[go: up one dir, main page]

CN108876381A - Method for secure transactions based on intelligent contract - Google Patents

Method for secure transactions based on intelligent contract Download PDF

Info

Publication number
CN108876381A
CN108876381A CN201810893438.5A CN201810893438A CN108876381A CN 108876381 A CN108876381 A CN 108876381A CN 201810893438 A CN201810893438 A CN 201810893438A CN 108876381 A CN108876381 A CN 108876381A
Authority
CN
China
Prior art keywords
transaction
data
transaction certificate
block
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810893438.5A
Other languages
Chinese (zh)
Inventor
杨国超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810893438.5A priority Critical patent/CN108876381A/en
Publication of CN108876381A publication Critical patent/CN108876381A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of method for secure transactions based on intelligent contract, this method includes:Receive original transaction certificate and Hash Value;The encryption that Trading parties carry out transaction certificate using the private key of oneself is received, encrypted transaction certificate is formed;The ciphertext data of transaction certificate are recorded on the transaction data alliance chain based on intelligent contract.The invention proposes a kind of method for secure transactions based on intelligent contract, each transaction certificate can record data variation and its unique corresponding ciphertext block data;Can not forging for encryption transaction certificate is realized, and realizes zero loss of transaction certificate data, and guarantees that transaction data change procedure is traceable.

Description

Method for secure transactions based on intelligent contract
Technical field
The present invention relates to block chain, in particular to a kind of method for secure transactions based on intelligent contract.
Background technique
Financial transaction needs that there is unique fidelity of data encryption, data can not forge, all data procedures are traceable etc. Ability guarantees safe and reliable, the easy supervision of system.Traditional financial transaction information system mainly uses data centralization management Mode, server database store all data, all terminals by application server carry out using.Since centralization is deposited There is loss of data, the risk being forged for storage mode.And this loss of data, forgery action process not can be traced.In gold Melt in trade management business, easily causes the problem of transaction certificate cannot sufficiently trust.
Summary of the invention
To solve the problems of above-mentioned prior art, the invention proposes a kind of Secure Transactions based on intelligent contract Method, including:
Receive original transaction certificate and Hash Value;
The encryption that Trading parties carry out transaction certificate using the private key of oneself is received, encrypted transaction certificate is formed;
The ciphertext data of transaction certificate are recorded on the transaction data alliance chain based on intelligent contract.
Preferably, alliance's chain network further comprises block inspection module, the block inspection module, for each Class subscriber checking is stored in the transaction data of each block of block chain.
Preferably, alliance's chain network further comprises operation monitoring module, and the operation monitoring module is for supervising Control the operating condition and coordinator node of each peer node of alliance's chain network.
Preferably, the coordinator node is used to coordinate between the unified operation of module and each peer node in each peer node Transaction data synchronization.
Preferably, when generating the ciphertext data of the transaction certificate, the characteristic determined in transaction certificate is first extracted, Then ciphertext data are generated for these characteristics, the characteristic includes both parties ID, time, the amount of money.
Preferably, when the transaction certificate lacks at least one described characteristic, according to the friendship of the transaction certificate Easy type determines the default value of the characteristic lacked.
The present invention compared with prior art, has the following advantages that:
The invention proposes a kind of method for secure transactions based on intelligent contract, each transaction certificate can record data Variation and its unique corresponding ciphertext block data;Realizing encryption transaction certificate can not forge, and realize transaction with Zero loss of data is demonstrate,proved, and guarantees that transaction data change procedure is traceable.
Detailed description of the invention
Fig. 1 is the flow chart of the method for secure transactions according to an embodiment of the present invention based on intelligent contract.
Specific embodiment
Retouching in detail to one or more embodiment of the invention is hereafter provided together with the attached drawing of the diagram principle of the invention It states.The present invention is described in conjunction with such embodiment, but the present invention is not limited to any embodiments.The scope of the present invention is only by right Claim limits, and the present invention covers many substitutions, modification and equivalent.Illustrate in the following description many details with Just it provides a thorough understanding of the present invention.These details are provided for exemplary purposes, and without in these details Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of method for secure transactions based on intelligent contract.Fig. 1 is real according to the present invention Apply the method for secure transactions flow chart based on intelligent contract of example.
Financial transaction voucher processing system the present invention is based on intelligent contract includes transaction data generation unit, credentials file Storage unit, intelligent contract administration unit and alliance's chain network.
The transaction data generation unit, for realizing the formation management process of financial transaction voucher, including transaction certificate Release module, beneficiary encrypting module, third side's encrypting module, paying party encrypting module;The transaction certificate release module is used In receiving transaction certificate, alliance's chain network is accessed, original transaction certificate and Hash Value are recorded in the transaction based on intelligent contract On data sharing alliance chain, original transaction certificate and Hash Value are recorded in credentials file storage unit, and create transaction certificate T generation Transaction data alliance chain;The beneficiary encrypting module is used to receive beneficiary and is carried out using the private key of oneself to transaction certificate T Encryption, form encrypted transaction certificate TC, using alliance's chain network, each peer node of alliance's chain network is notified to pass through calculation Power compares, and determines the peer node X for generating New Transaction blocki, XiFor constitute alliance's chain network peer node i-th of node, In peer node XiOn transaction data alliance chain on generate original block, form transaction certificate TCEncryption hash value TCx, will Transaction certificate abstract, beneficiary encryption information and transaction certificate TCEncryption hash value TCxIt is written to the wound of transaction data alliance chain On beginning block, coordinator node incites somebody to action the original block automatic synchronization of transaction data alliance chain to other all peer nodes Encryption hash value TCxBack to transaction data generation unit, transaction certificate T is recorded in credentials file storage unitCAnd encryption is miscellaneous Gather value TCx;Third side's encrypting module is used to receive transaction monitoring side using the private key of oneself to transaction certificate TCWhat is carried out adds It is close, form encrypted transaction certificate TCM, using alliance's chain network, notify each peer node of alliance's chain network by calculating power ratio Compared with the determining peer node X for generating New Transaction blockj, XjFor constitute alliance's chain network j-th of node of peer node, in equity Nodes XjOn transaction data alliance chain on generate Head Section block, formed transaction certificate TCMEncryption hash value TCx, by transaction certificate Abstract, transaction monitoring side's encryption information and transaction certificate TCMEncryption hash value TCxIt is written to the Head Section of transaction data alliance chain On block, coordinator node by the Head Section block automatic synchronization of transaction data alliance chain to other all peer nodes, and will transaction with Demonstrate,prove TCMEncryption hash value return to transaction data generation unit, in credentials file storage unit record transaction certificate TCMAnd Transaction certificate TCMEncryption hash value TCMx;The paying party encrypting module forms encryption for receiving n-th of paying party encryption Transaction certificate T afterwardsCM_P, using alliance's chain network, each peer node of alliance's chain network is notified to compare by calculating power, determines life At the peer node X of New Transaction blockk, XkFor constitute alliance's chain network k-th of node of peer node, in peer node XkOn Transaction data alliance chain on generate n-th of block, form transaction certificate TCM_PEncryption hash value TCM_Px, transaction certificate is plucked It wants, paying party encryption information and transaction certificate TCMEncryption hash value TCMxIt is written to n-th of block of transaction data alliance chain On, coordinator node by n-th of block automatic synchronization of transaction data alliance chain to other peer nodes, and by transaction certificate TCM_P Encryption hash value return to transaction data generation unit, in credentials file storage unit record transaction certificate TCM_PAnd TCM_P Encryption hash value TCM_Px
The credentials file storage unit, for the encryption information of transaction certificate and block hash value information to be persisted to In credentials file storage unit;It further comprise block inspection module, operation prison in alliance's chain network in addition to peer node Control module and coordinator node;The block inspection module examines the transaction for being stored in each block of block chain for all types of user Data information;The operation monitoring module is used to monitor the operating condition of each peer node of alliance's chain network;The coordinator node For coordinating the transaction data synchronization between the unified operation of the module in each peer node and each peer node.Made using block chain For the copy storage mode of transaction data, former transaction processing system is only needed to generate the corresponding ciphertext data of transaction data, then be deposited Store up generation alliance's chain Backup Data in corresponding block chain, it is ensured that transaction data can not be modified.
Wherein, when generating the ciphertext data of the transaction certificate, the characteristic determined in transaction certificate is first extracted such as Then both parties ID, time, the amount of money generate ciphertext data for these characteristics, a variety of different transaction certificates are taken out Common characteristic is separated out, the source data of ciphertext data is simplified, quickly generates ciphertext data, improves data process effects.When When the transaction certificate lacks at least one described characteristic, the spy lacked is determined according to the type of transaction of the transaction certificate Levy the default value of data.
Correspondingly, during the consistency checking of transaction certificate, acquisition and institute from alliance's chain transaction certificate of storage State the associated alliance's chain Backup Data of transaction certificate;Alliance's chain Backup Data includes the ciphertext data according to transaction certificate The data information being formed and stored in block chain stores an adjacent upper node alliance chain in alliance's chain Backup Data Ciphertext data in Backup Data;The first ciphertext data of the transaction certificate are calculated, and obtain alliance's chain Backup Data In the second ciphertext data corresponding with the transaction certificate;Compare the first ciphertext data and the second ciphertext data It is whether identical, if they are the same, then confirm that the transaction data is unchanged.
According to a specific embodiment, the transaction of alliance's catenary system participates in both sides and is set as beneficiary L and paying party V, just Beginningization transaction certificate data are C, constitute third side P by n node.Parameter setting is as follows:
The private key that beneficiary L is arranged is Ks1=xL.Ks2=zL;l<xL, zL<The public key of q, beneficiary L are KpL=(p, g, yL, uL),
Wherein g ∈ Zp*:
yL=gxLmod p;
uL=gzLmod p。
P and q is default Big prime.
The private key of paying party V is xV∈Zq;The public key of V is yV=gxV mod p
Each third side PiPrivate key be zi∈Zq, public key yi=hzi(mod q), and select an open parameter xi∈ Zq, n xiBetween it is different.
For transaction certificate Hash Value m ∈ Zq, beneficiary L first generate m can not counterfeit watermarking.Selection one [1, q- L] between random number t, calculate T=gtThen modp and m '=T mod q carries out watermark to transaction certificate Hash Value m' again Encryption.
It selects a random number R that R is less than (p-1) and coprime with (p-1), calculates r=gRMod p, and s is calculated, make It obtains m'=rx+ (Rs mod q), the watermark keys for obtaining transaction certificate Hash Value m ' are (r, s), and verifying form is gm’=yLrs (mod p), to transaction certificate Hash Value m can not counterfeit watermarking δLFor (r, s, T).
When beneficiary L externally announces parameter t, by beneficiary L can not counterfeit watermarking δLBe converted to common watermark δL0: (r, s, T, t), that is, verified whether T=gt(mod p), and { uLmT) '=yLrs(mod p) is set up.
Beneficiary L broadcasts parameter t '=t+m (mod q), shares to n third side.Beneficiary L random selection ZqOn k-1 order polynomial:
Enable f0=t ' announces S=gt’Mod p and Fj=gfjMod p, enables the sub-key beBut siIt is with third side PiPublic key yiIt is sent to paying party V after encryption, is made simultaneously Verify token (C, Di):
Beneficiary L third side PiPublic key yiTo siIt is encrypted, i.e. beneficiary L selects random number α ∈ Zq, enabled Board (C, Di)=(hα,si -1,yi α) (mod q), wherein C=hα(mod q), Di=(si -1,yi α)(mod q).Detailed process description It is as follows:
1) beneficiary L send to transaction certificate m can not counterfeit watermarking δL(r, s, T) and verifying token (C, Di) and it is right Each siVerifiable Encryptosystem ciphertext si -1,yi αGive paying party V;
2) paying party V verifies token (C, Di) validity, i.e. paying party V using known Verification following formula whether at It is vertical:
Tgm=S
If set up, illustrate (C, Di) it is strictly to use PiPublic key to siEncryption, and beneficiary L is to n PiShare Secret is strictly parameter t, thus may determine that when there is more than or equal to k third side PiTo ciphertext (C, Di) decryption when, so that it may weight Structure parameter t' obtains t so that beneficiary L can not counterfeit watermarking be transformed into common watermark.Then paying party V and beneficiary L into The interactive verifying δ of rowL, process is as follows:
(1) paying party V generates two random numbers a and b, calculates ch=TTmagbMod p, while sending it to beneficiary L。
(2) beneficiary L generates a random number k, and calculates h1=chgkMod p and h2=h1rsaMod p, simultaneously The two numbers are sent to paying party V.
(3) a and b are sent to beneficiary L by paying party V.
(4) beneficiary L verifies ch=TTmagbK is sent to paying party V by mod p.
(5) paying party V verifies h1=chgkMod p and h2=h1rsamod p.If the verification passes, then paying party V Send the watermark δ of oneselfVGive beneficiary L.
Beneficiary L, which is received, verifies its validity, then will confirm that the parameter t of its watermark validity is sent to paying party V.
Paying party V receives t, has verified whether T=gt(mod p), if set up, whole process is completed, if not, To the common watermark δ of beneficiary LL(r, s, T, t).
The intelligence contract administration unit is for generating intelligent contract by collaboration encryption between counterparty, according to intelligence Contract further generates in reliable block data more new information and the chain that coalizes between trade user.Intelligent contract requesting party One or more contract signing sides that reliability index value determines collaboration encryption, intelligent contract request are generated according to preset contract Side, contract signing side respectively correspond a permission parameter value, and intelligent contract requesting party is corresponding with one or more contract signing sides The sum of permission parameter value generate reliability index value not less than preset contract;Generate the transaction certificate block of transaction certificate more New information;Transaction certificate block more new information is block data of the private key based on intelligent contract requesting party to original transaction certificate What information obtained after being encrypted;The block data information of original transaction certificate includes:Intelligent contract requesting party ID, contract are signed Square chained list or the public key of contract signing side;Transaction certificate block more new information to contract signing side requesting cooperative is sent to encrypt;It connects Receive the encrypted acknowledgment information from contract signing side;The update of transaction certificate block data is carried out according to encrypted acknowledgment information.
When intelligent contract requesting party is multiple, indicate that transaction access is initiated by multiple transaction agents.Intelligent contract is asked When system where the side of asking or contract sign direction submits registration request, unique User ID and public private key information are obtained.User's note User type, user related data information are initialized after volume success.It is each user point according to the assessment result of user The permission parameter value of operation is updated with corresponding transaction certificate data.Transaction certificate data update action type and each transaction with The required reliability index value that card data update action type can be preset.
Permission parameter during determining contract signing side, in addition to meeting intelligent contract requesting party and contract signing side The sum of value generates except reliability index value not less than preset contract, and intelligent contract requesting party can also independently select collaboration to add Close one or more contract signing sides, generate contract signing side chained list, and the foundation of selection can be the common completion transaction of needs The user of operation.
After intelligent contract requesting party generates transaction certificate block more new information, it can be sent in contract signing side chained list first Position contract signing side's requesting cooperative encryption, after the first contract signing side completes encryption, is signed under direction by the first place contract The first contract signing side adds in one encryption information of user's transmission comprising intelligent contract requesting party and contract signing side chained list The transaction certificate block more new information of close processing result, requesting cooperative encryption.After N-1 users complete encryption, to N Position contract signing side sends the collaboration encryption of encryption information, the preceding contract signing side N-1 comprising intelligent contract requesting party As a result transaction certificate block more new information request cooperates with encryption, until collaboration encryption is completed.
In another case, after intelligent contract requesting party generates transaction certificate block more new information, it can also be to contract label All contract signing sides in the side's of ordering chained list send the collaboration encryption of transaction certificate block more new information request, receive and come from contract label The encrypted acknowledgment information obtained after the side's of ordering encryption.After each contract signing side completes encryption, requested to intelligent contract Side's feedback encrypted acknowledgment information;Or after all contracts in contract signing side chained list sign Fang Jun completion encryption, by last One contract signs direction intelligence contract requesting party and feeds back encrypted acknowledgment information.
The method that transaction certificate block data of the invention updates is handed over according to the encrypted acknowledgment information of contract signing side Easy voucher block data updates, and promotes the scalability that the transaction certificate block data of collaboration encryption updates.
Each update operation in operation chained list is updated for transaction certificate data, is required reliable according to preset operation Property index value to select corresponding contract to sign rectangular at contract signings side chained list, can with reach that the update of transaction certificate data operates By the requirement of property index value.If the reliability index value that transaction certificate data update operation O1 is T1, intelligent contract requesting party U1 Permission parameter value be W1, if W1 > T1, intelligence contract requesting party U1 oneself possess meets transaction certificate data update grasp Make the reliability index value of O1, then without carrying out collaboration encryption, intelligent contract requesting party U1 is only needed to encrypt in data modification history ?.If W1 < T1, intelligent contract requesting party U1 haves no right individually to carry out transaction certificate data to update operation O1, then needs to obtain The collaboration of one or more contract signing sides encrypts, so that the permission parameter value of intelligent contract requesting party and one or more contracts The sum of corresponding permission parameter value in signing side updates operation O1 reliability index value T1 not less than preset transaction certificate data, complete Operation O1 is updated at transaction Credential data.
In addition to the corresponding permission ginseng of the permission parameter value and one or more contracts signing side that require intelligent contract requesting party The sum of magnitude generates except reliability index value not less than preset contract, and can also limit collaboration encryption must encrypt in collaboration It is completed in time limit.If still having one or several contract signing sides without completing encryption or refusing beyond collaboration encrypted term When being encrypted absolutely, the collaboration encryption that this time transaction certificate block data updates terminates, and result is failure.Intelligent contract requesting party It can re-initiate what a transaction certificate block data updated to the contract signing side in the contract signing side chained list selected CIPHERING REQUEST is cooperateed with, the collaboration encryption that contract signing side carries out the update of transaction certificate block data can also be reselected, to protect The efficiency that card collaboration encryption is realized.
After carrying out the update of transaction certificate block data according to encrypted acknowledgment information, further include:It is requested by intelligent contract History is modified after completing transaction certificate block data and updating, using block data broadcast data by side, can also be by last complete History is modified at the contract signing side broadcast data of encryption.
In specific implementation, the verifying to transaction certificate block data includes two steps, first is that all completion encryptions of verifying The encryption validity of user, that is, judge the public key of intelligent contract requesting party and all contract sides of signinging whether can complete to trade with Demonstrate,prove the decryption of block more new information;Second is that transaction certificate data update the verifying of operational reliability index value, i.e. judgement is all intelligence Whether the sum of permission parameter value of energy contract requesting party and all contract signing sides is not less than the update operation of transaction certificate data Reliability index value.It can also be according to friendship already present in transaction certificate block data for the verifying of transaction certificate block data Easy voucher verifies transaction certificate block data.If block data by verifying, can according to proof of work algorithm into Row common recognition.If block data by common recognition, identifies, transaction certificate block more new information is legal, and block data can be included into friendship In easy voucher block data.
If counterparty allows third party user to access transaction certificate after ciphertext data are uploaded to alliance's chain, First substring of encryption key is uploaded to the corresponding alliance's chain access interface of alliance's chain by counterparty.Then counterparty is from alliance's chain Access interface receives the corresponding permission flag of the transaction certificate ciphertext data.Specifically, alliance's chain access interface by transaction with The corresponding rule of upload user of data is demonstrate,proved to generate permission flag.When permission third party user accesses the encrypting transactions data When, the second substring of the permission flag and private key is sent to third party user, the second substring packet of the private key by counterparty The remainder in the private key in addition to the first substring is included, so that third party is sending the visit for being directed to transaction certificate ciphertext data When asking request to alliance's chain access interface, the second son of the additional permission flag and the private key in the access request String.
In this way, alliance's chain access interface is when determining that the permission flag is available according to the first substring of the private key and the Two substrings generate the private key, and the ciphertext data obtained from alliance's chain are decrypted according to private key generated, and will It decrypts obtained transaction certificate clear data and is supplied to third party.
First substring of private key and the second substring are stitched together and are combined into complete private key by alliance's chain access interface. If the first substring of the second substring of the private key that alliance's chain access interface is obtained from third party and the private key obtained from counterparty It is not belonging to the same private key, then can not be spliced into a correct private key, and then decrypt failure, third party can not then be traded Voucher in plain text, is unable to the content that successful access arrives data, thus the transaction certificate data of effective guarantee both parties' uploads Safety.
When third party requests access to corresponding transaction certificate data by alliance's chain access interface, alliance's chain access interface It may first verify that whether permission flag can be used, in the available situation of permission flag, recycle and distinguish from counterparty and third party The first substring of private key of acquisition and the second substring obtain complete private key, if the imperfect private key of third-party offer is wrong, Correct complete private key can not be obtained, it just can not be to ciphertext data successful decryption, to ensure the safety of data.In this scheme In, the two does not all have the permission of access ciphertext data, thus effective guarantee data safety and privacy of user.At this point, only Alliance's chain access interface is the transaction certificate clear data decrypted by the data that access obtains, if some user is directly in area It is accessed on block chain, resulting is transaction certificate ciphertext data, is unable to get clear data.
In addition, counterparty after receiving permission flag, can further generate the access password of transaction certificate ciphertext data, The access password includes the second substring of the permission flag and the private key.It is described by the second of permission flag and the private key Substring is sent to the third-party step:The access password is sent to the third party, so that described Third party carries the access password in the access request.In this way, counterparty is just by the second son of permission flag and private key String is sent to third party.In this example, counterparty allows corresponding user by providing password to third party to access it The transaction certificate ciphertext data of upload, and there is no complete private keys in the password provided, and need alliance's chain access interface In do further verifying could obtain complete private key and be decrypted.
The intelligence contract administration unit is also used to, and when the first substring of the private key is uploaded to access interface, is connect Intelligent obligating document name and trade user name that counterparty uploads are received, so that alliance's chain access interface is according to the trade user name Corresponding rule generates permission flag, and the first substring, the intelligent obligating document by the permission flag with the private key Name and the trade user name are associated.Alliance's chain access interface can be according to intelligence wherein included when receiving the access request Energy obligating document name and the trade user name obtain the first substring of associated permission flag and the private key, so as to basis The permission flag of acquisition determines whether the permission flag that the access request includes can be used, according to the first substring of the private key of acquisition The second substring for including with the access request generates the private key.
When counterparty uploads the first substring of private key, access interface can be used according to the ciphertext data trade uploaded simultaneously Name in an account book, which determines, generates rule used in permission flag.Later, alliance's chain access interface is when receiving access request, from local search The corresponding intelligent obligating document name of the ciphertext data accessed to current request and the associated permission flag of trade user name, if visited Ask request in include permission flag with from local search to permission flag it is consistent, then illustrate the license for including in access request Mark be it is legal, whether the address of ciphertext data for further verifying current request access belongs to the corresponding permission of permission flag The data address of access.When being verified, determine that permission flag is available.
When determining that permission flag can be used, using the private associated with intelligent obligating document name and trade user name of acquisition Second substring of the private key that the first substring of key and access request include is combined into complete private key.
For above-mentioned access password, counterparty safeguards one or more access passwords, every a transaction that counterparty uploads Block data can all correspond to an access password, each intelligent obligating document name is also associated with an access password.In this way, when the When three direction counterparty's request datas access, if counterparty permits and determines corresponding access password, and by this access password It is issued to third party.
In conclusion each transaction certificate can the invention proposes a kind of method for secure transactions based on intelligent contract The variation of record data and its unique corresponding ciphertext block data;Realize can not forging for encryption transaction certificate, Er Qieshi Zero loss of transaction certificate data is showed, and has guaranteed that transaction data change procedure is traceable.
Obviously, it should be appreciated by those skilled in the art, each module of the above invention or each steps can be with general Computing system realize that they can be concentrated in single computing system, or be distributed in multiple computing systems and formed Network on, optionally, they can be realized with the program code that computing system can be performed, it is thus possible to they are stored It is executed within the storage system by computing system.In this way, the present invention is not limited to any specific hardware and softwares to combine.
It should be understood that above-mentioned specific embodiment of the invention is used only for exemplary illustration or explains of the invention Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing Change example.

Claims (8)

1. a kind of method for secure transactions based on intelligent contract, for the financial transaction voucher processing system based on intelligent contract, It is characterised in that it includes:
Receive original transaction certificate and Hash Value;
The encryption that Trading parties carry out transaction certificate using the private key of oneself is received, encrypted transaction certificate is formed;
The ciphertext data of transaction certificate are recorded on the transaction data alliance chain based on intelligent contract.
2. the method according to claim 1, wherein alliance's chain network further comprises that block examines mould Block, the block inspection module examine the transaction data for being stored in each block of block chain for all types of user.
3. the method according to claim 1, wherein alliance's chain network further comprises operation monitoring mould Block, the operation monitoring module are used to monitor the operating condition and coordinator node of each peer node of alliance's chain network.
4. the method according to claim 1, wherein the coordinator node is used to coordinate the mould in each peer node Transaction data synchronization between the unified operation of block and each peer node.
5. the method according to claim 1, wherein first being mentioned when generating the ciphertext data of the transaction certificate The characteristic determined in transaction certificate is taken, then generates ciphertext data for these characteristics, the characteristic includes Both parties ID, time, the amount of money.
6. according to the method described in claim 5, it is characterized in that, when the transaction certificate lacks at least one described characteristic According to when, the default value of characteristic lacked is determined according to the type of transaction of the transaction certificate.
7. the method according to claim 1, wherein generating intelligent conjunction by collaboration encryption between counterparty About, it is further generated in reliable block data more new information and the chain that coalizes between trade user according to intelligent contract.
8. the method according to claim 1, wherein further comprising:
Intelligent contract requesting party generates one or more contracts that reliability index value determines collaboration encryption according to preset contract Signing side, intelligent contract requesting party, contract signing side respectively correspond a permission parameter value, intelligent contract requesting party and one or The sum of corresponding permission parameter value in multiple contract signing sides generates reliability index value not less than preset contract;
Generate the transaction certificate block more new information of transaction certificate;The transaction certificate block more new information is based on intelligent contract What the private key of requesting party obtained after encrypting to the block data information of original transaction certificate;The area of the original transaction certificate Block data information includes:Intelligent contract requesting party ID, contract signing side chained list or the public key of contract signing side;
Transaction certificate block more new information to contract signing side requesting cooperative is sent to encrypt;Receive the encryption from contract signing side Confirmation message;The update of transaction certificate block data is carried out according to encrypted acknowledgment information.
CN201810893438.5A 2018-08-07 2018-08-07 Method for secure transactions based on intelligent contract Pending CN108876381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810893438.5A CN108876381A (en) 2018-08-07 2018-08-07 Method for secure transactions based on intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810893438.5A CN108876381A (en) 2018-08-07 2018-08-07 Method for secure transactions based on intelligent contract

Publications (1)

Publication Number Publication Date
CN108876381A true CN108876381A (en) 2018-11-23

Family

ID=64317360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810893438.5A Pending CN108876381A (en) 2018-08-07 2018-08-07 Method for secure transactions based on intelligent contract

Country Status (1)

Country Link
CN (1) CN108876381A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191122A (en) * 2018-08-10 2019-01-11 中国银行股份有限公司 A kind of method and device obtaining Transaction Information voucher
CN110032885A (en) * 2019-02-19 2019-07-19 阿里巴巴集团控股有限公司 Method, node and the storage medium of secret protection are realized in block chain
CN111080299A (en) * 2019-12-27 2020-04-28 广州骏伯网络科技有限公司 Anti-repudiation method for transaction information, client and server
CN111538783A (en) * 2020-04-20 2020-08-14 成都质数斯达克科技有限公司 Intelligent contract execution constraint method, device, terminal and storage medium
CN113837875A (en) * 2020-06-22 2021-12-24 京东方科技集团股份有限公司 Transaction method, node and medium based on blockchain network
CN114548986A (en) * 2022-01-27 2022-05-27 深圳金融电子结算中心有限公司 Payment method, payment security code generation method, device, equipment and storage medium
CN114663103A (en) * 2020-12-05 2022-06-24 江苏方芯维信息科技有限公司 Product supply chain tracing method and intelligent contract transaction method in system
CN115796869A (en) * 2022-11-24 2023-03-14 元疆(广州)供应链管理合伙企业(有限合伙) Commodity data processing method and device based on intelligent digital contract

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology
CN106559211A (en) * 2016-11-22 2017-04-05 中国电子科技集团公司第三十研究所 Secret protection intelligence contract method in a kind of block chain
CN106960128A (en) * 2017-04-01 2017-07-18 武汉康慧然信息技术咨询有限公司 Intelligent medical data management method and system based on distributed verification technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology
CN106559211A (en) * 2016-11-22 2017-04-05 中国电子科技集团公司第三十研究所 Secret protection intelligence contract method in a kind of block chain
CN106960128A (en) * 2017-04-01 2017-07-18 武汉康慧然信息技术咨询有限公司 Intelligent medical data management method and system based on distributed verification technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
缪锦春: "《邵阳学院学报(社会科学版)》", 30 April 2017 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191122A (en) * 2018-08-10 2019-01-11 中国银行股份有限公司 A kind of method and device obtaining Transaction Information voucher
CN109191122B (en) * 2018-08-10 2023-06-20 中国银行股份有限公司 Method and device for acquiring transaction information certificate
CN110032885A (en) * 2019-02-19 2019-07-19 阿里巴巴集团控股有限公司 Method, node and the storage medium of secret protection are realized in block chain
CN111080299A (en) * 2019-12-27 2020-04-28 广州骏伯网络科技有限公司 Anti-repudiation method for transaction information, client and server
CN111080299B (en) * 2019-12-27 2020-12-15 广州骏伯网络科技有限公司 Anti-repudiation method for transaction information, client and server
CN111538783A (en) * 2020-04-20 2020-08-14 成都质数斯达克科技有限公司 Intelligent contract execution constraint method, device, terminal and storage medium
CN113837875A (en) * 2020-06-22 2021-12-24 京东方科技集团股份有限公司 Transaction method, node and medium based on blockchain network
CN114663103A (en) * 2020-12-05 2022-06-24 江苏方芯维信息科技有限公司 Product supply chain tracing method and intelligent contract transaction method in system
CN114548986A (en) * 2022-01-27 2022-05-27 深圳金融电子结算中心有限公司 Payment method, payment security code generation method, device, equipment and storage medium
CN115796869A (en) * 2022-11-24 2023-03-14 元疆(广州)供应链管理合伙企业(有限合伙) Commodity data processing method and device based on intelligent digital contract
CN115796869B (en) * 2022-11-24 2024-01-19 元疆(广州)供应链管理合伙企业(有限合伙) Commodity data processing method and device based on intelligent digital contract

Similar Documents

Publication Publication Date Title
CN109146479A (en) Data ciphering method based on block chain
CN109377198B (en) Signing system based on multi-party consensus of alliance chain
CN108876381A (en) Method for secure transactions based on intelligent contract
US10848315B2 (en) Contract agreement method, agreement verification method, contract agreement system, agreement verification device, contract agreement device, contract agreement program and agreement verification program
CN113065961B (en) Power block chain data management system
CN114329529B (en) Asset data management method and system based on blockchain
KR102383099B1 (en) The non-face-to-face large document access blockchain system that combines blockchain-based DID service and IPFS-based data sharing technology and private key distributed storage technology
KR102307574B1 (en) Cloud data storage system based on blockchain and method for storing in cloud
US7937584B2 (en) Method and system for key certification
CN113411384A (en) System and method for privacy protection in data security sharing process of Internet of things
CN110046521A (en) Decentralization method for secret protection
CN110462621A (en) Sensitive data element is managed in block chain network
KR20190012969A (en) Data access management system based on blockchain and method thereof
CN111324881B (en) Data security sharing system and method fusing Kerberos authentication server and block chain
US20240187259A1 (en) Method and apparatus for generating, providing and distributing a trusted electronic record or certificate based on an electronic document relating to a user
El-Hajj et al. Ethereum for secure authentication of iot using pre-shared keys (psks)
CN111444492A (en) Digital identity verification method based on medical block chain
Cha et al. A blockchain-based privacy preserving ticketing service
CN113706261A (en) Block chain-based power transaction method, device and system
CN117081803A (en) Internet of things ciphertext access control method based on blockchain
CN109829722A (en) A kind of user identity real name identification method of electronic fare payment system
CN112565294A (en) Identity authentication method based on block chain electronic signature
CN115567312A (en) Alliance chain data authority management system and method capable of meeting multiple scenes
CN109146684A (en) Decentralization transaction verification method
CN113268722B (en) Personal digital identity management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123