CN117807637B - Data security transaction method and system with decentralization function - Google Patents

Data security transaction method and system with decentralization function Download PDF

Info

Publication number
CN117807637B
CN117807637B CN202410224173.5A CN202410224173A CN117807637B CN 117807637 B CN117807637 B CN 117807637B CN 202410224173 A CN202410224173 A CN 202410224173A CN 117807637 B CN117807637 B CN 117807637B
Authority
CN
China
Prior art keywords
character
data
transaction
matrix
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410224173.5A
Other languages
Chinese (zh)
Other versions
CN117807637A (en
Inventor
刘海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianwan Digital Technology Co ltd
Original Assignee
Tianwan Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianwan Digital Technology Co ltd filed Critical Tianwan Digital Technology Co ltd
Priority to CN202410224173.5A priority Critical patent/CN117807637B/en
Publication of CN117807637A publication Critical patent/CN117807637A/en
Application granted granted Critical
Publication of CN117807637B publication Critical patent/CN117807637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a data security transaction method and system for decentralization, each transaction node is respectively used as a participant to be accessed into a decentralization blockchain to construct a data transaction platform based on a blockchain technology, and when a first transaction node receives transaction request information of a second transaction node, transaction information, authority characters and additional information are analyzed from the transaction request information; determining target data based on the transaction information; acquiring identification information of target data and generating a first character matrix; generating a data encryption matrix based on the identification information and the additional information; transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password and then transmitting the target data to the second transaction node. According to the invention, the data security can be ensured by encrypting the data in the transaction process, and the risk of illegal access or tampering of the data is avoided.

Description

Data security transaction method and system with decentralization function
Technical Field
The invention relates to the technical field of data processing, in particular to a data security transaction method and system for decentralization.
Background
In the digital age, the security and efficiency of data transactions has become an important issue. Currently, the closest prior art is the data transaction platform using a centralized server, which ensures the security of the data through encryption technology and authentication mechanisms. However, this approach still relies on a centralized architecture, is susceptible to single point failure, and presents a risk of data leakage and unauthorized access.
For example, some existing data transaction platforms do not implement encryption of data during the transaction, which limits their ability to protect data privacy and ensure transaction transparency. The main technical defect of the existing centralized data transaction method is the deficiency of data security and privacy protection. In particular, during data transmission and storage, these methods face the risk of data being illegally accessed or tampered with due to reliance on a central server.
Disclosure of Invention
The invention mainly aims to provide a data security transaction method and system with decentralization, and aims to overcome the defects of insufficient data security and privacy protection at present.
In order to achieve the above purpose, the present invention provides a data security transaction method for decentralization, wherein each transaction node is respectively used as a participant to access into a decentralization blockchain to construct a data transaction platform based on the blockchain technology, and the method comprises the following steps:
When the first transaction node receives transaction request information of the second transaction node, the transaction information, authority characters and additional information are analyzed from the transaction request information;
Determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
Transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password, and then sending the target data to the second transaction node.
Further, the transaction information includes transaction object information and transaction contract information; the transaction contract information comprises transaction conditions of a second transaction node;
The step of determining, based on the transaction information, target data that the second transaction node needs to request a transaction includes:
Determining request data of the second transaction node for requesting transaction based on the transaction object information, and acquiring transaction requirements of the request data;
And judging whether the transaction contract information accords with the transaction requirement of the request data, and if so, determining the request data as target data.
Further, the step of generating the first character matrix based on the identification information of the target data includes:
Identifying the attribute of each character in the identification information of the target data; wherein the identification information consists of a plurality of characters, and the attribute comprises a digital character and an English character;
Grouping the identification information according to the attribute of the character in sequence to obtain x groups of character combinations; wherein each group of character combinations at least comprises one character; when grouping, if the attributes of adjacent characters are the same, grouping the characters into the same group;
creating a blank matrix of three rows and m columns; wherein 3*m is more than or equal to x is more than 3 x (m-1);
sequentially adding each group of character combinations to each element position in the blank matrix of the three rows and the m columns, and judging whether blank positions exist or not;
If not, taking the matrix added with each group of character combinations as a first character matrix; if the first character matrix exists, adding a preset character in the blank position to obtain the first character matrix.
Further, the step of converting the preset coding algorithm based on the identification information to obtain a converted coding algorithm includes:
Acquiring each coding parameter in the preset coding algorithm, and classifying each coding parameter into a first class and a second class; wherein the first category is a single character encoding parameter and the second category is a double character encoding parameter;
Identifying the attribute of each character in the identification information of the target data; wherein the identification information consists of a plurality of characters, and the attribute comprises a digital character and an English character;
Determining a first number of digital characters and a second number of English characters in the identification information;
All the coding parameters belonging to the first category in the preset coding algorithm are replaced by numbers corresponding to the first quantity; and replacing all the coding parameters belonging to the second category in the preset coding algorithm with numbers corresponding to the second number to obtain the conversion coding algorithm.
Further, the step of generating a second character matrix based on the encoded characters and generating a data encryption matrix based on the first character matrix and the second character matrix includes:
Identifying the occurrence times of each character in the coded characters, and obtaining three times with the largest times from the occurrence times, wherein the three times are respectively the first times, the second times and the third times which are arranged from large to small;
creating a blank matrix of three rows and one column, and sequentially adding the first times, the second times and the third times to the positions of elements in the blank matrix of three rows and one column to obtain the second character matrix;
Multiplying the first character matrix with the second character matrix to obtain a third character matrix serving as the data encryption matrix.
Further, the authority character comprises a plurality of single characters;
The step of transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix and generating an encryption password based on the transformed encryption matrix comprises the following steps:
Obtaining a target sequence number corresponding to each single character in the authority characters based on a preset mapping relation between the single characters and the sequence numbers;
Sequentially marking the sequence numbers of the data encryption matrixes, and searching target positions corresponding to the target sequence numbers from the data encryption matrixes; replacing elements in the target position with single characters corresponding to the target sequence number to obtain a transformation encryption matrix;
sequentially concatenating English characters in the transformation encryption matrix to obtain a first concatenated character;
the digital characters in the transformation encryption matrix are sequentially connected in series to obtain a second serial character;
inserting each digital character in the second serial characters into the first serial characters according to a preset rule to obtain combined serial characters;
identifying the appointed character on the appointed bit of the merged serial character, and judging the appointed character to be a digital character or an English character;
If the appointed character is a digital character, extracting corresponding characters from a plurality of first appointed positions of the merged serial characters for combination, and obtaining the encrypted password;
if the appointed character is an English character, extracting corresponding characters from a plurality of second appointed positions of the combined serial-connected characters to be combined, and obtaining the encrypted password; the first designated positions and the second designated positions are different.
Further, the step of sending the target data to the second transaction node after encrypting the target data based on the encryption password includes:
Encrypting the target data based on the encryption password to generate encrypted target data, and then randomly generating a plurality of interference data;
randomly sequencing a plurality of interference data and the encryption target data to obtain a data sequence;
Sequentially transmitting data in the data sequence to the second transaction node; wherein only one data is transmitted at a time, and the identification information of the target data is transmitted while the encrypted target data is transmitted.
Further, the step of sending the target data to the second transaction node after encrypting the target data based on the encryption password includes:
After encrypting the target data based on the encryption password to generate encrypted target data, sequentially dividing the identification information of the target data into three groups of identification characters;
randomly generating three sequentially arranged interference data, and sequentially taking various identification characters as marks of the interference data; wherein, an identification character corresponds to a mark of interference data;
randomly inserting the encrypted target data into the interference data which are arranged in sequence to obtain a data sequence;
sequentially transmitting data in the data sequence to the second transaction node; wherein only one data is transmitted at a time.
Further, after the step of sending to the second transaction node, the method includes:
the second transaction node acquires identification information of the encrypted target data and generates a first character matrix based on the identification information;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
Transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating a decryption password based on the transformed encryption matrix;
and decrypting the encrypted target data based on the decryption password to obtain the target data.
The invention also provides a data security transaction system for decentralization, each transaction node is respectively used as a participant to be accessed into a decentralization blockchain to construct a data transaction platform based on a blockchain technology, and the system comprises a first transaction node and a second transaction node;
When the first transaction node receives transaction request information of the second transaction node, the transaction information, authority characters and additional information are analyzed from the transaction request information;
Determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
Transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password, and then sending the target data to the second transaction node.
According to the data security transaction method and system for decentralization, when the first transaction node receives the transaction request information of the second transaction node, the transaction information, the authority character and the additional information are analyzed from the transaction request information; determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data; converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix; transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password, and then sending the target data to the second transaction node. Based on the characteristics of the block chain technology, such as decentralization, transparency and non-tamper property, the invention provides a new solution for data security transaction and ensures the security and traceability aspects of data transaction. The decentralised data transaction method utilizes blockchain technology to solve the security and trust problems faced by traditional decentralised data transactions. By encrypting the data in the transaction process, the data security can be ensured, and the risk of illegal access or tampering of the data is avoided.
Drawings
FIG. 1 is a schematic diagram showing steps of a method for decentralizing data security transactions according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data security transaction system with decentralization in accordance with one embodiment of the present invention;
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, in one embodiment of the present invention, there is provided a data security transaction method for decentralizing, wherein each transaction node is respectively used as a participant to access into a decentralizing blockchain to construct a data transaction platform based on a blockchain technology, and the method includes the following steps:
step S1, when a first transaction node receives transaction request information of a second transaction node, resolving transaction information, authority characters and additional information from the transaction request information;
Step S2, determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data;
Step S3, converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
S4, transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password, and then sending the target data to the second transaction node.
In the embodiment, based on the characteristics of the blockchain technology, such as decentralization, transparency and non-tamper property, a new solution is provided for data security transaction, and the security and traceability aspects of the data transaction are ensured. The decentralised data transaction method utilizes blockchain technology to solve the security and trust problems faced by traditional decentralised data transactions.
As described in step S1, the method specifically includes:
transaction information: specific data transaction details contained in the transaction request may include information such as identification of the data, transaction type, quantity, identity of the transactor, etc.
Authority character: is character information describing the data security encryption process in the transaction request, and the character information can generate subsequent encryption passwords on the first transaction node and the second transaction node. If the permission character is changed, different passwords are generated, so that data cannot be transmitted correctly, and the permission character is key information when the first transaction node and the second transaction node conduct transactions.
Additional information: is other supplementary information that is appended to the transaction request, such as additional description of the transaction, transaction contract information, participant information of the transaction, etc. The transaction contract information may be the transaction conditions/chips that the second transaction node gives for the transaction.
In practical application, the first transaction node further performs operations such as data encryption, data confirmation, transaction confirmation and the like according to the analyzed transaction information, authority characters and additional information so as to ensure the security and compliance of the transaction. Operations such as verifying rights, generating encryption keys, recording transaction credentials, etc. using blockchain smart contracts may be included to ensure security and transparency of the data transaction process, and are not described in detail herein.
As described in the above step S2, the method specifically includes:
Determining target data: the transaction information comprises transaction request information of target data required by the second transaction node. The first transaction node locates and validates the specific data content required by the second transaction node based on the transaction request information.
Acquiring identification information of target data: once the target data is determined, the first transaction node obtains identification information for the data, which may be a hash value of the data, a transaction ID in a blockchain, or other information capable of uniquely identifying the target data.
Generating a first character matrix: based on the identification information of the target data, the first transaction node generates a first character matrix by using a preset algorithm. This step produces a matrix structure of data, typically a matrix of characters, numbers or symbols, for subsequent data encryption and processing, by processing and converting the target data identification information.
The purpose of the whole process is that the first transaction node processes and encodes the identification information according to the target data request in the transaction information, and provides a basis for subsequent data encryption and authority control. Such matrix generation is to ensure security and traceability during data transactions.
As described in the above step S3, the method specifically includes:
Transcoding the identification information: firstly, converting a preset coding algorithm based on the target data identification information. This means that the identification information of the target data is processed to produce a coding algorithm associated with the specific identification information, which may include encryption and decryption rules of the data, mapping methods of the data, etc. Such transcoding aims to ensure the security, correctness and code uniqueness of the data. The above-mentioned preset encoding algorithm may be a conventional encoding table, but after it is transformed based on the identification information, it may be made more secure and encoding unique.
Encoding the additional information: next, based on the obtained transcoding algorithm, the additional information is subjected to encoding processing, generating encoded characters. The additional information includes transaction contract information, participant information of the transaction, and the like. The code characters are generated in order to protect and process this additional information in the data transaction.
Generating a second character matrix: a second character matrix is generated based on the encoded characters. This matrix is obtained by arranging and combining the coded characters, typically a matrix structure of characters. The second character matrix is generated to convert the encoded information into a matrix form for subsequent data encryption and processing.
Generating a data encryption matrix: finally, a data encryption matrix is generated based on the first character matrix and the second character matrix. This step is to process the first character matrix and the second character matrix and combine the algorithms to generate a matrix structure for data encryption. The generation of the data encryption matrix is to encrypt the target data to ensure security and privacy protection during the data transaction.
The above steps describe the processing of the identification information and the additional information by the first transaction node, and the encryption and secure transaction of the data by the encoding process and the matrix generation.
As described in the above step S4, the method specifically includes:
Transforming the data encryption matrix: firstly, based on the authority character, the transformation operation of the data encryption matrix is carried out. The authority character can contain special characters, and the data encryption matrix is correspondingly transformed according to the authority characters so as to ensure that the access and the use of the data are strictly limited and controlled, and the transformed data encryption matrix can be particularly and more strongly safe and unique.
Obtaining a transformation encryption matrix: and obtaining the transformation encryption matrix after performing transformation operation on the authority character requirements on the data encryption matrix. The matrix is a data encryption matrix subjected to transformation processing specified by authority characters and is used for subsequent encryption password generation and data encryption processing.
Generating an encryption password: and generating an encryption password based on the transformation encryption matrix. The encryption password is password information obtained after the transformation encryption matrix is subjected to preset rule processing and is used for encrypting the target data.
Encrypting the target data: and carrying out encryption processing on the target data based on the generated encryption password. And the generated encryption password is used for carrying out corresponding encryption algorithm processing on the target data, so that the safety and privacy protection of the data in the transmission and storage processes are ensured.
Transmitting the encrypted target data to the second transaction node: and finally, sending the target data subjected to encryption processing to a second transaction node. In this way, the second transaction node can obtain the data which is subjected to strict encryption and security control, and ensure the secure transmission and use of the data in the transaction process.
Through the steps, the first transaction node can realize encryption processing and authority control on the target data, and the encrypted data is safely sent to the second transaction node, so that the purpose of data safe transaction is achieved. Meanwhile, the second transaction node can generate a corresponding decryption password according to the unified rule, so that the encrypted target data is decrypted, the required target data is obtained, and data leakage in the transmission process is avoided.
In one embodiment, the transaction information includes transaction object information and transaction contract information; the transaction contract information comprises transaction conditions of a second transaction node;
The step of determining, based on the transaction information, target data that the second transaction node needs to request a transaction includes:
Determining request data of the second transaction node for requesting transaction based on the transaction object information, and acquiring transaction requirements of the request data;
And judging whether the transaction contract information accords with the transaction requirement of the request data, and if so, determining the request data as target data.
In this embodiment, the method specifically includes:
determining request data based on the transaction object information: first, request data that the second transaction node needs to request is determined based on the transaction object information. The transaction object information includes a specific object of the transaction, which may be specific data, files, assets, or other information. The first transaction node determines the specific data content required by the second transaction node according to the transaction object information.
Transaction requirements for obtaining request data: for certain requested data, the first transaction node obtains transaction requirements for the data, which may include access conditions, usage restrictions, transaction time, transaction permissions, etc. for the data. These transaction requirements are set by the first transaction node.
Judging whether the transaction contract information meets the requirements: then, the first transaction node judges whether the transaction contract information meets the transaction requirement of the request data. This means that the transaction contract information of the second transaction node is verified, and the conditions are compared to whether the transaction requirements of the target data match. And if the transaction contract information contains conditions meeting the transaction requirements of the request data, determining the request data as target data.
Through the steps, the first transaction node can clearly determine target data required by the second transaction node according to the transaction object information and the transaction contract information in the transaction information, and judge whether the transaction contract information meets the transaction requirement of the target data, so that the data transaction is accurate and reliable.
In an embodiment, the step of generating the first character matrix based on the identification information of the target data includes:
Identifying the attribute of each character in the identification information of the target data; wherein the identification information consists of a plurality of characters, and the attribute comprises a digital character and an English character;
Grouping the identification information according to the attribute of the character in sequence to obtain x groups of character combinations; wherein each group of character combinations at least comprises one character; when grouping, if the attributes of adjacent characters are the same, grouping the characters into the same group;
creating a blank matrix of three rows and m columns; wherein 3*m is more than or equal to x is more than 3 x (m-1);
sequentially adding each group of character combinations to each element position in the blank matrix of the three rows and the m columns, and judging whether blank positions exist or not;
If not, taking the matrix added with each group of character combinations as a first character matrix; if the first character matrix exists, adding a preset character in the blank position to obtain the first character matrix.
In this embodiment, the method specifically includes:
identifying character attributes: first, the attribute of each character in the identification information of the target data is identified, including a numeric character and an english character. Each character in the identification information is analyzed to determine their properties, i.e., whether it is a number or an english character.
Grouping character combinations: and grouping the identification information of the target data according to the attribute of the character to obtain a series of character combinations, wherein each group of character combinations at least comprises one character. When grouping, adjacent characters having the same attribute are grouped into the same group. For example, the identification information is d5fh936t3o4, and its corresponding packet is 8 character combinations: d,5, fh,936, t,3, o,4.
Creating a blank matrix: a three row m column blank matrix is created, where 3 m.gtoreq.x > 3 (m-1), where x is the total number of character combinations. For example, for the above character combinations: d,5, fh,936, t,3, o,4. Created is a blank matrix of three rows and three columns.
Adding character combinations to the matrix: and sequentially adding each group of character combinations to each element position of the blank matrix, and judging whether the blank positions exist or not. If there is no blank position, the matrix to which the character combination is added is taken as a first character matrix. The above-mentioned order of adding character combinations may be to add first in the first row, then to add second and third rows in order, or may be other orders, and is not specifically required herein.
Processing a situation in which a blank position exists: if the blank position exists, adding a preset character in the blank position to obtain a first character matrix. These preset characters may be placeholders or other specific characters that are used to fill in blank positions to ensure the integrity of the matrix.
Through the steps, the first character matrix meeting the requirements can be generated according to the identification information of the target data. Such matrix generation is to provide an infrastructure in subsequent data encryption and processing.
In an embodiment, the step of converting the preset encoding algorithm based on the identification information to obtain a converted encoding algorithm includes:
Acquiring each coding parameter in the preset coding algorithm, and classifying each coding parameter into a first class and a second class; wherein the first category is a single character encoding parameter and the second category is a double character encoding parameter;
Identifying the attribute of each character in the identification information of the target data; wherein the identification information consists of a plurality of characters, and the attribute comprises a digital character and an English character;
Determining a first number of digital characters and a second number of English characters in the identification information;
All the coding parameters belonging to the first category in the preset coding algorithm are replaced by numbers corresponding to the first quantity; and replacing all the coding parameters belonging to the second category in the preset coding algorithm with numbers corresponding to the second number to obtain the conversion coding algorithm.
In this embodiment, the method specifically includes:
Acquiring coding parameters and classifying: firstly, each coding parameter in a preset coding algorithm is acquired, and the parameters are classified according to the characteristics or the structure of the parameters. The parameters are divided into a first class and a second class. The first class includes encoding parameters for single characters and the second class includes encoding parameters for double characters. In an embodiment, the predetermined coding algorithm may be a coding table, which includes a mapping relationship between sequence numbers and coding characters, and the coding characters, i.e. coding parameters, may be single characters(s) or double characters (e.g. a 3).
Identifying character attributes: next, it is necessary to recognize the attribute of each character in the identification information of the target data, that is, whether it is a numeric character or an english character. This can be done by analyzing the identification information of the target data to determine the attribute of each character therein. For example, the identification information is d5fh936t3o4, which includes a numeric character as well as an english character.
The number is determined: the number of the numeric characters and the number of the English characters in the identification information are determined. These numbers refer to the number of digital characters and english characters in the identification information. For example, the identification information is d5fh936t3o4, the first number is 6, and the second number is 5.
Replacement coding parameters: according to the number of the digital characters and the English characters in the identification information, all the coding parameters belonging to the first category in the preset coding algorithm are replaced with numbers corresponding to the number of the digital characters; and replacing all the coding parameters belonging to the second category with numbers corresponding to the number of English characters to obtain a conversion coding algorithm.
In this way, according to the identification information of the target data, the coding parameters in the preset coding algorithm can be replaced according to the number of character attributes in the identification information, so as to obtain a conversion coding algorithm aiming at the identification information. Such transcoding is to ensure a personalized encoding process for different types of data.
In an embodiment, the step of generating a second character matrix based on the encoded characters and generating a data encryption matrix based on the first character matrix and the second character matrix includes:
Identifying the occurrence times of each character in the coded characters, and obtaining three times with the largest times from the occurrence times, wherein the three times are respectively the first times, the second times and the third times which are arranged from large to small;
creating a blank matrix of three rows and one column, and sequentially adding the first times, the second times and the third times to the positions of elements in the blank matrix of three rows and one column to obtain the second character matrix;
Multiplying the first character matrix with the second character matrix to obtain a third character matrix serving as the data encryption matrix.
In this embodiment, the method specifically includes:
Identifying the number of occurrences of each of the encoded characters: first, it is necessary to identify the number of occurrences of each character in the encoded characters and acquire the three times of the maximum number of occurrences therefrom. The three times are arranged in order from large to small, and are respectively referred to as a first time, a second time and a third time.
Creating a second character matrix: then, creating a blank matrix of three rows and one column, and then sequentially adding the first times, the second times and the third times to the element positions of the blank matrix to obtain a second character matrix. The matrix generated by the above process is used for the subsequent data encryption processing.
Multiplying to generate a data encryption matrix: and multiplying the first character matrix with the second character matrix to obtain a third character matrix, wherein the third character matrix is used as a data encryption matrix. The multiplication process may operate according to specific matrix multiplication rules, ultimately yielding a matrix structure for data encryption.
Through the above steps, the three times of the maximum number of times can be obtained from the encoded characters, and the second character matrix can be created based on these times. Then, multiplying the first character matrix with the second character matrix to obtain a data encryption matrix for subsequent data encryption processing. These steps are operations necessary for encrypting and securely transacting the target data.
In one embodiment, the authority character comprises a plurality of single characters;
The step of transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix and generating an encryption password based on the transformed encryption matrix comprises the following steps:
Obtaining a target sequence number corresponding to each single character in the authority characters based on a preset mapping relation between the single characters and the sequence numbers;
Sequentially marking the sequence numbers of the data encryption matrixes, and searching target positions corresponding to the target sequence numbers from the data encryption matrixes; replacing elements in the target position with single characters corresponding to the target sequence number to obtain a transformation encryption matrix;
sequentially concatenating English characters in the transformation encryption matrix to obtain a first concatenated character;
the digital characters in the transformation encryption matrix are sequentially connected in series to obtain a second serial character;
inserting each digital character in the second serial characters into the first serial characters according to a preset rule to obtain combined serial characters;
identifying the appointed character on the appointed bit of the merged serial character, and judging the appointed character to be a digital character or an English character; the above designation is for one specific position, e.g., position 10;
If the appointed character is a digital character, extracting corresponding characters from a plurality of first appointed positions of the merged serial characters for combination, and obtaining the encrypted password; the first plurality of specified positions includes a plurality of specified positions, for example, 1 st, 2 nd, 3 rd, 7 th, 9 th, 12 th, 16 th bits.
If the appointed character is an English character, extracting corresponding characters from a plurality of second appointed positions of the combined serial-connected characters to be combined, and obtaining the encrypted password; the first designated positions and the second designated positions are different. The plurality of second designated positions includes a plurality of designated positions, such as positions 4, 5, 6, 8, 11, 15, 18, 19.
In this embodiment, the method specifically includes:
obtaining a target sequence number corresponding to the single character: first, based on the mapping relation between the preset single character and the serial number, the target serial number corresponding to each single character in the authority character is obtained. This step maps the single character to a preset sequence number.
Generating a transformed encryption matrix: and sequentially marking the sequence numbers of the data encryption matrixes, finding out the corresponding target positions in the data encryption matrixes according to the target sequence numbers corresponding to the single characters in the authority characters, and replacing elements in the target positions with the single characters corresponding to the target sequence numbers to obtain the transformation encryption matrixes. The data encryption matrix is transformed, and the matrix is encrypted according to the authority character setting.
Concatenating characters: and respectively concatenating English characters and digital characters in the transformation encryption matrix according to the sequence to respectively obtain a first concatenated character and a second concatenated character.
Merging concatenated characters: and combining the first serial characters and the second serial characters according to a preset rule to obtain combined serial characters. This step is to combine the english and digital characters according to a specified rule.
Identifying and extracting characters: and identifying the appointed character on the appointed position in the merged serial character, and extracting the corresponding character from the corresponding position of the merged serial character according to the attribute (number or English character) of the character, so as to combine, thereby obtaining the final encrypted password.
Through the steps, the data encryption matrix can be transformed and encrypted according to the authority characters and the preset mapping relation, and finally the encrypted password with a certain rule is obtained. These steps are to generate an encryption key based on a transformed encryption matrix for data encryption and secure transactions.
In an embodiment, the step of sending the target data to the second transaction node after encrypting the target data based on the encryption password includes:
Encrypting the target data based on the encryption password to generate encrypted target data, and then randomly generating a plurality of interference data;
randomly sequencing a plurality of interference data and the encryption target data to obtain a data sequence;
Sequentially transmitting data in the data sequence to the second transaction node; wherein only one data is transmitted at a time, and the identification information of the target data is transmitted while the encrypted target data is transmitted.
In this embodiment, the method specifically includes:
Encrypting the target data: first, the target data is encrypted based on an encryption password, and encrypted target data is generated. The target data is encrypted by the encryption password generated in the process, so that the safety of the data in the transmission process is ensured.
Generating interference data: a plurality of interference data is randomly generated. These interfering data may be randomly generated spurious data for confusion and increasing the security of the data transmission.
Sequencing data sequences: and randomly sequencing the plurality of interference data and the encryption target data to obtain a data sequence. The purpose of this step is to mix the encrypted target data with the interfering data, increasing the security of the data transmission so that the receiving party cannot easily distinguish between the real data and the interfering data.
Transmitting data to the second transaction node: and sequentially transmitting the data in the data sequence to the second transaction node. One data is sent at a time, so that the order and stability of data transmission are ensured. In addition to transmitting the encrypted target data, identification information of the target data is also transmitted so that the second transaction node can correctly decrypt and identify the target data.
Through the steps, the encrypted target data and the interference data can be mixed and orderly sent to the second transaction node in the data transmission process, so that the safety and the integrity of data transmission are ensured.
In an embodiment, the step of sending the target data to the second transaction node after encrypting the target data based on the encryption password includes:
After encrypting the target data based on the encryption password to generate encrypted target data, sequentially dividing the identification information of the target data into three groups of identification characters;
randomly generating three sequentially arranged interference data, and sequentially taking various identification characters as marks of the interference data; wherein, an identification character corresponds to a mark of interference data;
randomly inserting the encrypted target data into the interference data which are arranged in sequence to obtain a data sequence;
sequentially transmitting data in the data sequence to the second transaction node; wherein only one data is transmitted at a time.
In this embodiment, the method specifically includes:
separation target data identification information: first, after encrypting target data based on an encryption password to generate encrypted target data, the identification information of the target data is sequentially divided into three groups of identification characters. These identification characters may be a specific identification of the data, information indicating the type of data, or other identifying information.
Randomly generating interference data: three sequentially arranged interference data are randomly generated, and each group of identification characters is sequentially used as a mark of the interference data. These interfering data may be randomly generated spurious data for confusion and increasing the security of the data transmission.
Inserting encrypted data: and randomly inserting the encrypted target data into the interference data which are arranged in sequence to obtain a data sequence. This step mixes the encrypted data and the interference data together for further confusion and protection of the data.
Transmitting data to the second transaction node: and sequentially transmitting the data in the data sequence to the second transaction node. Only one data is sent at a time, thereby ensuring the order and stability of data transmission.
Through the steps, the encrypted target data and the interference data can be mixed and orderly sent to the second transaction node in the data transmission process, so that the safety and the integrity of data transmission are ensured. The purpose of these steps is to increase the security and confusion of data transmission to prevent unauthorized access and malicious attacks.
In an embodiment, after the step of sending to the second transaction node, the step of sending comprises:
the second transaction node acquires identification information of the encrypted target data and generates a first character matrix based on the identification information;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
Transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating a decryption password based on the transformed encryption matrix;
and decrypting the encrypted target data based on the decryption password to obtain the target data.
In this embodiment, the method specifically includes:
Processing the identification information of the encrypted target data to generate a first character matrix: at the second transaction node, first, the identification information of the encrypted target data is processed, and a first character matrix is generated based on the identification information. This step involves converting the characters in the identification information into corresponding numbers or other symbols and forming a first character matrix according to a preset rule.
Performing preset coding algorithm conversion based on the identification information: and at the second transaction node, converting the preset coding algorithm according to the identification information of the encrypted target data to obtain a conversion coding algorithm. The additional information is then encoded using this transcoding algorithm, resulting in encoded characters. Then, a second character matrix is generated based on the encoded characters, and a data encryption matrix is generated based on the first character matrix and the second character matrix.
Transforming the data encryption matrix based on the authority character to generate a decryption password: and transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating a decryption password based on the transformed encryption matrix. This step involves transforming the data encryption matrix according to rules set by the rights character, while generating a password for decryption.
Decrypting the target data: and finally, decrypting the encrypted target data based on the decryption password to obtain the original target data. This step is to perform a decryption operation on the encrypted target data to obtain the original data.
Through the steps, the encrypted target data can be decrypted at the second transaction node to obtain the original target data. The whole process involves the steps of processing the identification information, converting the coding algorithm, generating a data encryption matrix, generating a decryption password and the like so as to ensure the safe transmission and decryption of the target data.
Referring to fig. 2, in an embodiment of the present invention, there is further provided a data security transaction system with decentralization, where each transaction node is respectively used as a participant to access into a decentralization blockchain to construct a blockchain technology-based data transaction platform, and the system includes a first transaction node and a second transaction node;
When the first transaction node receives transaction request information of the second transaction node, the transaction information, authority characters and additional information are analyzed from the transaction request information;
Determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
Transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password, and then sending the target data to the second transaction node.
In this embodiment, for specific implementation in the above system embodiment, please refer to the above method embodiment, and detailed description is omitted herein.
In summary, in the embodiment of the invention, when the first transaction node receives the transaction request information of the second transaction node, the transaction information, the permission character and the additional information are analyzed from the transaction request information; determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data; converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix; transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; and encrypting the target data based on the encryption password, and then sending the target data to the second transaction node. Based on the characteristics of the block chain technology, such as decentralization, transparency and non-tamper property, the invention provides a new solution for data security transaction and ensures the security and traceability aspects of data transaction. The decentralised data transaction method utilizes blockchain technology to solve the security and trust problems faced by traditional decentralised data transactions. By encrypting the data in the transaction process, the data security can be ensured, and the risk of illegal access or tampering of the data is avoided.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present invention and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes using the descriptions and drawings of the present invention or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (9)

1. The data security transaction method based on the block chain technology is characterized in that each transaction node is respectively used as a participant to be accessed into the block chain with the decentralization to construct a data transaction platform based on the block chain technology, and the method comprises the following steps:
When the first transaction node receives transaction request information of the second transaction node, the transaction information, authority characters and additional information are analyzed from the transaction request information;
Determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; encrypting the target data based on the encryption password and then sending the encrypted target data to the second transaction node;
The authority character comprises a plurality of single characters;
The step of transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix and generating an encryption password based on the transformed encryption matrix comprises the following steps:
Obtaining a target sequence number corresponding to each single character in the authority characters based on a preset mapping relation between the single characters and the sequence numbers;
Sequentially marking the sequence numbers of the data encryption matrixes, and searching target positions corresponding to the target sequence numbers from the data encryption matrixes; replacing elements in the target position with single characters corresponding to the target sequence number to obtain a transformation encryption matrix;
sequentially concatenating English characters in the transformation encryption matrix to obtain a first concatenated character;
the digital characters in the transformation encryption matrix are sequentially connected in series to obtain a second serial character;
inserting each digital character in the second serial characters into the first serial characters according to a preset rule to obtain combined serial characters;
identifying the appointed character on the appointed bit of the merged serial character, and judging the appointed character to be a digital character or an English character;
If the appointed character is a digital character, extracting corresponding characters from a plurality of first appointed positions of the merged serial characters for combination, and obtaining the encrypted password;
if the appointed character is an English character, extracting corresponding characters from a plurality of second appointed positions of the combined serial-connected characters to be combined, and obtaining the encrypted password; the first designated positions and the second designated positions are different.
2. The decentralised data security transaction method of claim 1, wherein the transaction information includes transaction object information and transaction contract information; the transaction contract information comprises transaction conditions of a second transaction node;
The step of determining, based on the transaction information, target data that the second transaction node needs to request a transaction includes:
Determining request data of the second transaction node for requesting transaction based on the transaction object information, and acquiring transaction requirements of the request data;
And judging whether the transaction contract information accords with the transaction requirement of the request data, and if so, determining the request data as target data.
3. The method of claim 1, wherein the step of generating a first character matrix based on the identification information of the target data comprises:
Identifying the attribute of each character in the identification information of the target data; wherein the identification information consists of a plurality of characters, and the attribute comprises a digital character and an English character;
Grouping the identification information according to the attribute of the character in sequence to obtain x groups of character combinations; wherein each group of character combinations at least comprises one character; when grouping, if the attributes of adjacent characters are the same, grouping the characters into the same group;
creating a blank matrix of three rows and m columns; wherein 3*m is more than or equal to x is more than 3 x (m-1);
sequentially adding each group of character combinations to each element position in the blank matrix of the three rows and the m columns, and judging whether blank positions exist or not;
If not, taking the matrix added with each group of character combinations as a first character matrix; if the first character matrix exists, adding a preset character in the blank position to obtain the first character matrix.
4. The method for decentralized data security transaction according to claim 1, wherein the step of converting the preset encoding algorithm based on the identification information to obtain a converted encoding algorithm comprises:
Acquiring each coding parameter in the preset coding algorithm, and classifying each coding parameter into a first class and a second class; wherein the first category is a single character encoding parameter and the second category is a double character encoding parameter;
Identifying the attribute of each character in the identification information of the target data; wherein the identification information consists of a plurality of characters, and the attribute comprises a digital character and an English character;
Determining a first number of digital characters and a second number of English characters in the identification information;
All the coding parameters belonging to the first category in the preset coding algorithm are replaced by numbers corresponding to the first quantity; and replacing all the coding parameters belonging to the second category in the preset coding algorithm with numbers corresponding to the second number to obtain the conversion coding algorithm.
5. The method of claim 1-4, wherein the step of generating a second character matrix based on the encoded characters and a data encryption matrix based on the first character matrix and the second character matrix comprises:
Identifying the occurrence times of each character in the coded characters, and obtaining three times with the largest times from the occurrence times, wherein the three times are respectively the first times, the second times and the third times which are arranged from large to small;
creating a blank matrix of three rows and one column, and sequentially adding the first times, the second times and the third times to the positions of elements in the blank matrix of three rows and one column to obtain the second character matrix;
Multiplying the first character matrix with the second character matrix to obtain a third character matrix serving as the data encryption matrix.
6. The method of claim 1, wherein the step of transmitting the target data to the second transaction node after encrypting the target data based on the encryption key comprises:
Encrypting the target data based on the encryption password to generate encrypted target data, and then randomly generating a plurality of interference data;
randomly sequencing a plurality of interference data and the encryption target data to obtain a data sequence;
Sequentially transmitting data in the data sequence to the second transaction node; wherein only one data is transmitted at a time, and the identification information of the target data is transmitted while the encrypted target data is transmitted.
7. The method of claim 1, wherein the step of transmitting the target data to the second transaction node after encrypting the target data based on the encryption key comprises:
After encrypting the target data based on the encryption password to generate encrypted target data, sequentially dividing the identification information of the target data into three groups of identification characters;
randomly generating three sequentially arranged interference data, and sequentially taking various identification characters as marks of the interference data; wherein, an identification character corresponds to a mark of interference data;
randomly inserting the encrypted target data into the interference data which are arranged in sequence to obtain a data sequence;
sequentially transmitting data in the data sequence to the second transaction node; wherein only one data is transmitted at a time.
8. A method of decentralized data security transaction according to claim 6 or 7, wherein after the step of transmitting to the second transaction node, it comprises:
the second transaction node acquires identification information of the encrypted target data and generates a first character matrix based on the identification information;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
Transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating a decryption password based on the transformed encryption matrix;
and decrypting the encrypted target data based on the decryption password to obtain the target data.
9. The data security transaction system is characterized in that each transaction node is respectively used as a participant to be accessed into a decentralized blockchain to construct a data transaction platform based on a blockchain technology, and the system comprises a first transaction node and a second transaction node;
When the first transaction node receives transaction request information of the second transaction node, the transaction information, authority characters and additional information are analyzed from the transaction request information;
Determining target data of the second transaction node which needs to request transaction based on the transaction information; acquiring identification information of the target data, and generating a first character matrix based on the identification information of the target data;
Converting a preset coding algorithm based on the identification information to obtain a conversion coding algorithm; coding the additional information based on the conversion coding algorithm to obtain coding characters; generating a second character matrix based on the coded characters, and generating a data encryption matrix based on the first character matrix and the second character matrix;
transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix; encrypting the target data based on the encryption password and then sending the encrypted target data to the second transaction node;
The authority character comprises a plurality of single characters;
the transforming the data encryption matrix based on the authority character to obtain a transformed encryption matrix, and generating an encryption password based on the transformed encryption matrix, comprising:
Obtaining a target sequence number corresponding to each single character in the authority characters based on a preset mapping relation between the single characters and the sequence numbers;
Sequentially marking the sequence numbers of the data encryption matrixes, and searching target positions corresponding to the target sequence numbers from the data encryption matrixes; replacing elements in the target position with single characters corresponding to the target sequence number to obtain a transformation encryption matrix;
sequentially concatenating English characters in the transformation encryption matrix to obtain a first concatenated character;
the digital characters in the transformation encryption matrix are sequentially connected in series to obtain a second serial character;
inserting each digital character in the second serial characters into the first serial characters according to a preset rule to obtain combined serial characters;
identifying the appointed character on the appointed bit of the merged serial character, and judging the appointed character to be a digital character or an English character;
If the appointed character is a digital character, extracting corresponding characters from a plurality of first appointed positions of the merged serial characters for combination, and obtaining the encrypted password;
if the appointed character is an English character, extracting corresponding characters from a plurality of second appointed positions of the combined serial-connected characters to be combined, and obtaining the encrypted password; the first designated positions and the second designated positions are different.
CN202410224173.5A 2024-02-29 2024-02-29 Data security transaction method and system with decentralization function Active CN117807637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410224173.5A CN117807637B (en) 2024-02-29 2024-02-29 Data security transaction method and system with decentralization function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410224173.5A CN117807637B (en) 2024-02-29 2024-02-29 Data security transaction method and system with decentralization function

Publications (2)

Publication Number Publication Date
CN117807637A CN117807637A (en) 2024-04-02
CN117807637B true CN117807637B (en) 2024-05-07

Family

ID=90430283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410224173.5A Active CN117807637B (en) 2024-02-29 2024-02-29 Data security transaction method and system with decentralization function

Country Status (1)

Country Link
CN (1) CN117807637B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
CN112529586A (en) * 2020-12-15 2021-03-19 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112651049A (en) * 2021-01-04 2021-04-13 上海尚象信息科技有限公司 Privacy data sharing method and system based on block chain
CN116827774A (en) * 2022-03-21 2023-09-29 腾讯科技(深圳)有限公司 Service analysis method, device, equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
CN112529586A (en) * 2020-12-15 2021-03-19 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112651049A (en) * 2021-01-04 2021-04-13 上海尚象信息科技有限公司 Privacy data sharing method and system based on block chain
CN116827774A (en) * 2022-03-21 2023-09-29 腾讯科技(深圳)有限公司 Service analysis method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN117807637A (en) 2024-04-02

Similar Documents

Publication Publication Date Title
US20200266984A1 (en) Methods and systems for preparing and performing an object authentication
US8958562B2 (en) Format-preserving cryptographic systems
KR101332517B1 (en) Apparatus and method for processing authentication information
CN111008923B (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and watermark extracting equipment
CN101036340A (en) Two-way error correction for physical tokens
CN101421792A (en) Semiconductor device identifier generation method and semiconductor device
CN105340211A (en) System and methods for encrypting data
CN111756522A (en) Data processing method and system
CN111612476B (en) Secondary check anti-counterfeiting method, device, equipment and storage medium
CN111201753A (en) Block chain structure of bidirectional link
CN114267100B (en) Unlocking authentication method and device, security chip and electronic key management system
CN109214164A (en) Computer communication security login method Internet-based and system
KR20140026316A (en) Apparatus and method for processing authentication information
CN111798254A (en) Tracing code generation method, device, equipment and readable storage medium
CN115514585A (en) Database security management method and system
CN103544511A (en) Anti-counterfeiting identification
CN117807637B (en) Data security transaction method and system with decentralization function
CN1322335A (en) Apparatus and method for end-to-end authentication using biometric data
CN105827404A (en) Identity authentication method, identity authentication device, and server
CN110990872A (en) Private key export two-dimensional code storage and scanning recovery method based on block chain
CN115859370A (en) Transaction data processing method and device, computer equipment and storage medium
CN112149068A (en) Access-based authorization verification method, information generation method and device, and server
CN112364316B (en) High-security-level data access method and device based on structured light array identification
CN114943093A (en) Digital content heterogeneous chain cross-chain right determining method based on block chain
CN116108474B (en) Big data system password service method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant