CN110225056A - A kind of evaluation data cochain method and its equipment for applying intelligent contract - Google Patents
A kind of evaluation data cochain method and its equipment for applying intelligent contract Download PDFInfo
- Publication number
- CN110225056A CN110225056A CN201910547125.9A CN201910547125A CN110225056A CN 110225056 A CN110225056 A CN 110225056A CN 201910547125 A CN201910547125 A CN 201910547125A CN 110225056 A CN110225056 A CN 110225056A
- Authority
- CN
- China
- Prior art keywords
- client
- evaluation data
- evaluation
- public key
- intelligent contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 237
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 claims abstract description 61
- 230000004044 response Effects 0.000 claims abstract description 31
- 230000008569 process Effects 0.000 claims abstract description 22
- 238000012545 processing Methods 0.000 claims description 12
- 238000004804 winding Methods 0.000 claims description 3
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of evaluation data cochain methods and its equipment for applying intelligent contract, which comprises block chain node receives the evaluation data cochain request that the first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client;Receive the inquiry request of the evaluation data of the second client;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;After verification passes through, the evaluation data inquiry request is sent to first client, including the second client public key in the evaluation data inquiry request;Receive the evaluation data query response that first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and after verification passes through, the evaluation data of second client public key encryption are executed cochain process.The application can will evaluate data cochain, disclose credible.
Description
Technical Field
The application relates to the technical field of block chains, in particular to a data chaining evaluation method and equipment applying an intelligent contract.
Background
At present, a block chain technology is based on a decentralized peer-to-peer network, and open source software is used for combining a cryptography principle, time sequence data and a consensus mechanism to ensure the consistency and the persistence of each node in a distributed database, so that information can be immediately verified and traceable, but is difficult to tamper and cannot be shielded, and a set of private, efficient and safe shared value system is created.
The existing evaluation platform adopts a centralized database, and stores the evaluation times of commodities, evaluation time, mobile phones used by users for evaluation and the like; however, the database of the evaluation platform has problems that data is tampered, authenticity of the data cannot be guaranteed, the evaluation frequency of a certain commodity is modified by the evaluation operation platform, poor evaluation of a user is deleted, and the like. Especially for some small-scale evaluation platforms, the data security and authenticity of the goods cannot be guaranteed: the evaluation content of the goods or the services is not real, which can cause misleading to the user and influence the experience of the user.
Therefore, how to store the data of the evaluation platform on the blockchain in a reliable manner based on the non-tampering of the blockchain becomes a problem to be solved urgently.
The above is only for the purpose of assisting understanding of the technical solutions of the present application, and does not represent an admission that the above is prior art.
Disclosure of Invention
In order to solve the above problems, the present application provides an evaluation data chaining method and an apparatus thereof applying an intelligent contract, which enable the evaluated data to be chained, so that the evaluation data on the chain is credible and is publicly transparent.
A first aspect of the present application provides a method for evaluating data uplink by applying an intelligent contract, where the method includes:
a block chain node receives an evaluation data uplink request sent by a first client, wherein the evaluation data uplink request comprises evaluation data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the evaluation data after the verification is passed;
the block chain node receives a query request of the evaluation data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain node sends the evaluation data query request to the first client, wherein the evaluation data query request comprises a second client public key, so that the first client encrypts the evaluation data by using the second client public key;
the block chain node receives an evaluation data query response sent by the first client, wherein the evaluation data query response comprises evaluation data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process on the evaluation data encrypted by the public key of the second client after the verification is passed.
In one possible implementation, the method further includes: the block chain node receives an evaluation data query request sent by the second client;
and the block chain nodes send evaluation data query responses to the second client, wherein the evaluation data query responses comprise evaluation data encrypted by the public key of the second client, so that the second client can decrypt the evaluation data encrypted by the public key of the second client by using a private key of the second client.
In a possible implementation manner, the evaluation data is operation data of a user corresponding to the first client on an evaluation platform, and includes evaluation times, evaluation time, comment content, and evaluation type.
In a possible implementation manner, the first client encrypts the evaluation data by using its own public key, specifically: and the first client encrypts the evaluation data by using a self public key in a preset proportion.
In one possible implementation, the evaluation data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the attribute associated with the evaluation data.
A second aspect of the present application provides an evaluation data uplink device applying an intelligent contract, where the device is a block chain node, and the device includes a receiving unit, a processing unit, and a sending unit; wherein,
the receiving unit receives an evaluation data uplink request sent by a first client, wherein the evaluation data uplink request comprises evaluation data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the evaluation data is executed;
the receiving unit is used for receiving a query request of the evaluation data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the evaluation data query request to the first client, wherein the evaluation data query request comprises a second client public key, so that the first client encrypts the evaluation data by using the second client public key;
the receiving unit is used for receiving an evaluation data query response sent by the first client, wherein the evaluation data query response comprises evaluation data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the evaluation data encrypted by the public key of the second client is subjected to uplink process execution.
In a possible implementation manner, the receiving unit receives an evaluation data query request sent by the second client; the sending unit sends an evaluation data query response to the second client, wherein the evaluation data query response comprises evaluation data encrypted by the public key of the second client, so that the second client can decrypt the evaluation data encrypted by the public key of the second client by using a private key of the second client.
In a possible implementation manner, the evaluation data is operation data of a user corresponding to the first client on an evaluation platform, and includes evaluation times, evaluation time, comment content, and evaluation type.
In a possible implementation manner, the first client encrypts the evaluation data by using its own public key, specifically: and the first client encrypts the evaluation data by using a self public key in a preset proportion.
In one possible implementation, the evaluation data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the attribute associated with the evaluation data.
According to the method and the device, the evaluated data can be linked up, so that the evaluated data on the chain can be credible, the chain is public and transparent, and the user experience is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
Fig. 1 is a schematic flow chart of a method for evaluating data uplink by applying an intelligent contract according to an embodiment of the present application;
fig. 2 is a schematic flow chart of another method for evaluating data uplink by applying an intelligent contract according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an evaluation data uplink apparatus applying an intelligent contract according to an embodiment of the present application.
Detailed Description
In order to more clearly explain the overall concept of the present application, the following detailed description is given by way of example in conjunction with the accompanying drawings.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the order of such use may be interchanged under appropriate circumstances such that embodiments of the invention described herein may be practiced in other orders than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The block link point and the client referred to in the embodiment of the application may be understood as an abstract machine that responds to an external specific trigger condition and performs state conversion according to a certain rule, and may be a device that can be networked according to application software, such as a mobile phone, a tablet computer, a palm computer, a personal PC, and the like.
As shown in fig. 1, a method for evaluating data uplink by applying an intelligent contract includes steps S101-S107.
S101, a block link point receives an evaluation data uplink request sent by a first client, wherein the evaluation data uplink request comprises evaluation data encrypted by a public key of the first client.
And S102, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the evaluation data after the verification is passed.
S103, the block chain node receives a query request of the evaluation data of the second client.
And S104, triggering a verification intelligent contract, and verifying the identity of the second client by the verification intelligent contract.
And S105, after the verification is passed, the block chain node sends the evaluation data query request to the first client, wherein the evaluation data query request comprises a second client public key, so that the first client encrypts the evaluation data by using the second client public key.
And S106, the block chain node receives an evaluation data query response sent by the first client, wherein the evaluation data query response comprises the evaluation data encrypted by the public key of the second client.
And S107, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the evaluation data encrypted by the public key of the second client after the verification is passed.
In one example, the method further comprises: the block chain node receives an evaluation data query request sent by the second client; and the block chain nodes send evaluation data query responses to the second client, wherein the evaluation data query responses comprise evaluation data encrypted by the public key of the second client, so that the second client can decrypt the evaluation data encrypted by the public key of the second client by using a private key of the second client.
In an example, the evaluation data is operation data of a user corresponding to the first client on an evaluation platform, and includes evaluation times, evaluation time, comment content, and evaluation type.
In one example, the first client encrypts the evaluation data with its own public key, specifically: and the first client encrypts the evaluation data by using a self public key in a preset proportion.
In one example, the ratings data includes associated attributes and non-associated attributes; and automatically superposing the attribute values of the attribute associated with the evaluation data.
In the above example, the first client is used as an operator of the evaluation data, and the second client is used as an inquirer of the evaluation data; for a particular evaluation platform, each user may be an operator of the evaluation data or an inquirer of the evaluation data.
The above-mentioned method for evaluating data uplink is described below with reference to fig. 2, and the method includes steps S201 to S214.
S201, the first client encrypts evaluation data generated by the first client by using a public key, wherein the evaluation operation data comprises data generated by user operation behaviors such as evaluation times, evaluation time, an IP address of a user, an account password of the user and the like of the user on an evaluation platform.
The first client encrypts evaluation data generated by the first client by using a public key of the first client, wherein the encryption can be performed by encrypting all fields of the evaluation data or encrypting partial fields of the evaluation data, such as: only private comment content is encrypted; the user may not encrypt the evaluation data.
Further, the evaluation data includes attributes classified into two types, an associated attribute and a non-associated attribute. For example: user evaluation time belongs to non-associated attributes, and the evaluation time of each user can be stored in a block chain; for example: the number of user evaluations is the correlation attribute, the data format of a commodity comprises the evaluation number, and the evaluation number of the commodity can be automatically superposed as long as a user evaluates the commodity.
The evaluation types comprise commodity evaluation, personal preference evaluation, clothes evaluation and the like; for example: the method comprises the following steps of evaluating individual preference of seasons, evaluating matching preference of clothes, evaluating style preference of clothes, evaluating hair style preference and the like.
S202, the first ue sends an evaluation data uplink request to the blockchain node.
And S203, triggering a checking intelligent contract on the block chain, checking the identity of the first client by the checking intelligent contract, and executing the uplink process of the evaluation data.
The checking is to determine whether the first ue is a user of the evaluation platform, and only the user of the evaluation platform has permission to uplink the evaluation data.
It should be noted that the uplink process is a conventional process in the art and will not be described in detail. For example: and under the workload certification PoW common mode, packaging and verifying the data, wherein the block link point of the account right can place the packaged block in the next block of the current block as a new block uplink.
S204, the block node sends an evaluation data uplink response to the first client.
S205, the second client sends an evaluation data query request to the block chain node, wherein the evaluation data query request comprises the public key of the second client.
In this case, the user corresponding to the second client may query the evaluation data after seeing the evaluation data. In the application, the first client and the second client are both terminal devices provided with decentralized application software, and can directly perform information interaction with the blockchain nodes on the blockchain.
And S206, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the second client.
After the verification is passed, executing the next flow; the check fails and the process terminates.
And S207, after the verification is passed, the block link node sends an evaluation data query request to the first client, wherein the evaluation data query request comprises a public key of the second client.
And S208, the first client encrypts the evaluation data by using the second client public key.
S209, the first client sends an evaluation data query response to the blockchain node, where the evaluation data query response includes the evaluation data encrypted by the public key of the second client.
S210, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the first client and executes the uplink process on the evaluation data encrypted by the public key of the second client.
S211, the block node sends an evaluation data query response to the second client.
S212, the second client sends an evaluation data query request to the block chain node.
S213, the block node sends the evaluation data query response to the second client, where the evaluation data query response includes the evaluation data encrypted by the public key of the second client.
And S214, the second client decrypts the evaluation data encrypted by the public key of the second client by using the private key of the second client to obtain the evaluation data.
According to the method and the device, the evaluated data can be linked up, the link up process is public and transparent, and any user of the same evaluation platform can check the evaluation data; the authenticity of the evaluation data is guaranteed. In addition, the user can encrypt or not encrypt the evaluation data according to the preference of the user, so that the user experience is improved.
It should be noted that, in the application, a client directly performs information interaction with a node of a block chain, and the block chain node directly stores information on the block chain without a centralized server, so that evaluation data is more open and credible; rather than the existing client interacting with a centralized server.
As shown in fig. 3, an apparatus for evaluating data uplink by applying an intelligent contract, where the apparatus is a blockchain node, and the apparatus includes a receiving unit, a processing unit, and a sending unit.
The receiving unit receives an evaluation data uplink request sent by a first client, wherein the evaluation data uplink request comprises evaluation data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the evaluation data is executed;
the receiving unit is used for receiving a query request of the evaluation data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the evaluation data query request to the first client, wherein the evaluation data query request comprises a second client public key, so that the first client encrypts the evaluation data by using the second client public key;
the receiving unit is used for receiving an evaluation data query response sent by the first client, wherein the evaluation data query response comprises evaluation data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the evaluation data encrypted by the public key of the second client is subjected to uplink process execution.
In one example, the receiving unit receives an evaluation data query request sent by the second client; the sending unit sends an evaluation data query response to the second client, wherein the evaluation data query response comprises evaluation data encrypted by the public key of the second client, so that the second client can decrypt the evaluation data encrypted by the public key of the second client by using a private key of the second client.
In an example, the evaluation data is operation data of a user corresponding to the first client on an evaluation platform, and includes evaluation times, evaluation time, comment content, and evaluation type.
In one example, the first client encrypts the evaluation data with its own public key, specifically: and the first client encrypts the evaluation data by using a self public key in a preset proportion.
In one example, the ratings data includes associated attributes and non-associated attributes; and automatically superposing the attribute values of the attribute associated with the evaluation data.
According to the method and the device, the evaluated data can be linked up, the link up process is public and transparent, and any user of the same evaluation platform can check the evaluation data; the authenticity of the evaluation data is guaranteed. In addition, the user can encrypt or not encrypt the evaluation data according to the preference of the user, so that the user experience is improved.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A method for evaluating data chaining using smart contracts, the method comprising:
a block chain node receives an evaluation data uplink request sent by a first client, wherein the evaluation data uplink request comprises evaluation data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the evaluation data after the verification is passed;
the block chain node receives a query request of the evaluation data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the block chain node sends the evaluation data query request to the first client, wherein the evaluation data query request comprises a second client public key, so that the first client encrypts the evaluation data by using the second client public key;
the block chain node receives an evaluation data query response sent by the first client, wherein the evaluation data query response comprises evaluation data encrypted by a public key of a second client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process on the evaluation data encrypted by the public key of the second client after the verification is passed.
2. The method of claim 1, further comprising:
the block chain node receives an evaluation data query request sent by the second client;
and the block chain nodes send evaluation data query responses to the second client, wherein the evaluation data query responses comprise evaluation data encrypted by the public key of the second client, so that the second client can decrypt the evaluation data encrypted by the public key of the second client by using a private key of the second client.
3. The method according to claim 1, wherein the evaluation data is operation data of a user corresponding to the first client on an evaluation platform, and includes evaluation times, evaluation time, comment content and evaluation types.
4. The method according to claim 1, wherein the first client encrypts the evaluation data with its own public key, specifically:
and the first client encrypts the evaluation data by using a self public key in a preset proportion.
5. The method of claim 1, wherein the evaluation data comprises an associated attribute and a non-associated attribute; wherein,
and automatically superposing the attribute values of the evaluation data association attributes.
6. An evaluation data uplink device applying an intelligent contract is characterized in that the device is a block chain node and comprises a receiving unit, a processing unit and a sending unit; wherein,
the receiving unit receives an evaluation data uplink request sent by a first client, wherein the evaluation data uplink request comprises evaluation data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, a chain winding process of the evaluation data is executed;
the receiving unit is used for receiving a query request of the evaluation data of a second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client;
after the verification is passed, the sending unit sends the evaluation data query request to the first client, wherein the evaluation data query request comprises a second client public key, so that the first client encrypts the evaluation data by using the second client public key;
the receiving unit is used for receiving an evaluation data query response sent by the first client, wherein the evaluation data query response comprises evaluation data encrypted by a public key of a second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the first client, and after the verification is passed, the evaluation data encrypted by the public key of the second client is subjected to uplink process execution.
7. The apparatus of claim 6,
the receiving unit is used for receiving an evaluation data query request sent by the second client;
the sending unit sends an evaluation data query response to the second client, wherein the evaluation data query response comprises evaluation data encrypted by the public key of the second client, so that the second client can decrypt the evaluation data encrypted by the public key of the second client by using a private key of the second client.
8. The device according to claim 6, wherein the evaluation data is operation data of a user corresponding to the first client on an evaluation platform, and includes evaluation times, evaluation time, comment content and evaluation types.
9. The device according to claim 6, wherein the first client encrypts the evaluation data with its own public key, specifically:
and the first client encrypts the evaluation data by using a self public key in a preset proportion.
10. The apparatus of claim 6, wherein the evaluation data comprises an associated attribute and a non-associated attribute; wherein,
and automatically superposing the attribute values of the evaluation data association attributes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547125.9A CN110225056A (en) | 2019-06-24 | 2019-06-24 | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547125.9A CN110225056A (en) | 2019-06-24 | 2019-06-24 | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110225056A true CN110225056A (en) | 2019-09-10 |
Family
ID=67814598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910547125.9A Pending CN110225056A (en) | 2019-06-24 | 2019-06-24 | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225056A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597841A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Application comment information processing method and device based on block chain network |
CN111310200A (en) * | 2020-01-20 | 2020-06-19 | 山东爱城市网信息技术有限公司 | Block chain-based optimization and prize fund management method, equipment and medium |
CN115567540A (en) * | 2022-09-28 | 2023-01-03 | 合肥工业大学 | Online learning evaluation method and system based on block chain technology |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160217532A1 (en) * | 2015-01-23 | 2016-07-28 | Sure, Inc. | Securing Claim Data via Block-Chains for a Peer to Peer Platform |
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
CN108765023A (en) * | 2018-06-01 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of commodity evaluation management method, system and equipment |
US20180349968A1 (en) * | 2017-06-02 | 2018-12-06 | Walmart Apollo, Llc | Systems and methods for product review management with distributed database |
CN109657450A (en) * | 2018-12-14 | 2019-04-19 | 泰康保险集团股份有限公司 | Method, apparatus, medium and the electronic equipment evaluated based on block chain |
CN109801108A (en) * | 2019-01-18 | 2019-05-24 | 杭州明至科技有限公司 | A kind of course evaluation sharing method based on block chain technology |
-
2019
- 2019-06-24 CN CN201910547125.9A patent/CN110225056A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160217532A1 (en) * | 2015-01-23 | 2016-07-28 | Sure, Inc. | Securing Claim Data via Block-Chains for a Peer to Peer Platform |
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
US20180349968A1 (en) * | 2017-06-02 | 2018-12-06 | Walmart Apollo, Llc | Systems and methods for product review management with distributed database |
CN108765023A (en) * | 2018-06-01 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of commodity evaluation management method, system and equipment |
CN109657450A (en) * | 2018-12-14 | 2019-04-19 | 泰康保险集团股份有限公司 | Method, apparatus, medium and the electronic equipment evaluated based on block chain |
CN109801108A (en) * | 2019-01-18 | 2019-05-24 | 杭州明至科技有限公司 | A kind of course evaluation sharing method based on block chain technology |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597841A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Application comment information processing method and device based on block chain network |
CN111310200A (en) * | 2020-01-20 | 2020-06-19 | 山东爱城市网信息技术有限公司 | Block chain-based optimization and prize fund management method, equipment and medium |
CN115567540A (en) * | 2022-09-28 | 2023-01-03 | 合肥工业大学 | Online learning evaluation method and system based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110232286B (en) | E-commerce data chaining method and equipment applying intelligent contracts | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN110225032B (en) | Business data transaction method and equipment | |
CN111488372A (en) | Data processing method, device and storage medium | |
CN110225056A (en) | A kind of evaluation data cochain method and its equipment for applying intelligent contract | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
CN110264206A (en) | A kind of electric quotient data cochain method and its equipment based on block chain | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN110247923A (en) | Number cochain method and its equipment are shaken based on block chain | |
CN110247921A (en) | A kind of polled data cochain method and its equipment for applying intelligent contract | |
CN110266699A (en) | Prize drawing data cochain method and its equipment applied to block chain | |
CN110263529A (en) | Number cochain method and its equipment are shaken using intelligent contract | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN110266698A (en) | Pass through the Knowledge Sharing data cochain method and its equipment of block chain | |
CN110263100A (en) | Using the shared economic data cochain method and its equipment of intelligent contract | |
CN110263562A (en) | A kind of evaluation data cochain method and its equipment based on block chain | |
CN110232287A (en) | Pass through the shared economic data cochain method and its equipment of block chain | |
CN110266695A (en) | Using the lottery data cochain method and its equipment of intelligent contract | |
CN110247920A (en) | Lottery data cochain method and its equipment based on block chain | |
CN110233852A (en) | Prize drawing data cochain method and its equipment based on block chain | |
CN110245512A (en) | Lottery data cochain method and its equipment applied to block chain | |
CN110210861A (en) | Data trade method and its equipment on block chain | |
CN110210975A (en) | Data trade method and its equipment on block chain | |
CN110266691A (en) | Credit data cochain method and its equipment based on block chain | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant after: Beijing ruice Technology Co., Ltd Address before: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190910 |
|
RJ01 | Rejection of invention patent application after publication |