CN117436879A - Rural property right transaction cloud signing method based on blockchain technology - Google Patents

Rural property right transaction cloud signing method based on blockchain technology Download PDF

Info

Publication number
CN117436879A
CN117436879A CN202311762724.5A CN202311762724A CN117436879A CN 117436879 A CN117436879 A CN 117436879A CN 202311762724 A CN202311762724 A CN 202311762724A CN 117436879 A CN117436879 A CN 117436879A
Authority
CN
China
Prior art keywords
data
contract
party
authentication
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311762724.5A
Other languages
Chinese (zh)
Other versions
CN117436879B (en
Inventor
王晟松
王立平
裘炜
姜晓龙
吴志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Nanda Shangcheng Software Technology Co ltd
Original Assignee
Nanjing Nanda Shangcheng Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Nanda Shangcheng Software Technology Co ltd filed Critical Nanjing Nanda Shangcheng Software Technology Co ltd
Priority to CN202311762724.5A priority Critical patent/CN117436879B/en
Publication of CN117436879A publication Critical patent/CN117436879A/en
Application granted granted Critical
Publication of CN117436879B publication Critical patent/CN117436879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Forestry; Mining

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Animal Husbandry (AREA)
  • Human Resources & Organizations (AREA)
  • Marine Sciences & Fisheries (AREA)
  • Mining & Mineral Resources (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Agronomy & Crop Science (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain technology-based rural title transaction cloud signing method, relates to the technical field of rural title transactions, and aims to solve the problem that the signing of a title transaction contract is more convenient and safer. The invention can better protect the privacy and safety of the stored data of the target contract by encrypting the data by the AES algorithm, thereby further protecting the integrity of the stored data of the target contract, directly signing the contract on line by the outflow party and the inflow party under the offsite condition by authenticating the identities of legal persons and natural persons, ensuring the legal effectiveness of signing the title transaction contract by the on-line traceability of signing will, and being beneficial to realizing the guarantee of transparent specification, reality and reliability of the online title transaction contract by authenticating the signatures of legal persons and natural persons, wherein all the title transaction contract documents correspond to the characteristics of related rural title transaction varieties.

Description

Rural property right transaction cloud signing method based on blockchain technology
Technical Field
The invention relates to the technical field of rural property trading, in particular to a rural property trading cloud signing method based on a blockchain technology.
Background
The rural property transaction refers to the behavior of a rural collective economic organization and members thereof for reasonably flowing and optimally configuring various owned assets and resources.
The Chinese patent with publication number of CN111553794A discloses a sharing platform and a method for intellectual property transaction based on blockchain, an order initiating module is activated mainly through a predetermined module, the predetermined module can also send out system broadcast, the order initiating module is connected with an order pool, a large number of intention orders are stored in the order pool, the output end of the order initiating module is electrically connected with a first notification module responding, the intelligent contract module is started to judge whether the intellectual property can be transacted or not, the transaction failure can be marked, and simultaneously, the notification can be sent to the whole platform after the transaction is successful, so that the fairness and transparency of the intellectual property transaction are greatly improved.
1. No further encryption and storage of the title transaction contract is performed, resulting in loss of the title transaction contract.
2. No identity authentication is performed on the personnel in the contract, resulting in the title transaction contract being incautious.
3. No further security authentication is performed on the outflow and inflow parties, resulting in non-traceability and non-uplinking of the title transaction contract.
Disclosure of Invention
The invention aims to provide a rural property transaction cloud signing method based on a blockchain technology, which can better protect the privacy and safety of target contract storage data by encryption processing through an AES algorithm, further protect the integrity of the target contract storage data, enable an outflow party and an inflow party to sign a contract on line under the off-site condition by identity authentication of a legal person and a natural person, enable signing will to be traced on line, further guarantee legal efficacy of signing of a property transaction contract, and be helpful for realizing the purpose of guaranteeing transparent specification, reality and reliability of the online property transaction contract by signature authentication of the legal person and the natural person, and enable all property transaction contract books to correspond to the property of related rural property transaction varieties in the prior art.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a method for transacting cloud subscription of rural property based on a blockchain technology comprises the following steps:
S1: the authenticating party generates the title transaction contract through the title transaction data acquisition unit, and the outflow party carries out auditing and security authentication on the title transaction contract after the title transaction contract is generated;
a title transaction data acquisition unit configured to:
the certification party generates the title data, and after the generation, the outflow party carries out security certification on the title data through a certification platform, wherein the certification platform is a third party certification system, and the third party certification system is called from a system database;
s2: after auditing and safety authentication are carried out on the title transaction contract by the outflow party, the inflow party carries out safety authentication on the title transaction contract through the transaction signing unit, and then carries out safety authentication and signing through the visa party;
a transaction signing unit for:
based on the property data of which the security authentication of the outflow party is finished in the property transaction data acquisition unit, after the authentication is qualified, the inflow party carries out auditing signing on the property data, after signing, the security authentication is carried out on the property data through an authentication platform, the certification party carries out signing authentication on the property data of which the security authentication of the inflow party is finished, and standard contract data is obtained after signing authentication;
s3: the personnel identity information and personnel signature information in the signed title transaction contract are authenticated and managed according to the identity authentication management unit;
An identity authentication management unit for:
based on the standard contract data acquired in the transaction signing unit, acquiring personnel data of an outflow party, an inflow party and a certification party in the standard contract data, performing authentication management on the personnel data of the outflow party and the inflow party after the personnel data are acquired, and acquiring target storage contract data after the authentication management;
s4: encrypting and storing the title transaction contract which passes the authentication management according to the signed data encryption storage unit;
the signing data encryption storage unit is used for:
and based on the target storage contract data obtained from the identity authentication management unit, carrying out data encryption on the target storage contract data, selecting a corresponding storage transmission channel according to the length of the target storage contract data after the data encryption is finished, and storing the target storage contract data after the storage transmission channel selection is finished.
Preferably, for the generation of the title transaction contract in S1, the method includes:
the title transaction contract is generated by a certification party, wherein when the certification party generates the contract, a staff of the certification party logs in the transaction platform safely;
after the transaction platform logs in safely, a staff of the certification party generates a title transaction contract;
And carrying out online filing after the title transaction contract is generated, obtaining the online sign after online filing, and synchronously corresponding the obtained online sign with the generated title transaction contract.
Preferably, the auditing and security authentication for the title transaction contract in S1 includes:
according to the acquired property right transaction contract corresponding to the network sign number, the outflow party carries out password login, and after the density login is completed, the outflow party carries out auditing on the property right transaction contract;
if the outflow party judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the certification party, and carrying out title transaction contract generation again by the certification party;
if the issuing party judges that the property right transaction contract auditing passes, performing issuing party property right transaction contract safety certification, wherein the safety certification is certified by a third party certification system;
the safety authentication flow is as follows: and carrying out willingness authentication on the property transaction contract which passes the verification, and carrying out electronic signature on the property transaction contract which is subjected to willingness authentication, wherein the electronic signature comprises identity verification, file uploading, signature creation, signature verification, signature storage and retrieval and legal evidence, and electronic stamping is carried out after the electronic signature is finished, wherein the electronic stamping comprises the steps of submitting the property transaction contract, confirming stamping, selecting stamping positions, applying the electronic stamp, confirming stamping results and storing and backing up.
Preferably, for the security authentication and signing of the title transaction contract by the inflow party and the visa party in S2, the method includes:
according to the title transaction contract which is finished by the security authentication of the outflow party, the inflow party carries out password login firstly, and after the density login is finished, the inflow party carries out auditing on the title transaction contract provided by the outflow party;
if the inflow side judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the outflow side, and modifying or submitting the title transaction contract to the certification side by the outflow side;
if the inflow side judges that the property transaction contract audit passes, performing the inflow side property transaction contract safety certification, wherein the safety certification is certified by a third party certification system;
according to the acquired title transaction contract with successful security authentication of the inflow party, the authentication party carries out password login, and after the password login is completed, the title transaction contract with successful security authentication of the inflow party is audited;
if the certification party judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the inflow party and the outflow party, and modifying or submitting the title transaction contract to the certification party by the inflow party and the outflow party;
if the certifier judges that the property right transaction contract audit is passed, performing security authentication of the certifier property right transaction contract, wherein the security authentication is authenticated by a third party authentication system;
And after the security authentication of the contract of the right-handed right transaction is completed, standard contract data are generated.
Preferably, for authentication of personnel identity information and personnel signature information in the title transaction contract in S3, the method includes:
according to personnel information of an outflow party and an inflow party in the standard contract data, acquiring data information of legal persons and natural persons in the standard contract data;
the legal person realizes identity authentication through enterprise basic information, unified social credit codes and related certificates, electronic certificates, legal person identity authentication and authorization books;
the natural person verifies the personal identity information through face recognition, bank card elements, mobile phone numbers and identity card modes to carry out real-name authentication.
Preferably, for the authentication of the personnel identity information and the personnel signature information in the title transaction contract in S3, further comprising:
authenticating the electronic signatures of the legal person and the natural person according to the legal person and the natural person with the identity authentication;
the electronic signature of the legal person is that a official seal is covered on white paper, the official seal is uploaded through photographing and is encrypted through a digital certificate authentication center to generate the official seal, or the electronic seal style is sent to the digital certificate authentication center to generate the official seal after being encrypted according to the electronic seal style provided in an electronic contract management library, and the signature of the legal person representative is that the signature of the legal person is generated through the digital certificate authentication center after being signed by a tablet externally connected with a mobile phone or a computer;
The electronic signature of the natural person is generated by signing on a mobile phone or a tablet externally connected with a computer and then encrypting through a digital certificate authentication center;
and generating target storage contract data after the legal person and the natural person sign authentication are completed.
Preferably, the storing of the target storage contract data in S4 includes:
reading the target storage contract data, and determining the contract type corresponding to the target storage contract data and the data source of the target storage contract data;
generating a first data storage request according to the contract type corresponding to the target storage contract data, and generating a second data storage request based on the data source corresponding to the target storage contract data;
inputting a second data storage request into a preset data storage address management library for first matching, and judging whether a data storage address consistent with the data source of target storage contract data exists in the preset data storage address management library according to a first matching result;
when the first matching result shows that the data storage address consistent with the data source of the target storage contract data exists in the preset data storage address management library, picking the target data storage address from the preset data storage address management library based on the second data storage request;
Determining a target area for storing target storage contract data based on the target storage address;
a preset storage file library is called in the target area, a first data storage request is input into the preset storage file library for second matching, and whether a data storage file with the same contract type as the target storage contract exists in the preset storage file library or not is judged according to a second matching result;
when the second matching result shows that a target data storage file consistent with the contract type of the target storage contract exists in the preset storage file library, storing target storage contract data in the target data storage file based on the first data storage request, otherwise, when the target data storage file consistent with the contract type of the target storage contract does not exist in the preset storage file library, newly building the target data storage file in the preset storage file library, and storing target storage contract data in the newly built target data storage file;
when the first matching result shows that the data storage address consistent with the data source of the target storage contract data does not exist in the preset data storage address management library, a storage area is newly built, a target data storage file is set in the newly built storage area, and meanwhile, the target storage contract data is stored in the target data storage file corresponding to the newly built storage area.
Preferably, encryption of the target storage contract data in S4 is used for:
converting plaintext data of target contract storage data into ciphertext data, wherein the plaintext data is converted into ciphertext data, and encryption processing is carried out on the ciphertext data through an AES algorithm;
encrypting the ciphertext data according to a secret key, wherein the secret key is a randomly generated secret key;
and acquiring the length of the encrypted ciphertext data, and acquiring the channel residual capacity of the storage transmission channels, wherein the number of the storage transmission channels is not less than four, selecting the storage transmission channels with the length of the encrypted ciphertext data greater than the channel residual capacity, and storing the storage transmission channels into a memory according to the storage transmission channels.
Preferably, before storing the target storage contract data in S4, integrity verification is performed on the target storage contract data, including:
when target storage contract data is transmitted to a memory, generating a data complete verification instruction based on the memory, and transmitting the data complete verification instruction to a certification party, an inflow party and an outflow party respectively;
the authentication party outputs first authentication information data according to the data complete authentication instruction, outputs second authentication information data according to the data complete authentication instruction based on the inflow party, and simultaneously outputs third authentication information data according to the data complete authentication instruction based on the outflow party;
Respectively feeding the first verification information data, the second verification information data and the third verification information data back to the memory, picking common verification information data in the first verification information data, the second verification information data and the third verification information data based on the memory, and taking the common verification information data as a first verification text;
acquiring a first key data set of residual data in the first verification information data, a second key data set of residual data in the second verification information data and a third key data set of residual data in the third verification information data based on the extraction result;
synthesizing the first key data set, the second key data set and the third key data set to obtain a second verification text;
comparing the target storage contract data with the first verification text and the second verification text respectively, and judging whether the target storage contract data passes the integrity verification or not;
when the target storage contract data comprises a first verification text and the target storage contract data comprises a second verification text, determining that the target storage contract data passes the integrity verification;
otherwise, determining that the target storage contract data does not pass the integrity verification.
Preferably, the integrity verification for the target storage contract data in S4 further includes:
when the target storage contract data does not pass the integrity verification, calculating the target repetition rate of the target storage contract data and the first verification text and the second verification text, and determining whether to reserve the target storage contract data according to the target repetition rate, wherein the method specifically comprises the following steps:
calculating target repetition rates of the target stored contract data and the first and second verification texts based on the following formula;
wherein,representing a target repetition rate of the target stored contract data with the first validation script and the second validation script; />Representing the total data amount corresponding to the target storage contract data; />Representing a total data amount in the target storage contract data, which coincides with the first verification text and the second verification text; />Representing the amount of data in the target storage contract data coinciding with the first authentication text content,/for>Representing the amount of data in the target storage contract data that coincides with the second validation script content, an;/>Represents the total data volume of the first authentication text, and +.>;/>Represents the total data volume of the second authentication text, and +.>;/>Represents a constant and takes a value of 1.2 x 10 3 ;/>Representing error factors, wherein the value range is (0, 1); />Representing a logarithmic function underlying e;
acquiring a preset repetition rate threshold, comparing the target repetition rate with the preset repetition rate threshold, and determining whether to reserve the target storage contract data or not based on a comparison result;
when the target repetition rate is equal to or greater than a preset repetition rate threshold, reserving target storage contract data;
otherwise, eliminating the target storage contract data.
Compared with the prior art, the invention has the following beneficial effects:
1. according to the rural property transaction cloud signing method based on the blockchain technology, the certification party is used for generating and initiating the property transaction contract, the authenticity of the property transaction contract is further improved, the electronic signature can enable the outflow party to sign the property transaction contract more conveniently, efficiently and safely, meanwhile, the electronic signature can be used for tracking the property transaction contract, and accordingly the security of the property transaction contract is further improved, the authenticity of the online digital identity is further improved according to the security authentication of the outflow party and the inflow party, the property transaction contract is signed after the security authentication is passed, and the signing period of the property transaction contract is further shortened.
2. According to the rural property transaction cloud signing method based on the blockchain technology, through identity authentication of legal persons and natural persons, an outflow party and an inflow party can directly sign contracts on line under the off-site condition, signing will can be traced on line, legal effectiveness of signing of property transaction contracts is further guaranteed, and through signature authentication of legal persons and natural persons, transparent specification, reality and reliability of online property transaction contracts are guaranteed, and all property transaction contract documents correspond to relevant rural property transaction variety characteristics.
3. According to the rural property transaction cloud signing method based on the blockchain technology, encryption processing is carried out through the AES algorithm, the AES algorithm has the functions of high safety, high efficiency, low memory requirement, flexible key and packet length design and strong password analysis resistance, and the privacy and safety of target contract stored data can be better protected, so that the integrity of the target contract stored data is further protected.
4. By reading the target storage contract, accurate and effective determination of contract type and data source of the target storage contract data is realized, and then, matching is carried out twice according to the contract type and the data source, so that accurate and effective locking of the target storage area corresponding to the parent package storage contract data and the target storage file in the target storage area is realized, when the corresponding target storage area and the target storage file are not available, the storage area and the storage file are newly built, the target storage contract data is effectively stored, and the ordering and the accuracy of the storage of the contract storage data are ensured.
5. The first verification information data output by the verification party, the second verification information data output by the inflow party and the third verification information data output by the outflow party can be accurately and intelligently determined through the storage generation of the data complete verification instruction, so that the first verification text and the second verification text are accurately determined through analysis and processing of the first verification information data, the second verification information data and the third verification information data, the integrity and completeness of target storage contract data are effectively guaranteed through the first verification text and the second verification text, the storage effectiveness of the target storage contract data is greatly guaranteed, and the rural property transaction management efficiency is facilitated.
Drawings
FIG. 1 is a schematic diagram of an overall flow unit of the present invention;
FIG. 2 is a schematic diagram of the overall process of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In order to solve the problem that in the prior art, when the outflow party performs auditing on the property transaction contract data, no further security authentication is performed on the outflow party, so that the property transaction contract data is easy to be tampered, referring to fig. 1 and 2, the present embodiment provides the following technical scheme:
a block chain technology-based rural property transaction cloud signing method comprises the following steps:
a title transaction data acquisition unit configured to:
the certification party generates the title data, and after the generation, the outflow party carries out security certification on the title data through a certification platform, wherein the certification platform is a third party certification system, and the third party certification system is called from a system database;
a transaction signing unit for:
based on the property data of which the security authentication of the outflow party is finished in the property transaction data acquisition unit, after the authentication is qualified, the inflow party carries out auditing signing on the property data, after signing, the security authentication is carried out on the property data through an authentication platform, the certification party carries out signing authentication on the property data of which the security authentication of the inflow party is finished, and standard contract data is obtained after signing authentication;
an identity authentication management unit for:
based on the standard contract data acquired in the transaction signing unit, acquiring personnel data of an outflow party, an inflow party and a certification party in the standard contract data, performing authentication management on the personnel data of the outflow party and the inflow party after the personnel data are acquired, and acquiring target storage contract data after the authentication management;
The signing data encryption storage unit is used for:
and based on the target storage contract data obtained from the identity authentication management unit, carrying out data encryption on the target storage contract data, selecting a corresponding storage transmission channel according to the length of the target storage contract data after the data encryption is finished, and storing the target storage contract data after the storage transmission channel selection is finished.
Specifically, through the title transaction data acquisition unit, the title transaction contract with willingness authentication is subjected to electronic signature, electronic stamping is performed after the electronic signature is completed, the electronic signature can enable an outflow party to be more convenient, efficient and safe when the title transaction contract is signed, through the transaction signing unit, the security authentication of the outflow party and an inflow party is further improved, the authenticity of online digital identities is further improved, through the identity authentication management unit, the outflow party and the inflow party can directly sign the contract online under the offsite condition, the signing willingness can be traced online, legal efficacy of signing the title transaction contract is further guaranteed, and through the signing data encryption storage unit, the privacy and the security of target contract storage data can be better protected, and accordingly the integrity of the target contract storage data is further protected.
For the generation of the title transaction contract in S1, including:
the title transaction contract is generated by a certification party, wherein when the certification party generates the contract, a staff of the certification party logs in the transaction platform safely;
after the transaction platform logs in safely, a staff of the certification party generates a title transaction contract;
and carrying out online filing after the title transaction contract is generated, obtaining the online sign after online filing, and synchronously corresponding the obtained online sign with the generated title transaction contract.
Preferably, the auditing and security authentication for the title transaction contract in S1 includes:
according to the acquired property right transaction contract corresponding to the network sign number, the outflow party carries out password login, and after the density login is completed, the outflow party carries out auditing on the property right transaction contract;
if the outflow party judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the certification party, and carrying out title transaction contract generation again by the certification party;
if the issuing party judges that the property right transaction contract auditing passes, performing issuing party property right transaction contract safety certification, wherein the safety certification is certified by a third party certification system;
the safety authentication flow is as follows: and carrying out willingness authentication on the property transaction contract which passes the verification, and carrying out electronic signature on the property transaction contract which is subjected to willingness authentication, wherein the electronic signature comprises identity verification, file uploading, signature creation, signature verification, signature storage and retrieval and legal evidence, and electronic stamping is carried out after the electronic signature is finished, wherein the electronic stamping comprises the steps of submitting the property transaction contract, confirming stamping, selecting stamping positions, applying the electronic stamp, confirming stamping results and storing and backing up.
Specifically, the authenticating party firstly generates and initiates the title transaction contract, the title transaction contract is generated and initiated through the authenticating party, the authenticity of the title transaction contract is further improved, the issuing party carries out security authentication, and the authenticity and security of the title transaction contract and the uplink certificate are further improved, wherein the title transaction contract which passes the verification is subjected to willingness authentication, the title transaction contract which is subjected to willingness authentication is subjected to electronic signature, the electronic signature is subjected to electronic seal after the electronic signature is finished, the issuing party can carry out more convenient, efficient and safe signing on the title transaction contract, and meanwhile the electronic signature can carry out tracking, so that the security of the title transaction contract is further improved.
In order to solve the problem that in the prior art, after the outflow party performs auditing on the title transaction contract, no further security authentication is performed on the outflow party, so that the title transaction contract is not traceable and cannot be stored in a linking manner, referring to fig. 1 and 2, the embodiment provides the following technical scheme:
the security authentication and signing of the title transaction contract by the inflow party and the visa party in the S2 comprises the following steps:
according to the title transaction contract which is finished by the security authentication of the outflow party, the inflow party carries out password login firstly, and after the density login is finished, the inflow party carries out auditing on the title transaction contract provided by the outflow party;
If the inflow side judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the outflow side, and modifying or submitting the title transaction contract to the certification side by the outflow side;
if the inflow side judges that the property transaction contract audit passes, performing the inflow side property transaction contract safety certification, wherein the safety certification is certified by a third party certification system;
according to the acquired title transaction contract with successful security authentication of the inflow party, the authentication party carries out password login, and after the password login is completed, the title transaction contract with successful security authentication of the inflow party is audited;
if the certification party judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the inflow party and the outflow party, and modifying or submitting the title transaction contract to the certification party by the inflow party and the outflow party;
if the certifier judges that the property right transaction contract audit is passed, performing security authentication of the certifier property right transaction contract, wherein the security authentication is authenticated by a third party authentication system;
and after the security authentication of the contract of the right-handed right transaction is completed, standard contract data are generated.
Specifically, the inflow side carries out auditing on the property transaction contract, and safety authentication is carried out after the auditing is passed, wherein the safety authentication flow of the inflow side is consistent with the safety authentication flow of the outflow side, and according to the safety authentication of the outflow side and the inflow side, the authenticity of the online digital identity is further improved, the property transaction contract is signed after the safety authentication is passed, and the period of signing the property transaction contract is further shortened.
In order to solve the problem that in the prior art, after the title transaction contract is signed, no identity authentication is performed on personnel in the contract, so that the title transaction contract is signed incautiously, referring to fig. 1 and 2, the following technical scheme is provided in this embodiment:
for authentication of personnel identity information and personnel signature information in the title transaction contract in S3, including:
according to personnel information of an outflow party and an inflow party in the standard contract data, acquiring data information of legal persons and natural persons in the standard contract data;
the legal person realizes identity authentication through enterprise basic information, unified social credit codes and related certificates, electronic certificates, legal person identity authentication and authorization books;
the natural person verifies the personal identity information through face recognition, bank card elements, mobile phone numbers and identity card modes to carry out real-name authentication.
For the authentication of personnel identity information and personnel signature information in the title transaction contract in S3, further comprising:
authenticating the electronic signatures of the legal person and the natural person according to the legal person and the natural person with the identity authentication;
the electronic signature of the legal person is that a official seal is covered on white paper, the official seal is uploaded through photographing and is encrypted through a digital certificate authentication center to generate the official seal, or the electronic seal style is sent to the digital certificate authentication center to generate the official seal after being encrypted according to the electronic seal style provided in an electronic contract management library, and the signature of the legal person representative is that the signature of the legal person is generated through the digital certificate authentication center after being signed by a tablet externally connected with a mobile phone or a computer;
The electronic signature of the natural person is generated by signing on a mobile phone or a tablet externally connected with a computer and then encrypting through a digital certificate authentication center;
and generating target storage contract data after the legal person and the natural person sign authentication are completed.
Specifically, the identities of the legal persons and the natural persons in the property right trade contract are further verified, the legal persons and the natural persons can be authenticated by the identities of the legal persons and the natural persons, so that the outflow party and the inflow party can directly sign the contract on line under the offsite condition, signing will can be traced on line, legal effectiveness of signing the property right trade contract is further guaranteed, the legal effectiveness of signing the legal persons and the self-heating persons in the property right trade contract is further guaranteed, transparent standard, reality and reliability of the online property right trade contract are guaranteed by authenticating the signatures of the legal persons and the natural persons, all property right trade contract books correspond to the characteristics of related rural property right trade varieties, and signing main bodies, signing time, signing places and signing equipment data information are stored to a trade center, a CA center, a trade supervision mechanism, an notary department and judicial nodes, malicious tampering of fake users is effectively prevented, and safety and reliability of the online property right trade contract are guaranteed.
In order to solve the problem that in the prior art, after the title transaction contract is signed, no further encryption and storage are performed on the title transaction contract, so that the title transaction contract is lost, referring to fig. 1 and 2, the following technical scheme is provided in this embodiment:
encryption of target storage contract data for S4:
converting plaintext data of target contract storage data into ciphertext data, wherein the plaintext data is converted into ciphertext data, and encryption processing is carried out on the ciphertext data through an AES algorithm;
encrypting the ciphertext data according to a secret key, wherein the secret key is a randomly generated secret key;
and acquiring the length of the encrypted ciphertext data, and acquiring the channel residual capacity of the storage transmission channels, wherein the number of the storage transmission channels is not less than four, selecting the storage transmission channels with the length of the encrypted ciphertext data greater than the channel residual capacity, and storing the storage transmission channels into a memory according to the storage transmission channels.
Specifically, the target contract stored data is firstly encrypted, and the ciphertext data is encrypted through an AES algorithm, wherein the AES algorithm has the functions of high safety, high efficiency, low memory requirement, flexible key and packet length design and strong password analysis resistance, and can better protect the privacy and safety of the target contract stored data, so that the integrity of the target contract stored data is further protected, and the transmission speed of the target contract stored data can be faster according to a storage transmission channel with the encrypted ciphertext data length larger than the channel residual capacity, and the problem of data loss in the transmission process can be avoided.
The rural property transaction cloud signing method based on the blockchain technology stores target storage contract data, and comprises the following steps:
reading the target storage contract data, and determining the contract type corresponding to the target storage contract data and the data source of the target storage contract data;
generating a first data storage request according to the contract type corresponding to the target storage contract data, and generating a second data storage request based on the data source corresponding to the target storage contract data;
inputting a second data storage request into a preset data storage address management library for first matching, and judging whether a data storage address consistent with the data source of target storage contract data exists in the preset data storage address management library according to a first matching result;
when the first matching result shows that the data storage address consistent with the data source of the target storage contract data exists in the preset data storage address management library, picking the target data storage address from the preset data storage address management library based on the second data storage request;
determining a target area for storing target storage contract data based on the target storage address;
A preset storage file library is called in the target area, a first data storage request is input into the preset storage file library for second matching, and whether a data storage file with the same contract type as the target storage contract exists in the preset storage file library or not is judged according to a second matching result;
when the second matching result shows that a target data storage file consistent with the contract type of the target storage contract exists in the preset storage file library, storing target storage contract data in the target data storage file based on the first data storage request, otherwise, when the target data storage file consistent with the contract type of the target storage contract does not exist in the preset storage file library, newly building the target data storage file in the preset storage file library, and storing target storage contract data in the newly built target data storage file;
when the first matching result shows that the data storage address consistent with the data source of the target storage contract data does not exist in the preset data storage address management library, a storage area is newly built, a target data storage file is set in the newly built storage area, and meanwhile, the target storage contract data is stored in the target data storage file corresponding to the newly built storage area.
In this embodiment, the area address of the newly created storage area is updated in the preset data storage address management library, and the contract type corresponding to the target data storage node is set in the newly created storage area and updated in the preset storage file library.
In this embodiment, the first data storage request is generated according to the contract type in order to facilitate accurate and efficient storage of the target storage contract data according to the contract type.
In this embodiment, the second data storage request is generated from a data source corresponding to the target storage contract data.
In this embodiment, the preset data storage address management library is set in advance, and is used for storing different data storage address information.
In this embodiment, the first matching may be matching a data source of the target storage contract data in the second data storage request with data storage address information in a preset data storage address management library, so as to query a data storage address consistent with the data source of the target storage contract data, where the target data storage address is a data storage address consistent with the data source of the target storage contract data.
In this embodiment, the target area may be a location where the target storage contract data can be stored.
In this embodiment, the preset storage file library is set in advance, and is used for storing the data storage nodes corresponding to the known contract types.
In this embodiment, the second matching refers to matching the contract type of the target storage contract with the contract type stored in the preset storage file library.
In this embodiment, the data storage file is a storage space for storing different contract types.
In this embodiment, the target data storage file may be a storage space consistent with the contract type of the target storage contract.
In this embodiment, the newly created target data storage file may be a storage file created for the target storage contract in the preset storage file library when there is no data storage file of which the type is known to the target storage contract in the preset storage file library.
The working principle and the beneficial effects of the technical scheme are as follows: by reading the target storage contract, accurate and effective determination of contract type and data source of the target storage contract data is realized, and then, matching is carried out twice according to the contract type and the data source, so that accurate and effective locking of the target storage area corresponding to the parent package storage contract data and the target storage file in the target storage area is realized, when the corresponding target storage area and the target storage file are not available, the storage area and the storage file are newly built, the target storage contract data is effectively stored, and the ordering and the accuracy of the storage of the contract storage data are ensured.
The method for signing the rural property transaction cloud based on the blockchain technology, provided by the embodiment, performs integrity verification on the target storage contract data before storing the target storage contract data, and comprises the following steps:
when target storage contract data is transmitted to a memory, generating a data complete verification instruction based on the memory, and transmitting the data complete verification instruction to a certification party, an inflow party and an outflow party respectively;
the authentication party outputs first authentication information data according to the data complete authentication instruction, outputs second authentication information data according to the data complete authentication instruction based on the inflow party, and simultaneously outputs third authentication information data according to the data complete authentication instruction based on the outflow party;
respectively feeding the first verification information data, the second verification information data and the third verification information data back to the memory, picking common verification information data in the first verification information data, the second verification information data and the third verification information data based on the memory, and taking the common verification information data as a first verification text;
acquiring a first key data set of residual data in the first verification information data, a second key data set of residual data in the second verification information data and a third key data set of residual data in the third verification information data based on the extraction result;
Synthesizing the first key data set, the second key data set and the third key data set to obtain a second verification text;
comparing the target storage contract data with the first verification text and the second verification text respectively, and judging whether the target storage contract data passes the integrity verification or not;
when the target storage contract data comprises a first verification text and the target storage contract data comprises a second verification text, determining that the target storage contract data passes the integrity verification;
otherwise, determining that the target storage contract data does not pass the integrity verification.
In this embodiment, the data integrity verification instruction may be an instruction that is automatically generated after the memory receives the target storage contract data to be stored, and is used to implement verification of data integrity.
In this embodiment, the first verification information data may be title data in the prover, signing authentication data of the title data by the prover, and personnel data of the prover.
In this embodiment, the second verification information data may be data including property data in the inflow party and audit signed data of the property data and personnel data of the inflow party.
In this embodiment, the third authentication information data may be title data in the outflow party and personnel data of the outflow party.
In this embodiment, the first validation script is title data.
In this embodiment, the second verification text is signing authentication data of the title data by the authenticator, personnel data of the authenticator, data for auditing and signing the title data, personnel data of the inflow party and personnel data of the outflow party.
The working principle and the beneficial effects of the technical scheme are as follows: the first verification information data output by the verification party, the second verification information data output by the inflow party and the third verification information data output by the outflow party can be accurately and intelligently determined through the storage generation of the data complete verification instruction, so that the first verification text and the second verification text are accurately determined through analysis and processing of the first verification information data, the second verification information data and the third verification information data, the integrity and completeness of target storage contract data are effectively guaranteed through the first verification text and the second verification text, the storage effectiveness of the target storage contract data is greatly guaranteed, and the rural property transaction management efficiency is facilitated.
The rural property transaction cloud signing method based on the blockchain technology provided by the embodiment, which performs integrity verification on target storage contract data, further comprises the following steps:
When the target storage contract data does not pass the integrity verification, calculating the target repetition rate of the target storage contract data and the first verification text and the second verification text, and determining whether to reserve the target storage contract data according to the target repetition rate, wherein the method specifically comprises the following steps:
calculating target repetition rates of the target stored contract data and the first and second verification texts based on the following formula;
wherein,representing a target repetition rate of the target stored contract data with the first validation script and the second validation script; />Representing the total data amount corresponding to the target storage contract data; />Representing a total data amount in the target storage contract data, which coincides with the first verification text and the second verification text; />Representing the amount of data in the target storage contract data coinciding with the first authentication text content,/for>Representing the amount of data in the target storage contract data that coincides with the second authentication text content, and +.>;/>Represents the total data volume of the first authentication text, and +.>;/>Represents the total data volume of the second authentication text, and +.>;/>Represents a constant and takes a value of 1.2 x 10 3 ;/>Representing error factors, wherein the value range is (0, 1); />Representing a logarithmic function underlying e;
Acquiring a preset repetition rate threshold, comparing the target repetition rate with the preset repetition rate threshold, and determining whether to reserve the target storage contract data or not based on a comparison result;
when the target repetition rate is equal to or greater than a preset repetition rate threshold, reserving target storage contract data;
otherwise, eliminating the target storage contract data.
In this embodiment, the preset repetition rate threshold may be set in advance as a criterion for whether to retain the target storage contract data.
The working principle and the beneficial effects of the technical scheme are as follows: the target rereading rate of the target storage contract data, the first verification text and the second verification text is effectively calculated, so that whether the target storage contract data is reserved or not is effectively determined when the target storage contract data does not pass the integrity verification, the effectiveness, timeliness and intelligence of processing the target storage contract data are effectively ensured, and the data processing efficiency of the memory is greatly improved.
The invention provides another technical scheme, namely a rural property transaction cloud signing method based on a blockchain technology, which further comprises the following steps:
The first step: the authenticating party generates the title transaction contract through the title transaction data acquisition unit, and the outflow party carries out auditing and security authentication on the title transaction contract after the title transaction contract is generated;
the authenticity of the title transaction contract is further improved by generating and initiating the title transaction contract through the discriminator, and the authenticity and the security of the title transaction contract and the uplink certificate are further improved by carrying out security authentication on the outflow party;
and a second step of: after auditing and safety authentication are carried out on the title transaction contract by the outflow party, the inflow party carries out safety authentication on the title transaction contract through the transaction signing unit, and then carries out safety authentication and signing through the visa party;
according to the security authentication of the outflow party and the inflow party, the authenticity of the online digital identity is further improved;
and a third step of: the personnel identity information and personnel signature information in the signed title transaction contract are authenticated and managed according to the identity authentication management unit;
the identity authentication of legal persons and natural persons can enable the outflow party and the inflow party to directly sign the contract on line under the condition of offsite, the signing will can be traced on line, and the legal effectiveness of signing the title transaction contract is further ensured;
Fourth step: encrypting and storing the title transaction contract which passes the authentication management according to the signed data encryption storage unit;
the ciphertext data is encrypted through an AES algorithm, so that the privacy and safety of the target contract stored data can be better protected, and the integrity of the target contract stored data is further protected.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. The rural property transaction cloud signing method based on the blockchain technology is characterized by comprising the following steps of:
s1: the authenticating party generates the title transaction contract through the title transaction data acquisition unit, and the outflow party carries out auditing and security authentication on the title transaction contract after the title transaction contract is generated;
a title transaction data acquisition unit configured to:
the certification party generates the title data, and after the generation, the outflow party carries out security certification on the title data through a certification platform, wherein the certification platform is a third party certification system, and the third party certification system is called from a system database;
s2: after auditing and safety authentication are carried out on the title transaction contract by the outflow party, the inflow party carries out safety authentication on the title transaction contract through the transaction signing unit, and then carries out safety authentication and signing through the visa party;
a transaction signing unit for:
based on the property data of which the security authentication of the outflow party is finished in the property transaction data acquisition unit, after the authentication is qualified, the inflow party carries out auditing signing on the property data, after signing, the security authentication is carried out on the property data through an authentication platform, the certification party carries out signing authentication on the property data of which the security authentication of the inflow party is finished, and standard contract data is obtained after signing authentication;
S3: the personnel identity information and personnel signature information in the signed title transaction contract are authenticated and managed according to the identity authentication management unit;
an identity authentication management unit for:
based on the standard contract data acquired in the transaction signing unit, acquiring personnel data of an outflow party, an inflow party and a certification party in the standard contract data, performing authentication management on the personnel data of the outflow party and the inflow party after the personnel data are acquired, and acquiring target storage contract data after the authentication management;
s4: encrypting and storing the title transaction contract which passes the authentication management according to the signed data encryption storage unit;
the signing data encryption storage unit is used for:
and based on the target storage contract data obtained from the identity authentication management unit, carrying out data encryption on the target storage contract data, selecting a corresponding storage transmission channel according to the length of the target storage contract data after the data encryption is finished, and storing the target storage contract data after the storage transmission channel selection is finished.
2. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 1, wherein the method is characterized by comprising the following steps of: for the generation of the title transaction contract in S1, including:
The title transaction contract is generated by a certification party, wherein when the certification party generates the contract, a staff of the certification party logs in the transaction platform safely;
after the transaction platform logs in safely, a staff of the certification party generates a title transaction contract;
and carrying out online filing after the title transaction contract is generated, obtaining the online sign after online filing, and synchronously corresponding the obtained online sign with the generated title transaction contract.
3. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 2, wherein the method is characterized by comprising the following steps of: auditing and security authentication for the title transaction contract in S1 includes:
according to the acquired property right transaction contract corresponding to the network sign number, the outflow party carries out password login, and after the density login is completed, the outflow party carries out auditing on the property right transaction contract;
if the outflow party judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the certification party, and carrying out title transaction contract generation again by the certification party;
if the issuing party judges that the property right transaction contract auditing passes, performing issuing party property right transaction contract safety certification, wherein the safety certification is certified by a third party certification system;
The safety authentication flow is as follows: and carrying out willingness authentication on the property transaction contract which passes the verification, and carrying out electronic signature on the property transaction contract which is subjected to willingness authentication, wherein the electronic signature comprises identity verification, file uploading, signature creation, signature verification, signature storage and retrieval and legal evidence, and electronic stamping is carried out after the electronic signature is finished, wherein the electronic stamping comprises the steps of submitting the property transaction contract, confirming stamping, selecting stamping positions, applying the electronic stamp, confirming stamping results and storing and backing up.
4. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 3, wherein the method is characterized by comprising the following steps of: the security authentication and signing of the title transaction contract by the inflow party and the visa party in the S2 comprises the following steps:
according to the title transaction contract which is finished by the security authentication of the outflow party, the inflow party carries out password login firstly, and after the density login is finished, the inflow party carries out auditing on the title transaction contract provided by the outflow party;
if the inflow side judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the outflow side, and modifying or submitting the title transaction contract to the certification side by the outflow side;
if the inflow side judges that the property transaction contract audit passes, performing the inflow side property transaction contract safety certification, wherein the safety certification is certified by a third party certification system;
According to the acquired title transaction contract with successful security authentication of the inflow party, the authentication party carries out password login, and after the password login is completed, the title transaction contract with successful security authentication of the inflow party is audited;
if the certification party judges that the auditing of the title transaction contract is not passed, sending an instruction that the auditing is not passed to the inflow party and the outflow party, and modifying or submitting the title transaction contract to the certification party by the inflow party and the outflow party;
if the certifier judges that the property right transaction contract audit is passed, performing security authentication of the certifier property right transaction contract, wherein the security authentication is authenticated by a third party authentication system;
and after the security authentication of the contract of the right-handed right transaction is completed, standard contract data are generated.
5. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 4, wherein the method is characterized by comprising the following steps of: for authentication of personnel identity information and personnel signature information in the title transaction contract in S3, including:
according to personnel information of an outflow party and an inflow party in the standard contract data, acquiring data information of legal persons and natural persons in the standard contract data;
the legal person realizes identity authentication through enterprise basic information, unified social credit codes and related certificates, electronic certificates, legal person identity authentication and authorization books;
The natural person verifies the personal identity information through face recognition, bank card elements, mobile phone numbers and identity cards to conduct real-name authentication.
6. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 5, wherein the method is characterized by comprising the following steps of: for the authentication of personnel identity information and personnel signature information in the title transaction contract in S3, further comprising:
authenticating the electronic signatures of the legal person and the natural person according to the legal person and the natural person with the identity authentication;
the electronic signature of the legal person is that a official seal is covered on white paper, the official seal is uploaded through photographing and is encrypted through a digital certificate authentication center to generate the official seal, or the electronic seal style is sent to the digital certificate authentication center to generate the official seal after being encrypted according to the electronic seal style provided in an electronic contract management library, and the signature of the legal person representative is that the signature of the legal person is generated through the digital certificate authentication center after being signed by a tablet externally connected with a mobile phone or a computer;
the electronic signature of the natural person is generated by signing on a mobile phone or a tablet externally connected with a computer and then encrypting through a digital certificate authentication center;
and generating target storage contract data after the legal person and the natural person sign authentication are completed.
7. The blockchain technology-based rural title transaction cloud contracting method is characterized in that: storing contract data for the target store in S4, comprising:
reading the target storage contract data, and determining the contract type corresponding to the target storage contract data and the data source of the target storage contract data;
generating a first data storage request according to the contract type corresponding to the target storage contract data, and generating a second data storage request based on the data source corresponding to the target storage contract data;
inputting a second data storage request into a preset data storage address management library for first matching, and judging whether a data storage address consistent with the data source of target storage contract data exists in the preset data storage address management library according to a first matching result;
when the first matching result shows that the data storage address consistent with the data source of the target storage contract data exists in the preset data storage address management library, picking the target data storage address from the preset data storage address management library based on the second data storage request;
determining a target area for storing target storage contract data based on the target storage address;
A preset storage file library is called in the target area, a first data storage request is input into the preset storage file library for second matching, and whether a data storage file with the same contract type as the target storage contract exists in the preset storage file library or not is judged according to a second matching result;
when the second matching result shows that a target data storage file consistent with the contract type of the target storage contract exists in the preset storage file library, storing target storage contract data in the target data storage file based on the first data storage request, otherwise, when the target data storage file consistent with the contract type of the target storage contract does not exist in the preset storage file library, newly building the target data storage file in the preset storage file library, and storing target storage contract data in the newly built target data storage file;
when the first matching result shows that the data storage address consistent with the data source of the target storage contract data does not exist in the preset data storage address management library, a storage area is newly built, a target data storage file is set in the newly built storage area, and meanwhile, the target storage contract data is stored in the target data storage file corresponding to the newly built storage area.
8. The blockchain technology-based rural title transaction cloud contracting method is characterized in that: encryption of target storage contract data for S4:
converting plaintext data of target contract storage data into ciphertext data, wherein the plaintext data is converted into ciphertext data, and encryption processing is carried out on the ciphertext data through an AES algorithm;
encrypting the ciphertext data according to a secret key, wherein the secret key is a randomly generated secret key;
and acquiring the length of the encrypted ciphertext data, and acquiring the channel residual capacity of the storage transmission channels, wherein the number of the storage transmission channels is not less than four, selecting the storage transmission channels with the length of the encrypted ciphertext data greater than the channel residual capacity, and storing the storage transmission channels into a memory according to the storage transmission channels.
9. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 8, wherein the method is characterized by comprising the following steps of: before storing the target storage contract data in S4, performing integrity verification on the target storage contract data includes:
when target storage contract data is transmitted to a memory, generating a data complete verification instruction based on the memory, and transmitting the data complete verification instruction to a certification party, an inflow party and an outflow party respectively;
The authentication party outputs first authentication information data according to the data complete authentication instruction, outputs second authentication information data according to the data complete authentication instruction based on the inflow party, and simultaneously outputs third authentication information data according to the data complete authentication instruction based on the outflow party;
respectively feeding the first verification information data, the second verification information data and the third verification information data back to the memory, picking common verification information data in the first verification information data, the second verification information data and the third verification information data based on the memory, and taking the common verification information data as a first verification text;
acquiring a first key data set of residual data in the first verification information data, a second key data set of residual data in the second verification information data and a third key data set of residual data in the third verification information data based on the extraction result;
synthesizing the first key data set, the second key data set and the third key data set to obtain a second verification text;
comparing the target storage contract data with the first verification text and the second verification text respectively, and judging whether the target storage contract data passes the integrity verification or not;
When the target storage contract data comprises a first verification text and the target storage contract data comprises a second verification text, determining that the target storage contract data passes the integrity verification;
otherwise, determining that the target storage contract data does not pass the integrity verification.
10. The rural title transaction cloud subscription method based on the blockchain technology as recited in claim 9, wherein the method is characterized by comprising the following steps of: performing integrity verification on the target storage contract data in S4, further includes:
when the target storage contract data does not pass the integrity verification, calculating the target repetition rate of the target storage contract data and the first verification text and the second verification text, and determining whether to reserve the target storage contract data according to the target repetition rate, wherein the method specifically comprises the following steps:
calculating target repetition rates of the target stored contract data and the first and second verification texts based on the following formula;
wherein,representing a target repetition rate of the target stored contract data with the first validation script and the second validation script; />Representing the total data amount corresponding to the target storage contract data; />Representing a total data amount in the target storage contract data, which coincides with the first verification text and the second verification text; / >Representing the amount of data in the target storage contract data coinciding with the first authentication text content,/for>Representing the amount of data in the target storage contract data that coincides with the second validation script content, an;/>Represents the total data volume of the first authentication text, and +.>;/>Represents the total data volume of the second authentication text, and +.>;/>Represents a constant and takes a value of 1.2 x 10 3 ;/>Representing error factors, wherein the value range is (0, 1); />Representing a logarithmic function underlying e;
acquiring a preset repetition rate threshold, comparing the target repetition rate with the preset repetition rate threshold, and determining whether to reserve the target storage contract data or not based on a comparison result;
when the target repetition rate is equal to or greater than a preset repetition rate threshold, reserving target storage contract data;
otherwise, eliminating the target storage contract data.
CN202311762724.5A 2023-12-20 2023-12-20 Rural property right transaction cloud signing method based on blockchain technology Active CN117436879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311762724.5A CN117436879B (en) 2023-12-20 2023-12-20 Rural property right transaction cloud signing method based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311762724.5A CN117436879B (en) 2023-12-20 2023-12-20 Rural property right transaction cloud signing method based on blockchain technology

Publications (2)

Publication Number Publication Date
CN117436879A true CN117436879A (en) 2024-01-23
CN117436879B CN117436879B (en) 2024-03-19

Family

ID=89556863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311762724.5A Active CN117436879B (en) 2023-12-20 2023-12-20 Rural property right transaction cloud signing method based on blockchain technology

Country Status (1)

Country Link
CN (1) CN117436879B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960165A (en) * 2017-03-13 2017-07-18 广东网金控股股份有限公司 It is a kind of that the method that electronic contract is conutersigned in many ways is realized based on the intelligent contract of block chain
CN109299943A (en) * 2018-10-16 2019-02-01 深圳市乘法信息技术有限公司 A kind of method and device of the intellectual property transaction based on block chain
CN109523362A (en) * 2018-11-16 2019-03-26 大唐高鸿信息通信研究院(义乌)有限公司 A kind of second-hand house transaction system and method based on 5G framework and block chain
CN109741059A (en) * 2018-12-29 2019-05-10 杭州趣链科技有限公司 It is a kind of based on the green asset management system of block chain and method
CN109756485A (en) * 2018-12-14 2019-05-14 平安科技(深圳)有限公司 Electronic contract signs method, apparatus, computer equipment and storage medium
CN109815728A (en) * 2018-12-21 2019-05-28 暨南大学 The fair contract with secret protection based on block chain signs method
CN110096901A (en) * 2019-05-08 2019-08-06 北京智签科技有限公司 Electronic contract data encryption storage method and signed client end
CN110287732A (en) * 2019-05-15 2019-09-27 杭州趣链科技有限公司 One kind depositing card method based on block chain electronic contract
CN110378152A (en) * 2019-07-04 2019-10-25 绿漫科技有限公司 A kind of contract signing management system and method based on PKICA certification and block chain technology
CN111144753A (en) * 2019-12-26 2020-05-12 山东爱城市网信息技术有限公司 Land use right circulation management method, device and medium based on block chain
CN111553794A (en) * 2020-04-08 2020-08-18 中振区块链(深圳)有限公司 Intellectual property trading sharing platform and method based on block chain
CN111798081A (en) * 2020-05-11 2020-10-20 国网江西省电力有限公司电力科学研究院 Rural electrification project management system based on block chain technology
CN112579523A (en) * 2020-12-15 2021-03-30 广东后海控股股份有限公司 Rural land circulation management system based on block chain technology
CN113672991A (en) * 2021-08-11 2021-11-19 江苏埃洛德数据技术有限公司 Public electronic contract contracting method based on block chain technology
CN114491436A (en) * 2021-12-24 2022-05-13 彩讯科技股份有限公司 Contract signing method and device, electronic equipment and storage medium
CN114943610A (en) * 2022-05-07 2022-08-26 中国银行股份有限公司 Online negotiation signing method and device, computer equipment and storage medium
CN114971820A (en) * 2022-05-27 2022-08-30 盐城塔斯科技有限公司 Online trading platform based on block chain
CN115760124A (en) * 2022-12-22 2023-03-07 上海幼鸢网络科技有限公司 Contract trust digital signature method and device based on block chain

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960165A (en) * 2017-03-13 2017-07-18 广东网金控股股份有限公司 It is a kind of that the method that electronic contract is conutersigned in many ways is realized based on the intelligent contract of block chain
CN109299943A (en) * 2018-10-16 2019-02-01 深圳市乘法信息技术有限公司 A kind of method and device of the intellectual property transaction based on block chain
CN109523362A (en) * 2018-11-16 2019-03-26 大唐高鸿信息通信研究院(义乌)有限公司 A kind of second-hand house transaction system and method based on 5G framework and block chain
CN109756485A (en) * 2018-12-14 2019-05-14 平安科技(深圳)有限公司 Electronic contract signs method, apparatus, computer equipment and storage medium
CN109815728A (en) * 2018-12-21 2019-05-28 暨南大学 The fair contract with secret protection based on block chain signs method
CN109741059A (en) * 2018-12-29 2019-05-10 杭州趣链科技有限公司 It is a kind of based on the green asset management system of block chain and method
CN110096901A (en) * 2019-05-08 2019-08-06 北京智签科技有限公司 Electronic contract data encryption storage method and signed client end
CN110287732A (en) * 2019-05-15 2019-09-27 杭州趣链科技有限公司 One kind depositing card method based on block chain electronic contract
CN110378152A (en) * 2019-07-04 2019-10-25 绿漫科技有限公司 A kind of contract signing management system and method based on PKICA certification and block chain technology
CN111144753A (en) * 2019-12-26 2020-05-12 山东爱城市网信息技术有限公司 Land use right circulation management method, device and medium based on block chain
CN111553794A (en) * 2020-04-08 2020-08-18 中振区块链(深圳)有限公司 Intellectual property trading sharing platform and method based on block chain
CN111798081A (en) * 2020-05-11 2020-10-20 国网江西省电力有限公司电力科学研究院 Rural electrification project management system based on block chain technology
CN112579523A (en) * 2020-12-15 2021-03-30 广东后海控股股份有限公司 Rural land circulation management system based on block chain technology
CN113672991A (en) * 2021-08-11 2021-11-19 江苏埃洛德数据技术有限公司 Public electronic contract contracting method based on block chain technology
CN114491436A (en) * 2021-12-24 2022-05-13 彩讯科技股份有限公司 Contract signing method and device, electronic equipment and storage medium
CN114943610A (en) * 2022-05-07 2022-08-26 中国银行股份有限公司 Online negotiation signing method and device, computer equipment and storage medium
CN114971820A (en) * 2022-05-27 2022-08-30 盐城塔斯科技有限公司 Online trading platform based on block chain
CN115760124A (en) * 2022-12-22 2023-03-07 上海幼鸢网络科技有限公司 Contract trust digital signature method and device based on block chain

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
乔干群: "土地流转合同网签制度的射阳实践", 群众, no. 08, 20 April 2021 (2021-04-20), pages 53 - 54 *
冷媛;张为民;徐国彬;: "新国标出炉江苏"造" "云签约"江苏先探路", 江苏农村经济, no. 06, 10 June 2020 (2020-06-10), pages 56 *
刘晓玲;马悦滢;刘爱军;陈凤;徐鸿凌: "区块链技术在农村产权交易中的运用研究——以射阳县农村土地流转合同"云签约"为例", 江苏科技信息, vol. 38, no. 19, 10 July 2021 (2021-07-10), pages 71 - 76 *
卢晓凯;徐苗苗;陈美玲: "基于区块链技术的云签约方案研究与应用探索", 中国招标, no. 03, 6 March 2021 (2021-03-06), pages 102 - 104 *

Also Published As

Publication number Publication date
CN117436879B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
US10341123B2 (en) User identification management system and method
US20220052852A1 (en) Secure biometric authentication using electronic identity
CN110383757B (en) System and method for secure processing of electronic identities
CN111787530B (en) Block chain digital identity management method based on SIM card
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN110932859B (en) User information processing method, device and equipment and readable storage medium
US8566615B2 (en) Document management system and method
Jamal et al. Blockchain-based identity verification system
CN112231769A (en) Block chain-based numerical verification method and device, computer equipment and medium
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
CN112567716A (en) Secure data transmission system and method
CN115208628B (en) Data integrity verification method based on block chain
WO2021226471A1 (en) Computer-implemented user identity verification method
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN111614658A (en) Calculation force contract generation method based on block chain network, electronic device and medium
CN110619521A (en) Anonymous tune investigation system based on block chain
CN111681141B (en) File authentication method, file authentication device and terminal equipment
Ajao et al. Application of crypto-blockchain technology for securing electronic voting systems
EP3915221B1 (en) Offline interception-free interaction with a cryptocurrency network using a network-disabled device
CN117436879B (en) Rural property right transaction cloud signing method based on blockchain technology
CN114900312B (en) Identity credential endorsement generation and verification method for protecting privacy
Pillai et al. A decentralized data privacy for mobile payment using blockchain technology
CN112541199A (en) Block chain-based electronic storage certificate integrity verification method and electronic equipment
CN111275506A (en) Bill issuing method and block link point equipment
CN114268438B (en) Multiparty collaborative signature method, multiparty collaborative signature device, multiparty collaborative signature computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant