CN108876381A - Method for secure transactions based on intelligent contract - Google Patents
Method for secure transactions based on intelligent contract Download PDFInfo
- Publication number
- CN108876381A CN108876381A CN201810893438.5A CN201810893438A CN108876381A CN 108876381 A CN108876381 A CN 108876381A CN 201810893438 A CN201810893438 A CN 201810893438A CN 108876381 A CN108876381 A CN 108876381A
- Authority
- CN
- China
- Prior art keywords
- transaction
- data
- transaction certificate
- block
- contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000007689 inspection Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 claims 1
- 230000008859 change Effects 0.000 abstract description 4
- 238000005242 forging Methods 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 241001269238 Data Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of method for secure transactions based on intelligent contract, this method includes:Receive original transaction certificate and Hash Value;The encryption that Trading parties carry out transaction certificate using the private key of oneself is received, encrypted transaction certificate is formed;The ciphertext data of transaction certificate are recorded on the transaction data alliance chain based on intelligent contract.The invention proposes a kind of method for secure transactions based on intelligent contract, each transaction certificate can record data variation and its unique corresponding ciphertext block data;Can not forging for encryption transaction certificate is realized, and realizes zero loss of transaction certificate data, and guarantees that transaction data change procedure is traceable.
Description
Technical field
The present invention relates to block chain, in particular to a kind of method for secure transactions based on intelligent contract.
Background technique
Financial transaction needs that there is unique fidelity of data encryption, data can not forge, all data procedures are traceable etc.
Ability guarantees safe and reliable, the easy supervision of system.Traditional financial transaction information system mainly uses data centralization management
Mode, server database store all data, all terminals by application server carry out using.Since centralization is deposited
There is loss of data, the risk being forged for storage mode.And this loss of data, forgery action process not can be traced.In gold
Melt in trade management business, easily causes the problem of transaction certificate cannot sufficiently trust.
Summary of the invention
To solve the problems of above-mentioned prior art, the invention proposes a kind of Secure Transactions based on intelligent contract
Method, including:
Receive original transaction certificate and Hash Value;
The encryption that Trading parties carry out transaction certificate using the private key of oneself is received, encrypted transaction certificate is formed;
The ciphertext data of transaction certificate are recorded on the transaction data alliance chain based on intelligent contract.
Preferably, alliance's chain network further comprises block inspection module, the block inspection module, for each
Class subscriber checking is stored in the transaction data of each block of block chain.
Preferably, alliance's chain network further comprises operation monitoring module, and the operation monitoring module is for supervising
Control the operating condition and coordinator node of each peer node of alliance's chain network.
Preferably, the coordinator node is used to coordinate between the unified operation of module and each peer node in each peer node
Transaction data synchronization.
Preferably, when generating the ciphertext data of the transaction certificate, the characteristic determined in transaction certificate is first extracted,
Then ciphertext data are generated for these characteristics, the characteristic includes both parties ID, time, the amount of money.
Preferably, when the transaction certificate lacks at least one described characteristic, according to the friendship of the transaction certificate
Easy type determines the default value of the characteristic lacked.
The present invention compared with prior art, has the following advantages that:
The invention proposes a kind of method for secure transactions based on intelligent contract, each transaction certificate can record data
Variation and its unique corresponding ciphertext block data;Realizing encryption transaction certificate can not forge, and realize transaction with
Zero loss of data is demonstrate,proved, and guarantees that transaction data change procedure is traceable.
Detailed description of the invention
Fig. 1 is the flow chart of the method for secure transactions according to an embodiment of the present invention based on intelligent contract.
Specific embodiment
Retouching in detail to one or more embodiment of the invention is hereafter provided together with the attached drawing of the diagram principle of the invention
It states.The present invention is described in conjunction with such embodiment, but the present invention is not limited to any embodiments.The scope of the present invention is only by right
Claim limits, and the present invention covers many substitutions, modification and equivalent.Illustrate in the following description many details with
Just it provides a thorough understanding of the present invention.These details are provided for exemplary purposes, and without in these details
Some or all details can also realize the present invention according to claims.
An aspect of of the present present invention provides a kind of method for secure transactions based on intelligent contract.Fig. 1 is real according to the present invention
Apply the method for secure transactions flow chart based on intelligent contract of example.
Financial transaction voucher processing system the present invention is based on intelligent contract includes transaction data generation unit, credentials file
Storage unit, intelligent contract administration unit and alliance's chain network.
The transaction data generation unit, for realizing the formation management process of financial transaction voucher, including transaction certificate
Release module, beneficiary encrypting module, third side's encrypting module, paying party encrypting module;The transaction certificate release module is used
In receiving transaction certificate, alliance's chain network is accessed, original transaction certificate and Hash Value are recorded in the transaction based on intelligent contract
On data sharing alliance chain, original transaction certificate and Hash Value are recorded in credentials file storage unit, and create transaction certificate T generation
Transaction data alliance chain;The beneficiary encrypting module is used to receive beneficiary and is carried out using the private key of oneself to transaction certificate T
Encryption, form encrypted transaction certificate TC, using alliance's chain network, each peer node of alliance's chain network is notified to pass through calculation
Power compares, and determines the peer node X for generating New Transaction blocki, XiFor constitute alliance's chain network peer node i-th of node,
In peer node XiOn transaction data alliance chain on generate original block, form transaction certificate TCEncryption hash value TCx, will
Transaction certificate abstract, beneficiary encryption information and transaction certificate TCEncryption hash value TCxIt is written to the wound of transaction data alliance chain
On beginning block, coordinator node incites somebody to action the original block automatic synchronization of transaction data alliance chain to other all peer nodes
Encryption hash value TCxBack to transaction data generation unit, transaction certificate T is recorded in credentials file storage unitCAnd encryption is miscellaneous
Gather value TCx;Third side's encrypting module is used to receive transaction monitoring side using the private key of oneself to transaction certificate TCWhat is carried out adds
It is close, form encrypted transaction certificate TCM, using alliance's chain network, notify each peer node of alliance's chain network by calculating power ratio
Compared with the determining peer node X for generating New Transaction blockj, XjFor constitute alliance's chain network j-th of node of peer node, in equity
Nodes XjOn transaction data alliance chain on generate Head Section block, formed transaction certificate TCMEncryption hash value TCx, by transaction certificate
Abstract, transaction monitoring side's encryption information and transaction certificate TCMEncryption hash value TCxIt is written to the Head Section of transaction data alliance chain
On block, coordinator node by the Head Section block automatic synchronization of transaction data alliance chain to other all peer nodes, and will transaction with
Demonstrate,prove TCMEncryption hash value return to transaction data generation unit, in credentials file storage unit record transaction certificate TCMAnd
Transaction certificate TCMEncryption hash value TCMx;The paying party encrypting module forms encryption for receiving n-th of paying party encryption
Transaction certificate T afterwardsCM_P, using alliance's chain network, each peer node of alliance's chain network is notified to compare by calculating power, determines life
At the peer node X of New Transaction blockk, XkFor constitute alliance's chain network k-th of node of peer node, in peer node XkOn
Transaction data alliance chain on generate n-th of block, form transaction certificate TCM_PEncryption hash value TCM_Px, transaction certificate is plucked
It wants, paying party encryption information and transaction certificate TCMEncryption hash value TCMxIt is written to n-th of block of transaction data alliance chain
On, coordinator node by n-th of block automatic synchronization of transaction data alliance chain to other peer nodes, and by transaction certificate TCM_P
Encryption hash value return to transaction data generation unit, in credentials file storage unit record transaction certificate TCM_PAnd TCM_P
Encryption hash value TCM_Px。
The credentials file storage unit, for the encryption information of transaction certificate and block hash value information to be persisted to
In credentials file storage unit;It further comprise block inspection module, operation prison in alliance's chain network in addition to peer node
Control module and coordinator node;The block inspection module examines the transaction for being stored in each block of block chain for all types of user
Data information;The operation monitoring module is used to monitor the operating condition of each peer node of alliance's chain network;The coordinator node
For coordinating the transaction data synchronization between the unified operation of the module in each peer node and each peer node.Made using block chain
For the copy storage mode of transaction data, former transaction processing system is only needed to generate the corresponding ciphertext data of transaction data, then be deposited
Store up generation alliance's chain Backup Data in corresponding block chain, it is ensured that transaction data can not be modified.
Wherein, when generating the ciphertext data of the transaction certificate, the characteristic determined in transaction certificate is first extracted such as
Then both parties ID, time, the amount of money generate ciphertext data for these characteristics, a variety of different transaction certificates are taken out
Common characteristic is separated out, the source data of ciphertext data is simplified, quickly generates ciphertext data, improves data process effects.When
When the transaction certificate lacks at least one described characteristic, the spy lacked is determined according to the type of transaction of the transaction certificate
Levy the default value of data.
Correspondingly, during the consistency checking of transaction certificate, acquisition and institute from alliance's chain transaction certificate of storage
State the associated alliance's chain Backup Data of transaction certificate;Alliance's chain Backup Data includes the ciphertext data according to transaction certificate
The data information being formed and stored in block chain stores an adjacent upper node alliance chain in alliance's chain Backup Data
Ciphertext data in Backup Data;The first ciphertext data of the transaction certificate are calculated, and obtain alliance's chain Backup Data
In the second ciphertext data corresponding with the transaction certificate;Compare the first ciphertext data and the second ciphertext data
It is whether identical, if they are the same, then confirm that the transaction data is unchanged.
According to a specific embodiment, the transaction of alliance's catenary system participates in both sides and is set as beneficiary L and paying party V, just
Beginningization transaction certificate data are C, constitute third side P by n node.Parameter setting is as follows:
The private key that beneficiary L is arranged is Ks1=xL.Ks2=zL;l<xL, zL<The public key of q, beneficiary L are KpL=(p, g, yL,
uL),
Wherein g ∈ Zp*:
yL=gxLmod p;
uL=gzLmod p。
P and q is default Big prime.
The private key of paying party V is xV∈Zq;The public key of V is yV=gxV mod p
Each third side PiPrivate key be zi∈Zq, public key yi=hzi(mod q), and select an open parameter xi∈
Zq, n xiBetween it is different.
For transaction certificate Hash Value m ∈ Zq, beneficiary L first generate m can not counterfeit watermarking.Selection one [1, q-
L] between random number t, calculate T=gtThen modp and m '=T mod q carries out watermark to transaction certificate Hash Value m' again
Encryption.
It selects a random number R that R is less than (p-1) and coprime with (p-1), calculates r=gRMod p, and s is calculated, make
It obtains m'=rx+ (Rs mod q), the watermark keys for obtaining transaction certificate Hash Value m ' are (r, s), and verifying form is gm’=yLrs
(mod p), to transaction certificate Hash Value m can not counterfeit watermarking δLFor (r, s, T).
When beneficiary L externally announces parameter t, by beneficiary L can not counterfeit watermarking δLBe converted to common watermark δL0:
(r, s, T, t), that is, verified whether T=gt(mod p), and { uLmT) '=yLrs(mod p) is set up.
Beneficiary L broadcasts parameter t '=t+m (mod q), shares to n third side.Beneficiary L random selection
ZqOn k-1 order polynomial:
Enable f0=t ' announces S=gt’Mod p and Fj=gfjMod p, enables the sub-key beBut siIt is with third side PiPublic key yiIt is sent to paying party V after encryption, is made simultaneously
Verify token (C, Di):
Beneficiary L third side PiPublic key yiTo siIt is encrypted, i.e. beneficiary L selects random number α ∈ Zq, enabled
Board (C, Di)=(hα,si -1,yi α) (mod q), wherein C=hα(mod q), Di=(si -1,yi α)(mod q).Detailed process description
It is as follows:
1) beneficiary L send to transaction certificate m can not counterfeit watermarking δL(r, s, T) and verifying token (C, Di) and it is right
Each siVerifiable Encryptosystem ciphertext si -1,yi αGive paying party V;
2) paying party V verifies token (C, Di) validity, i.e. paying party V using known Verification following formula whether at
It is vertical:
Tgm=S
If set up, illustrate (C, Di) it is strictly to use PiPublic key to siEncryption, and beneficiary L is to n PiShare
Secret is strictly parameter t, thus may determine that when there is more than or equal to k third side PiTo ciphertext (C, Di) decryption when, so that it may weight
Structure parameter t' obtains t so that beneficiary L can not counterfeit watermarking be transformed into common watermark.Then paying party V and beneficiary L into
The interactive verifying δ of rowL, process is as follows:
(1) paying party V generates two random numbers a and b, calculates ch=TTmagbMod p, while sending it to beneficiary
L。
(2) beneficiary L generates a random number k, and calculates h1=chgkMod p and h2=h1rsaMod p, simultaneously
The two numbers are sent to paying party V.
(3) a and b are sent to beneficiary L by paying party V.
(4) beneficiary L verifies ch=TTmagbK is sent to paying party V by mod p.
(5) paying party V verifies h1=chgkMod p and h2=h1rsamod p.If the verification passes, then paying party V
Send the watermark δ of oneselfVGive beneficiary L.
Beneficiary L, which is received, verifies its validity, then will confirm that the parameter t of its watermark validity is sent to paying party V.
Paying party V receives t, has verified whether T=gt(mod p), if set up, whole process is completed, if not,
To the common watermark δ of beneficiary LL(r, s, T, t).
The intelligence contract administration unit is for generating intelligent contract by collaboration encryption between counterparty, according to intelligence
Contract further generates in reliable block data more new information and the chain that coalizes between trade user.Intelligent contract requesting party
One or more contract signing sides that reliability index value determines collaboration encryption, intelligent contract request are generated according to preset contract
Side, contract signing side respectively correspond a permission parameter value, and intelligent contract requesting party is corresponding with one or more contract signing sides
The sum of permission parameter value generate reliability index value not less than preset contract;Generate the transaction certificate block of transaction certificate more
New information;Transaction certificate block more new information is block data of the private key based on intelligent contract requesting party to original transaction certificate
What information obtained after being encrypted;The block data information of original transaction certificate includes:Intelligent contract requesting party ID, contract are signed
Square chained list or the public key of contract signing side;Transaction certificate block more new information to contract signing side requesting cooperative is sent to encrypt;It connects
Receive the encrypted acknowledgment information from contract signing side;The update of transaction certificate block data is carried out according to encrypted acknowledgment information.
When intelligent contract requesting party is multiple, indicate that transaction access is initiated by multiple transaction agents.Intelligent contract is asked
When system where the side of asking or contract sign direction submits registration request, unique User ID and public private key information are obtained.User's note
User type, user related data information are initialized after volume success.It is each user point according to the assessment result of user
The permission parameter value of operation is updated with corresponding transaction certificate data.Transaction certificate data update action type and each transaction with
The required reliability index value that card data update action type can be preset.
Permission parameter during determining contract signing side, in addition to meeting intelligent contract requesting party and contract signing side
The sum of value generates except reliability index value not less than preset contract, and intelligent contract requesting party can also independently select collaboration to add
Close one or more contract signing sides, generate contract signing side chained list, and the foundation of selection can be the common completion transaction of needs
The user of operation.
After intelligent contract requesting party generates transaction certificate block more new information, it can be sent in contract signing side chained list first
Position contract signing side's requesting cooperative encryption, after the first contract signing side completes encryption, is signed under direction by the first place contract
The first contract signing side adds in one encryption information of user's transmission comprising intelligent contract requesting party and contract signing side chained list
The transaction certificate block more new information of close processing result, requesting cooperative encryption.After N-1 users complete encryption, to N
Position contract signing side sends the collaboration encryption of encryption information, the preceding contract signing side N-1 comprising intelligent contract requesting party
As a result transaction certificate block more new information request cooperates with encryption, until collaboration encryption is completed.
In another case, after intelligent contract requesting party generates transaction certificate block more new information, it can also be to contract label
All contract signing sides in the side's of ordering chained list send the collaboration encryption of transaction certificate block more new information request, receive and come from contract label
The encrypted acknowledgment information obtained after the side's of ordering encryption.After each contract signing side completes encryption, requested to intelligent contract
Side's feedback encrypted acknowledgment information;Or after all contracts in contract signing side chained list sign Fang Jun completion encryption, by last
One contract signs direction intelligence contract requesting party and feeds back encrypted acknowledgment information.
The method that transaction certificate block data of the invention updates is handed over according to the encrypted acknowledgment information of contract signing side
Easy voucher block data updates, and promotes the scalability that the transaction certificate block data of collaboration encryption updates.
Each update operation in operation chained list is updated for transaction certificate data, is required reliable according to preset operation
Property index value to select corresponding contract to sign rectangular at contract signings side chained list, can with reach that the update of transaction certificate data operates
By the requirement of property index value.If the reliability index value that transaction certificate data update operation O1 is T1, intelligent contract requesting party U1
Permission parameter value be W1, if W1 > T1, intelligence contract requesting party U1 oneself possess meets transaction certificate data update grasp
Make the reliability index value of O1, then without carrying out collaboration encryption, intelligent contract requesting party U1 is only needed to encrypt in data modification history
?.If W1 < T1, intelligent contract requesting party U1 haves no right individually to carry out transaction certificate data to update operation O1, then needs to obtain
The collaboration of one or more contract signing sides encrypts, so that the permission parameter value of intelligent contract requesting party and one or more contracts
The sum of corresponding permission parameter value in signing side updates operation O1 reliability index value T1 not less than preset transaction certificate data, complete
Operation O1 is updated at transaction Credential data.
In addition to the corresponding permission ginseng of the permission parameter value and one or more contracts signing side that require intelligent contract requesting party
The sum of magnitude generates except reliability index value not less than preset contract, and can also limit collaboration encryption must encrypt in collaboration
It is completed in time limit.If still having one or several contract signing sides without completing encryption or refusing beyond collaboration encrypted term
When being encrypted absolutely, the collaboration encryption that this time transaction certificate block data updates terminates, and result is failure.Intelligent contract requesting party
It can re-initiate what a transaction certificate block data updated to the contract signing side in the contract signing side chained list selected
CIPHERING REQUEST is cooperateed with, the collaboration encryption that contract signing side carries out the update of transaction certificate block data can also be reselected, to protect
The efficiency that card collaboration encryption is realized.
After carrying out the update of transaction certificate block data according to encrypted acknowledgment information, further include:It is requested by intelligent contract
History is modified after completing transaction certificate block data and updating, using block data broadcast data by side, can also be by last complete
History is modified at the contract signing side broadcast data of encryption.
In specific implementation, the verifying to transaction certificate block data includes two steps, first is that all completion encryptions of verifying
The encryption validity of user, that is, judge the public key of intelligent contract requesting party and all contract sides of signinging whether can complete to trade with
Demonstrate,prove the decryption of block more new information;Second is that transaction certificate data update the verifying of operational reliability index value, i.e. judgement is all intelligence
Whether the sum of permission parameter value of energy contract requesting party and all contract signing sides is not less than the update operation of transaction certificate data
Reliability index value.It can also be according to friendship already present in transaction certificate block data for the verifying of transaction certificate block data
Easy voucher verifies transaction certificate block data.If block data by verifying, can according to proof of work algorithm into
Row common recognition.If block data by common recognition, identifies, transaction certificate block more new information is legal, and block data can be included into friendship
In easy voucher block data.
If counterparty allows third party user to access transaction certificate after ciphertext data are uploaded to alliance's chain,
First substring of encryption key is uploaded to the corresponding alliance's chain access interface of alliance's chain by counterparty.Then counterparty is from alliance's chain
Access interface receives the corresponding permission flag of the transaction certificate ciphertext data.Specifically, alliance's chain access interface by transaction with
The corresponding rule of upload user of data is demonstrate,proved to generate permission flag.When permission third party user accesses the encrypting transactions data
When, the second substring of the permission flag and private key is sent to third party user, the second substring packet of the private key by counterparty
The remainder in the private key in addition to the first substring is included, so that third party is sending the visit for being directed to transaction certificate ciphertext data
When asking request to alliance's chain access interface, the second son of the additional permission flag and the private key in the access request
String.
In this way, alliance's chain access interface is when determining that the permission flag is available according to the first substring of the private key and the
Two substrings generate the private key, and the ciphertext data obtained from alliance's chain are decrypted according to private key generated, and will
It decrypts obtained transaction certificate clear data and is supplied to third party.
First substring of private key and the second substring are stitched together and are combined into complete private key by alliance's chain access interface.
If the first substring of the second substring of the private key that alliance's chain access interface is obtained from third party and the private key obtained from counterparty
It is not belonging to the same private key, then can not be spliced into a correct private key, and then decrypt failure, third party can not then be traded
Voucher in plain text, is unable to the content that successful access arrives data, thus the transaction certificate data of effective guarantee both parties' uploads
Safety.
When third party requests access to corresponding transaction certificate data by alliance's chain access interface, alliance's chain access interface
It may first verify that whether permission flag can be used, in the available situation of permission flag, recycle and distinguish from counterparty and third party
The first substring of private key of acquisition and the second substring obtain complete private key, if the imperfect private key of third-party offer is wrong,
Correct complete private key can not be obtained, it just can not be to ciphertext data successful decryption, to ensure the safety of data.In this scheme
In, the two does not all have the permission of access ciphertext data, thus effective guarantee data safety and privacy of user.At this point, only
Alliance's chain access interface is the transaction certificate clear data decrypted by the data that access obtains, if some user is directly in area
It is accessed on block chain, resulting is transaction certificate ciphertext data, is unable to get clear data.
In addition, counterparty after receiving permission flag, can further generate the access password of transaction certificate ciphertext data,
The access password includes the second substring of the permission flag and the private key.It is described by the second of permission flag and the private key
Substring is sent to the third-party step:The access password is sent to the third party, so that described
Third party carries the access password in the access request.In this way, counterparty is just by the second son of permission flag and private key
String is sent to third party.In this example, counterparty allows corresponding user by providing password to third party to access it
The transaction certificate ciphertext data of upload, and there is no complete private keys in the password provided, and need alliance's chain access interface
In do further verifying could obtain complete private key and be decrypted.
The intelligence contract administration unit is also used to, and when the first substring of the private key is uploaded to access interface, is connect
Intelligent obligating document name and trade user name that counterparty uploads are received, so that alliance's chain access interface is according to the trade user name
Corresponding rule generates permission flag, and the first substring, the intelligent obligating document by the permission flag with the private key
Name and the trade user name are associated.Alliance's chain access interface can be according to intelligence wherein included when receiving the access request
Energy obligating document name and the trade user name obtain the first substring of associated permission flag and the private key, so as to basis
The permission flag of acquisition determines whether the permission flag that the access request includes can be used, according to the first substring of the private key of acquisition
The second substring for including with the access request generates the private key.
When counterparty uploads the first substring of private key, access interface can be used according to the ciphertext data trade uploaded simultaneously
Name in an account book, which determines, generates rule used in permission flag.Later, alliance's chain access interface is when receiving access request, from local search
The corresponding intelligent obligating document name of the ciphertext data accessed to current request and the associated permission flag of trade user name, if visited
Ask request in include permission flag with from local search to permission flag it is consistent, then illustrate the license for including in access request
Mark be it is legal, whether the address of ciphertext data for further verifying current request access belongs to the corresponding permission of permission flag
The data address of access.When being verified, determine that permission flag is available.
When determining that permission flag can be used, using the private associated with intelligent obligating document name and trade user name of acquisition
Second substring of the private key that the first substring of key and access request include is combined into complete private key.
For above-mentioned access password, counterparty safeguards one or more access passwords, every a transaction that counterparty uploads
Block data can all correspond to an access password, each intelligent obligating document name is also associated with an access password.In this way, when the
When three direction counterparty's request datas access, if counterparty permits and determines corresponding access password, and by this access password
It is issued to third party.
In conclusion each transaction certificate can the invention proposes a kind of method for secure transactions based on intelligent contract
The variation of record data and its unique corresponding ciphertext block data;Realize can not forging for encryption transaction certificate, Er Qieshi
Zero loss of transaction certificate data is showed, and has guaranteed that transaction data change procedure is traceable.
Obviously, it should be appreciated by those skilled in the art, each module of the above invention or each steps can be with general
Computing system realize that they can be concentrated in single computing system, or be distributed in multiple computing systems and formed
Network on, optionally, they can be realized with the program code that computing system can be performed, it is thus possible to they are stored
It is executed within the storage system by computing system.In this way, the present invention is not limited to any specific hardware and softwares to combine.
It should be understood that above-mentioned specific embodiment of the invention is used only for exemplary illustration or explains of the invention
Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any
Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention
Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing
Change example.
Claims (8)
1. a kind of method for secure transactions based on intelligent contract, for the financial transaction voucher processing system based on intelligent contract,
It is characterised in that it includes:
Receive original transaction certificate and Hash Value;
The encryption that Trading parties carry out transaction certificate using the private key of oneself is received, encrypted transaction certificate is formed;
The ciphertext data of transaction certificate are recorded on the transaction data alliance chain based on intelligent contract.
2. the method according to claim 1, wherein alliance's chain network further comprises that block examines mould
Block, the block inspection module examine the transaction data for being stored in each block of block chain for all types of user.
3. the method according to claim 1, wherein alliance's chain network further comprises operation monitoring mould
Block, the operation monitoring module are used to monitor the operating condition and coordinator node of each peer node of alliance's chain network.
4. the method according to claim 1, wherein the coordinator node is used to coordinate the mould in each peer node
Transaction data synchronization between the unified operation of block and each peer node.
5. the method according to claim 1, wherein first being mentioned when generating the ciphertext data of the transaction certificate
The characteristic determined in transaction certificate is taken, then generates ciphertext data for these characteristics, the characteristic includes
Both parties ID, time, the amount of money.
6. according to the method described in claim 5, it is characterized in that, when the transaction certificate lacks at least one described characteristic
According to when, the default value of characteristic lacked is determined according to the type of transaction of the transaction certificate.
7. the method according to claim 1, wherein generating intelligent conjunction by collaboration encryption between counterparty
About, it is further generated in reliable block data more new information and the chain that coalizes between trade user according to intelligent contract.
8. the method according to claim 1, wherein further comprising:
Intelligent contract requesting party generates one or more contracts that reliability index value determines collaboration encryption according to preset contract
Signing side, intelligent contract requesting party, contract signing side respectively correspond a permission parameter value, intelligent contract requesting party and one or
The sum of corresponding permission parameter value in multiple contract signing sides generates reliability index value not less than preset contract;
Generate the transaction certificate block more new information of transaction certificate;The transaction certificate block more new information is based on intelligent contract
What the private key of requesting party obtained after encrypting to the block data information of original transaction certificate;The area of the original transaction certificate
Block data information includes:Intelligent contract requesting party ID, contract signing side chained list or the public key of contract signing side;
Transaction certificate block more new information to contract signing side requesting cooperative is sent to encrypt;Receive the encryption from contract signing side
Confirmation message;The update of transaction certificate block data is carried out according to encrypted acknowledgment information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810893438.5A CN108876381A (en) | 2018-08-07 | 2018-08-07 | Method for secure transactions based on intelligent contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810893438.5A CN108876381A (en) | 2018-08-07 | 2018-08-07 | Method for secure transactions based on intelligent contract |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108876381A true CN108876381A (en) | 2018-11-23 |
Family
ID=64317360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810893438.5A Pending CN108876381A (en) | 2018-08-07 | 2018-08-07 | Method for secure transactions based on intelligent contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108876381A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109191122A (en) * | 2018-08-10 | 2019-01-11 | 中国银行股份有限公司 | A kind of method and device obtaining Transaction Information voucher |
CN110032885A (en) * | 2019-02-19 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Method, node and the storage medium of secret protection are realized in block chain |
CN111080299A (en) * | 2019-12-27 | 2020-04-28 | 广州骏伯网络科技有限公司 | Anti-repudiation method for transaction information, client and server |
CN111538783A (en) * | 2020-04-20 | 2020-08-14 | 成都质数斯达克科技有限公司 | Intelligent contract execution constraint method, device, terminal and storage medium |
CN113837875A (en) * | 2020-06-22 | 2021-12-24 | 京东方科技集团股份有限公司 | Transaction method, node and medium based on blockchain network |
CN114548986A (en) * | 2022-01-27 | 2022-05-27 | 深圳金融电子结算中心有限公司 | Payment method, payment security code generation method, device, equipment and storage medium |
CN114663103A (en) * | 2020-12-05 | 2022-06-24 | 江苏方芯维信息科技有限公司 | Product supply chain tracing method and intelligent contract transaction method in system |
CN115796869A (en) * | 2022-11-24 | 2023-03-14 | 元疆(广州)供应链管理合伙企业(有限合伙) | Commodity data processing method and device based on intelligent digital contract |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105844505A (en) * | 2016-03-17 | 2016-08-10 | 深圳市新世纪启航科技开发有限公司 | Method of carrying out digital currency trading through block chain technology |
CN106559211A (en) * | 2016-11-22 | 2017-04-05 | 中国电子科技集团公司第三十研究所 | Secret protection intelligence contract method in a kind of block chain |
CN106960128A (en) * | 2017-04-01 | 2017-07-18 | 武汉康慧然信息技术咨询有限公司 | Intelligent medical data management method and system based on distributed verification technology |
-
2018
- 2018-08-07 CN CN201810893438.5A patent/CN108876381A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105844505A (en) * | 2016-03-17 | 2016-08-10 | 深圳市新世纪启航科技开发有限公司 | Method of carrying out digital currency trading through block chain technology |
CN106559211A (en) * | 2016-11-22 | 2017-04-05 | 中国电子科技集团公司第三十研究所 | Secret protection intelligence contract method in a kind of block chain |
CN106960128A (en) * | 2017-04-01 | 2017-07-18 | 武汉康慧然信息技术咨询有限公司 | Intelligent medical data management method and system based on distributed verification technology |
Non-Patent Citations (1)
Title |
---|
缪锦春: "《邵阳学院学报(社会科学版)》", 30 April 2017 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109191122A (en) * | 2018-08-10 | 2019-01-11 | 中国银行股份有限公司 | A kind of method and device obtaining Transaction Information voucher |
CN109191122B (en) * | 2018-08-10 | 2023-06-20 | 中国银行股份有限公司 | Method and device for acquiring transaction information certificate |
CN110032885A (en) * | 2019-02-19 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Method, node and the storage medium of secret protection are realized in block chain |
CN111080299A (en) * | 2019-12-27 | 2020-04-28 | 广州骏伯网络科技有限公司 | Anti-repudiation method for transaction information, client and server |
CN111080299B (en) * | 2019-12-27 | 2020-12-15 | 广州骏伯网络科技有限公司 | Anti-repudiation method for transaction information, client and server |
CN111538783A (en) * | 2020-04-20 | 2020-08-14 | 成都质数斯达克科技有限公司 | Intelligent contract execution constraint method, device, terminal and storage medium |
CN113837875A (en) * | 2020-06-22 | 2021-12-24 | 京东方科技集团股份有限公司 | Transaction method, node and medium based on blockchain network |
CN114663103A (en) * | 2020-12-05 | 2022-06-24 | 江苏方芯维信息科技有限公司 | Product supply chain tracing method and intelligent contract transaction method in system |
CN114548986A (en) * | 2022-01-27 | 2022-05-27 | 深圳金融电子结算中心有限公司 | Payment method, payment security code generation method, device, equipment and storage medium |
CN115796869A (en) * | 2022-11-24 | 2023-03-14 | 元疆(广州)供应链管理合伙企业(有限合伙) | Commodity data processing method and device based on intelligent digital contract |
CN115796869B (en) * | 2022-11-24 | 2024-01-19 | 元疆(广州)供应链管理合伙企业(有限合伙) | Commodity data processing method and device based on intelligent digital contract |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109146479A (en) | Data ciphering method based on block chain | |
CN109377198B (en) | Signing system based on multi-party consensus of alliance chain | |
CN108876381A (en) | Method for secure transactions based on intelligent contract | |
US10848315B2 (en) | Contract agreement method, agreement verification method, contract agreement system, agreement verification device, contract agreement device, contract agreement program and agreement verification program | |
CN113065961B (en) | Power block chain data management system | |
CN114329529B (en) | Asset data management method and system based on blockchain | |
KR102383099B1 (en) | The non-face-to-face large document access blockchain system that combines blockchain-based DID service and IPFS-based data sharing technology and private key distributed storage technology | |
KR102307574B1 (en) | Cloud data storage system based on blockchain and method for storing in cloud | |
US7937584B2 (en) | Method and system for key certification | |
CN113411384A (en) | System and method for privacy protection in data security sharing process of Internet of things | |
CN110046521A (en) | Decentralization method for secret protection | |
CN110462621A (en) | Sensitive data element is managed in block chain network | |
KR20190012969A (en) | Data access management system based on blockchain and method thereof | |
CN111324881B (en) | Data security sharing system and method fusing Kerberos authentication server and block chain | |
US20240187259A1 (en) | Method and apparatus for generating, providing and distributing a trusted electronic record or certificate based on an electronic document relating to a user | |
El-Hajj et al. | Ethereum for secure authentication of iot using pre-shared keys (psks) | |
CN111444492A (en) | Digital identity verification method based on medical block chain | |
Cha et al. | A blockchain-based privacy preserving ticketing service | |
CN113706261A (en) | Block chain-based power transaction method, device and system | |
CN117081803A (en) | Internet of things ciphertext access control method based on blockchain | |
CN109829722A (en) | A kind of user identity real name identification method of electronic fare payment system | |
CN112565294A (en) | Identity authentication method based on block chain electronic signature | |
CN115567312A (en) | Alliance chain data authority management system and method capable of meeting multiple scenes | |
CN109146684A (en) | Decentralization transaction verification method | |
CN113268722B (en) | Personal digital identity management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |