to 403:
401. Obtaining a group certificate of the node transaction group, wherein the group certificate comprises a group member private key and a group member public key;
402. group signature is carried out on the purchase cooperative ciphertext according to the group member private key and the group member public key;
403. and calling a preset purchase contract to confirm and uplink the purchase collaborative ciphertext after group signing.
In this embodiment, after obtaining the purchase cooperative ciphertext, the purchase cooperative device performs group signature on the purchase cooperative ciphertext, and links the purchase cooperative ciphertext after the group signature.
Specifically, the purchase cooperative device identifies a node transaction group corresponding to the purchase cooperative ciphertext and acquires a group certificate of the node transaction group, wherein the group certificate is a certificate containing group member public key information generated by a group administrator for a purchase cooperative node joining the node transaction group, the group certificate contains a group member private key and a group member public key, and the group member public key is configured as a key for verifying the correctness of a group signature; the group member private key is configured as a key for tracking the group signature and determining the identity of the signer.
And after receiving the purchase cooperative ciphertext, the purchase cooperative device calls the group member private key and the group member public key to carry out group signature on the purchase cooperative ciphertext to obtain the signed purchase cooperative ciphertext.
After the purchase cooperative device performs group signature on the purchase cooperative ciphertext, a preset purchase contract is called to confirm the purchase cooperative ciphertext after the group signature, and the purchase cooperative ciphertext after the group signature is successfully confirmed is uplink, so that the target purchase cooperative node can acquire the purchase cooperative ciphertext in a purchase alliance chain, and other purchase cooperative nodes cannot determine the sender of the purchase cooperative ciphertext.
Optionally, after the purchase cooperative ciphertext is uplink, the supervision node can acquire the group certificate information of the signer through the group master private key and the group signature, so as to determine the identity information of the signer, thereby realizing purchase supervision.
In this embodiment, the purchase cooperative device obtains a group certificate of the node transaction group, where the group certificate includes a group member private key and a group member public key; driving the purchase cooperative node to call the crowd private key and the crowd public key to carry out group signature on the purchase cooperative ciphertext; and calling a preset purchase contract to confirm and uplink the purchase collaborative ciphertext after group signing. The method and the system effectively protect the purchase privacy information of each purchase cooperative node in a purchase scene based on the blockchain.
In order to better implement the purchase coordination method in the embodiment of the present application, on the basis of the purchase coordination method, a purchase coordination device is further provided in the embodiment of the present application, as shown in fig. 5, fig. 5 is a schematic structural diagram of one embodiment of the purchase coordination device in the embodiment of the present application, where the purchase coordination device 500 includes:
the attribute encryption module 501 is configured to acquire purchase cooperative information, and perform attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
the ciphertext signing module 502 is configured to perform group signing on the purchase cooperative ciphertext according to a preset node transaction group, and uplink the purchase cooperative ciphertext after group signing;
and the purchase feedback module 503 is configured to obtain a purchase feedback ciphertext, and execute corresponding purchase cooperative operation according to the purchase feedback ciphertext.
In some embodiments of the present application, the purchase coordination device obtains purchase coordination information of the purchase coordination node, and before performing attribute encryption on the purchase coordination information to obtain a purchase coordination ciphertext, the method further includes:
receiving node registration information, and acquiring a node certificate and a node private key of the node registration information;
and registering nodes in a preset purchasing alliance chain through the node certificate and the node private key, and creating a purchasing cooperative node, wherein the purchasing cooperative node comprises a manufacturing node, a substitute node and a provider node.
In some embodiments of the present application, the purchase collaboration device obtains purchase collaboration information of a purchase collaboration node, performs attribute encryption on the purchase collaboration information to obtain a purchase collaboration ciphertext, and includes:
acquiring the purchase cooperative information, and determining an associated target purchase cooperative node according to the purchase cooperative information;
acquiring the identity attribute of the target purchase cooperative node, and inputting the identity attribute into a preset strategy rule to obtain an attribute strategy of the purchase cooperative information;
and calling the attribute strategy and the encryption public key to perform attribute encryption on the purchase cooperative information to obtain the purchase cooperative ciphertext.
In some embodiments of the present application, the purchase cooperative device performs group signature on the purchase cooperative ciphertext according to a node transaction group corresponding to the purchase cooperative node, and before the purchase cooperative ciphertext after the group signature is uplink, the method further includes:
acquiring node type attributes of each purchase cooperative node, and classifying the node types according to the node type attributes to obtain node combinations with the same node type attributes;
creating each node group associated with the node type attribute, and adding each purchase cooperative node in the node combination to a corresponding node group to obtain each node transaction group, wherein the node transaction group comprises a manufacturing node group, a substitute node group and a provider node group.
In some embodiments of the present application, the purchase cooperative device performs group signature on the purchase cooperative ciphertext according to a node transaction group corresponding to a purchase cooperative node, and links the purchase cooperative ciphertext after group signature, including:
obtaining a group certificate of the node transaction group, wherein the group certificate comprises a group member private key and a group member public key;
driving the purchase cooperative node to call the crowd private key and the crowd public key to carry out group signature on the purchase cooperative ciphertext;
and calling a preset purchase contract to confirm and uplink the purchase collaborative ciphertext after group signing.
In some embodiments of the present application, the purchase cooperation means obtains a purchase feedback ciphertext, and executes a corresponding purchase cooperation operation according to the purchase feedback ciphertext, including:
reading the purchase feedback ciphertext and determining an attribute strategy of the purchase feedback ciphertext;
acquiring a preset identity attribute set, decrypting the purchase feedback ciphertext according to the identity attribute set and the attribute strategy, and obtaining the purchase feedback information;
and executing corresponding purchase cooperative operation according to the purchase feedback information.
In some embodiments of the present application, the purchase cooperative apparatus executes a corresponding purchase cooperative operation according to the purchase feedback information, including:
Analyzing the purchase feedback ciphertext to determine purchase feedback information in the purchase feedback ciphertext;
if the purchase feedback information is purchase confirmation information, generating a production plan corresponding to the purchase confirmation information;
and executing corresponding purchase cooperative operation according to the production plan, generating a production plan ciphertext corresponding to the production plan, and uploading the production plan ciphertext.
In this embodiment, the purchase cooperative device obtains a purchase cooperative ciphertext by obtaining purchase cooperative information of a purchase cooperative node, performing attribute encryption on the purchase cooperative information, and performing group signature and uplink on the purchase cooperative ciphertext according to a node transaction group corresponding to the purchase cooperative node, so that only the purchase cooperative ciphertext points to in a purchase alliance chain, and a node with a corresponding attribute can analyze and view the purchase cooperative information carried by the purchase cooperative ciphertext; and the target purchase cooperative node pointed by the attribute strategy associated with the purchase cooperative ciphertext is scheduled to decrypt the purchase cooperative ciphertext to obtain purchase information; and acquiring a purchase feedback result generated by the target purchase node based on the purchase cooperative information, and performing attribute encryption and group signature processing on the purchase feedback result, thereby acquiring a purchase feedback ciphertext and uploading the purchase feedback ciphertext. The key scene in the purchasing flow is uplink, the information trusted sharing is realized, and the sensitive information safety and privacy protection of each purchasing node are effectively ensured in the sharing process.
The embodiment of the invention also provides purchase cooperative equipment, as shown in fig. 6, and fig. 6 is a schematic structural diagram of one embodiment of the purchase cooperative equipment provided in the embodiment of the application.
The purchase cooperative equipment integrates any one of the purchase cooperative devices provided by the embodiment of the invention, and comprises:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to perform the steps of the purchase coordination method described in any of the above purchase coordination method embodiments by the processor.
Specifically, the present invention relates to a method for manufacturing a semiconductor device. The procurement collaboration device may include components such as a processor 601 of one or more processing cores, a memory 602 of one or more computer-readable storage media, a power supply 603, and an input unit 604. Those skilled in the art will appreciate that the procurement co-device structure shown in fig. 6 does not constitute a limitation of the procurement co-device, and may include more or fewer components than shown, or may combine certain components, or may have a different arrangement of components. Wherein:
processor 601 is the control center of the procurement cooperative device, connects the various parts of the entire procurement cooperative device using various interfaces and lines, and performs various functions and processes data of the procurement cooperative device by running or executing software programs and/or modules stored in memory 602 and invoking data stored in memory 602, thereby performing overall monitoring of the procurement cooperative device. Optionally, the processor 601 may include one or more processing cores; preferably, the processor 601 may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, applications, etc., and the modem processor primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 601.
The memory 602 may be used to store software programs and modules, and the processor 601 may execute various functional applications and data processing by executing the software programs and modules stored in the memory 602. The memory 602 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data created from the use of the procurement collaboration device, etc. In addition, the memory 602 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 602 may also include a memory controller to provide access to the memory 602 by the processor 601.
The procurement co-equipment further comprises a power supply 603 for supplying power to the respective components, and preferably, the power supply 603 may be logically connected to the processor 601 through a power management system, so that functions of managing charging, discharging, power consumption management and the like are achieved through the power management system. The power supply 603 may also include one or more of any components, such as a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The procurement collaboration device may also include an input unit 604, which input unit 604 may be used to receive entered numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the purchase cooperative apparatus may further include a display unit or the like, which is not described herein. Specifically, in this embodiment, the processor 601 in the purchase cooperative device loads executable files corresponding to the processes of one or more application programs into the memory 602 according to the following instructions, and the processor 601 executes the application programs stored in the memory 602, so as to implement various functions as follows:
acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
group signature is carried out on the purchase cooperative ciphertext according to a preset node transaction group, and the purchase cooperative ciphertext after group signature is uplink;
and acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext.
In the foregoing embodiments, the descriptions of the embodiments are focused on, and the portions of one embodiment that are not described in detail in the foregoing embodiments may be referred to in the foregoing detailed description of other embodiments, which are not described herein again.
In the implementation, each unit or structure may be implemented as an independent entity, or may be implemented as the same entity or several entities in any combination, and the implementation of each unit or structure may be referred to the foregoing method embodiments and will not be repeated herein.
To this end, embodiments of the present invention provide a computer-readable storage medium, which may include: read-only memory (ROM, read On ly Memory), random access memory (RAM, random Access Memory), magnetic or optical disk, and the like. On which a computer program is stored, which is loaded by a processor to perform the steps of any of the procurement collaboration methods provided by embodiments of the invention. For example, the loading of the computer program by the processor may perform the steps of:
acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
group signature is carried out on the purchase cooperative ciphertext according to a preset node transaction group, and the purchase cooperative ciphertext after group signature is uplink;
and acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
The foregoing has described in detail a purchase collaboration method provided by embodiments of the present application, and specific embodiments have been applied herein to illustrate the principles and embodiments of the present invention, where the foregoing embodiments are merely intended to facilitate an understanding of the method and core ideas of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in light of the ideas of the present invention, the present description should not be construed as limiting the present invention.

Claims (10)

1. A purchase collaboration method, the purchase collaboration method comprising:
acquiring purchase cooperative information, and performing attribute encryption on the purchase cooperative information to obtain a purchase cooperative ciphertext;
group signature is carried out on the purchase cooperative ciphertext according to a preset node transaction group, and the purchase cooperative ciphertext after group signature is uplink;
and acquiring a purchase feedback ciphertext, and executing corresponding purchase cooperative operation according to the purchase feedback ciphertext.
2. The purchase cooperation method according to claim 1, wherein before obtaining purchase cooperation information, performing attribute encryption on the purchase cooperation information to obtain purchase cooperation ciphertext, further comprising:
Receiving node registration information, and acquiring a node certificate and a node private key of the node registration information;
and registering nodes in a preset purchasing alliance chain through the node certificate and the node private key, and creating a purchasing cooperative node, wherein the purchasing cooperative node comprises a manufacturing node, a substitute node and a provider node.
3. The purchase cooperation method as recited in claim 1, wherein the obtaining purchase cooperation information, performing attribute encryption on the purchase cooperation information to obtain a purchase cooperation ciphertext, includes:
acquiring the purchase cooperative information, and determining an associated target purchase cooperative node according to the purchase cooperative information;
acquiring the identity attribute of the target purchase cooperative node, and inputting the identity attribute into a preset strategy rule to obtain an attribute strategy of the purchase cooperative information;
and calling the attribute strategy and the encryption public key to perform attribute encryption on the purchase cooperative information to obtain the purchase cooperative ciphertext.
4. The method of purchasing collaboration as described in claim 1, wherein the preset node transaction group performs group signature on the purchasing collaboration ciphertext, and further comprises, before the group-signed purchasing collaboration ciphertext is uplink:
Acquiring node type attributes of each purchase cooperative node, and classifying the node types according to the node type attributes to obtain node combinations with the same node type attributes;
creating each node group associated with the node type attribute, and adding each purchase cooperative node in the node combination to a corresponding node group to obtain each node transaction group, wherein the node transaction group comprises a manufacturing node group, a substitute node group and a provider node group.
5. The method of purchasing collaboration as described in claim 4, wherein the group signing the purchasing collaboration ciphertext according to a preset node transaction group, and the uplink of the purchasing collaboration ciphertext after group signing includes:
obtaining a group certificate of the node transaction group, wherein the group certificate comprises a group member private key and a group member public key;
group signature is carried out on the purchase cooperative ciphertext according to the group member private key and the group member public key;
and calling a preset purchase contract to confirm and uplink the purchase collaborative ciphertext after group signing.
6. The purchase cooperation method as recited in claim 1, wherein the obtaining the purchase feedback ciphertext and executing the corresponding purchase cooperation according to the purchase feedback ciphertext comprises:
Reading the purchase feedback ciphertext and determining an attribute strategy of the purchase feedback ciphertext;
acquiring a preset identity attribute set, decrypting the purchase feedback ciphertext according to the identity attribute set and the attribute strategy, and obtaining purchase feedback information;
and executing corresponding purchase cooperative operation according to the purchase feedback information.
7. The procurement cooperation method of claim 1 characterized by, the performing the corresponding procurement cooperation according to the procurement feedback information comprises:
analyzing the purchase feedback ciphertext to determine purchase feedback information in the purchase feedback ciphertext;
if the purchase feedback information is purchase confirmation information, generating a production plan corresponding to the purchase confirmation information;
and executing corresponding purchase cooperative operation according to the production plan, generating a production plan ciphertext corresponding to the production plan, and uploading the production plan ciphertext.
8. A procurement cooperation device, characterized in that the procurement cooperation device comprises:
the attribute encryption module is configured to acquire purchase cooperative information, and perform attribute encryption on the purchase cooperative information according to an attribute strategy corresponding to the purchase cooperative node to acquire a purchase cooperative ciphertext;
The ciphertext signature module is configured to perform group signature on the purchase cooperative ciphertext according to a preset node transaction group, and uplink the purchase cooperative ciphertext after group signature;
and the purchase feedback module is configured to acquire a purchase feedback ciphertext and execute corresponding purchase cooperative operation according to the purchase feedback ciphertext.
9. A procurement collaboration device, characterized by comprising:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement the procurement collaboration method of any of claims 1-7.
10. A computer-readable storage medium, having stored thereon a computer program, the computer program being loaded by a processor to perform the steps of the procurement collaboration method of any of claims 1 to 7.
CN202210680681.5A 2022-06-15 2022-06-15 Purchasing collaboration method, device, equipment and storage medium Pending CN117294451A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210680681.5A CN117294451A (en) 2022-06-15 2022-06-15 Purchasing collaboration method, device, equipment and storage medium
PCT/CN2023/112960 WO2023241741A1 (en) 2022-06-15 2023-08-14 Procurement coordination method, apparatus and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210680681.5A CN117294451A (en) 2022-06-15 2022-06-15 Purchasing collaboration method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117294451A true CN117294451A (en) 2023-12-26

Family

ID=89192280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210680681.5A Pending CN117294451A (en) 2022-06-15 2022-06-15 Purchasing collaboration method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN117294451A (en)
WO (1) WO2023241741A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107911216B (en) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 Block chain transaction privacy protection method and system
CN111211907B (en) * 2019-12-23 2023-06-09 中国人民解放军空军研究院特种勤务研究所 Information privacy protection and supervision method and system for logistics block chain
CN113592638A (en) * 2020-04-30 2021-11-02 顺丰科技有限公司 Transaction request processing method and device and alliance chain
CN111899022B (en) * 2020-08-07 2021-11-30 深圳前海星际同辉科技有限公司 Transaction information management method, device, equipment and computer readable storage medium
CN113761582B (en) * 2021-09-29 2023-06-16 山东省计算中心(国家超级计算济南中心) Group signature-based supervision blockchain transaction privacy protection method and system

Also Published As

Publication number Publication date
WO2023241741A1 (en) 2023-12-21

Similar Documents

Publication Publication Date Title
CN111914269B (en) Data security sharing method and system in blockchain and cloud storage environment
CN109858262B (en) Process approval method, device and system based on block chain system and storage medium
CN110933187B (en) Internet of things data transmission system based on block chain consensus encryption mechanism
CN107534855A (en) The authority of remote control targeted security element and the method for right
EP3345372B1 (en) Secure key management and peer-to-peer transmission system with a controlled, double-tier cryptographic key structure and corresponding method thereof
Pal et al. IoT technical challenges and solutions
US20220116773A1 (en) Method and apparatus for managing bundles of smart secure platform
CN107637039A (en) For the ownership of equipment to be transferred to the systems, devices and methods of user using embedded resource from manufacturer
CN112583802A (en) Data sharing platform system and equipment based on block chain and data sharing method
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN108256909A (en) A kind of integrating system and method based on block chain
CN112395353A (en) Intelligent electric energy meter quality data sharing method and system based on alliance chain
CN113704210A (en) Data sharing method and electronic equipment
CN114978635B (en) Cross-domain authentication method and device, user registration method and device
EP3957047A1 (en) Metering cloud workloads at edge computing devices
CN111880919A (en) Data scheduling method, system and computer equipment
CN116992458A (en) Programmable data processing method and system based on trusted execution environment
EP3542300B1 (en) Method for operating a peer-to-peer application
CN110337100B (en) Block chain-based method, terminal and system for adding one-number multi-card service auxiliary card
CN113610546A (en) Food production process tracing method, food circulation process tracing method and device
CN113872940A (en) Access control method, device and equipment based on NC-Link
CN117294451A (en) Purchasing collaboration method, device, equipment and storage medium
CN116743850A (en) Equipment self-discovery system based on Internet of things platform and implementation method thereof
CN116257860A (en) Authority management method and device, storage medium and electronic equipment
WO2016165443A1 (en) Method for protecting machine type communication device, network entity, and mtc device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination