CN114500069A - Method and system for storing and sharing electronic contract - Google Patents
Method and system for storing and sharing electronic contract Download PDFInfo
- Publication number
- CN114500069A CN114500069A CN202210123470.1A CN202210123470A CN114500069A CN 114500069 A CN114500069 A CN 114500069A CN 202210123470 A CN202210123470 A CN 202210123470A CN 114500069 A CN114500069 A CN 114500069A
- Authority
- CN
- China
- Prior art keywords
- electronic contract
- access
- contract
- electronic
- public
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Technology Law (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for storing and sharing electronic contracts; according to the invention, a signing terminal sets an access control rule for an electronic contract according to a user request; a signing end generates a public and private key pair, encrypts an electronic contract through the public and private key pair and uploads the electronic contract to a block chain network; the signing end receives an access request which is sent by the access end and contains the public key of the access end and identity information, judges whether the identity information accords with an access control rule, generates a re-encryption key according to the public key of the access end and a self public and private key if the identity information accords with the access control rule, and sends the re-encryption key to an agent intelligent contract of the block chain network end; according to the re-encryption key, the agent intelligent contract of the block chain network end re-encrypts the electronic contract and returns the electronic contract to the access end, and the access end decrypts the electronic contract according to the private key of the access end to obtain the electronic contract; the access control to the electronic contract is better and automatically realized, the electronic contract is encrypted and transmitted all the time, and the safety is higher.
Description
Technical Field
The invention relates to the technical field of electronic contracts, in particular to a method and a system for storing and sharing electronic contracts.
Background
In the era of high degree of informatization today, privacy of data is becoming of particular importance. However, most centralized storage adopted by electronic contracts is vulnerable to attack, content is subject to tampering and the like; and the signing party of the electronic contract does not have the dominant right and cannot know that the electronic contract can be viewed by those.
The concept of blockchains was first proposed by a scholarly named the middle minder in a paper published by him on bitcoin. The distributed account book is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, is cryptographically guaranteed to be non-falsifiable and non-counterfeitable, and has the characteristics of decentralization, non-falsification, data traceability and the like. Therefore, an effective solution to the above problems is provided by means of the block chain technology.
However, the existing storage scheme related to the electronic contract lacks an access control strategy, and cannot perform fine-grained access control on the electronic contract uploaded to the block chain. Authentication and approval of the visitor is required to be performed down-link, and there are ambiguity and security issues.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the system for storing and sharing the electronic contract are provided, the access control of the electronic contract is better realized, and the security is higher.
In order to solve the technical problems, the invention adopts the technical scheme that:
a method for storing and sharing electronic contracts comprises the following steps:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a system for storing and sharing electronic contracts, comprising a signing end and a blockchain network end, wherein the signing end comprises a first processor, a first memory and a first computer program stored in the first memory and operable on the first processor, the blockchain network end comprises a second processor, a second memory and a second computer program stored in the second memory and operable on the second processor, and the first processor implements the following steps when executing the first computer program:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
The invention has the beneficial effects that: the invention carries out encryption storage on the electronic contract, and can carry out verification on the identity of the access terminal by configuring the access control rule, thereby better and automatically realizing the access control on the electronic contract, the agent intelligent contract is constructed in the block chain network, the electronic contract is re-encrypted by the agent intelligent contract only after the verification is passed, the electronic contract can be obtained only by the access terminal passing the identity verification while the decentralization is ensured, and the electronic contract is always encrypted and transmitted, thereby having higher safety.
Drawings
FIG. 1 is a flow chart of a method for storing and sharing electronic contracts according to an embodiment of the present invention;
FIG. 2 is a block diagram of a system for electronic contract storage and sharing according to an embodiment of the present invention;
fig. 3 is a schematic data flow diagram of a method for storing and sharing electronic contracts according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating an embodiment of a method for storing and sharing electronic contracts;
description of reference numerals:
1. a system for storing and sharing electronic contracts; 2. signing end; 3. a first processor; 4. a first memory; 5. a block chain network end; 6. a second processor; 7. a second memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Intelligent contract: a smart contract, chainocode, also known as chain code, is a piece of program code deployed on a blockchain. The intelligent contract is a core part of a block chain, the promissory commitment is digitalized according to business logic, and once a preset condition is triggered, the intelligent contract can be automatically executed accurately, so that human errors or falsification are avoided.
Proxy re-encryption: in proxy re-encryption, the data visitor Bob sends an access request to the data owner Alice and sends its own public key. And Alice generates an agent re-encryption key by the private key of Alice and the public key of Bob, and sends the agent re-encryption key and the ciphertext to the semi-trusted agent. And the semi-trusted agent performs re-encryption operation and sends the generated re-encrypted ciphertext to the visitor. The visitor can decrypt the ciphertext by using the private key of the visitor, and therefore data sharing is achieved under the condition that the agent does not know the plaintext.
Referring to fig. 1, fig. 3 and fig. 4, a method for storing and sharing an electronic contract includes the steps of:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
From the above description, the beneficial effects of the present invention are: the invention carries out encryption storage on the electronic contract, and can carry out verification on the identity of the access terminal by configuring the access control rule, thereby better and automatically realizing the access control on the electronic contract, the agent intelligent contract is constructed in the block chain network, the electronic contract is re-encrypted by the agent intelligent contract only after the verification is passed, the electronic contract can be obtained only by the access terminal passing the identity verification while the decentralization is ensured, and the electronic contract is always encrypted and transmitted, thereby having higher safety.
Further, the step S1 is specifically:
the signing end sets an access control rule for the electronic contract according to a user request and calculates a first hash value of the electronic contract;
the step S2 specifically includes:
a signing end generates a public and private key pair, encrypts the electronic contract through the public and private key pair, and uploads the encrypted electronic contract and the first hash value to a block chain network;
the step S4 is followed by the step of:
s5, the check intelligent contract of the blockchain network end receives the electronic contract check request sent by the access end, checks the electronic contract according to the first hash value, and returns the check result to the access end.
As can be seen from the above description, the signing end also calculates the hash value of the electronic contract and uploads the hash value to the blockchain network, and if the access end has a doubt about the authenticity of the contract after acquiring the electronic contract, the access end can send a verification request to the blockchain network, and the blockchain network verifies the authenticity of the contract according to the first hash value.
Further, the step S5 is specifically:
and the verification intelligent contract of the block chain network end receives an electronic contract verification request of the access end containing a second hash value, compares and verifies the first hash value and the second hash value, and returns a verification result to the access end, wherein the second hash value is obtained by performing hash calculation on the electronic contract by the access end.
According to the description, if the access terminal doubts the authenticity of the electronic contract, the hash value of the electronic contract is calculated, the hash value and the verification request are sent to the blockchain network together, and the block chain network verifies the authenticity and effectiveness of the contract through hash value comparison, so that the method is faster and more accurate.
Further, the identity information of the access terminal includes name, gender and company.
According to the description, the identity information of the access terminal comprises the name, the gender and the company, so that the identity of the user at the access terminal can be effectively identified.
Referring to fig. 2, a system for storing and sharing an electronic contract includes a signing end and a blockchain network end, where the signing end includes a first processor, a first memory, and a first computer program stored in the first memory and executable on the first processor, the blockchain network end includes a second processor, a second memory, and a second computer program stored in the second memory and executable on the second processor, and the first processor implements the following steps when executing the first computer program:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
From the above description, the beneficial effects of the present invention are: the invention carries out encryption storage on the electronic contract, and can carry out verification on the identity of the access terminal by configuring the access control rule, thereby better and automatically realizing the access control on the electronic contract, the agent intelligent contract is constructed in the block chain network, the electronic contract is re-encrypted by the agent intelligent contract only after the verification is passed, the electronic contract can be obtained only by the access terminal passing the identity verification while the decentralization is ensured, and the electronic contract is always encrypted and transmitted, thereby having higher safety.
Further, when the first processor executes the first computer program, the step S1 specifically includes:
setting an access control rule for the electronic contract according to a user request, and calculating a first hash value of the electronic contract;
the step S2 specifically includes:
generating a public and private key pair, encrypting the electronic contract through the public and private key pair, and uploading the encrypted electronic contract and the first hash value to a block chain network;
the second processor executing the second computer program further comprises, after the step S4, the steps of:
and S5, receiving the electronic contract verification request sent by the access terminal by the verification intelligent contract, verifying the electronic contract according to the first hash value, and returning the verification result to the access terminal.
As can be seen from the above description, the signing end further calculates the hash value of the electronic contract and uploads the hash value to the blockchain network, and if the access end doubts the authenticity of the electronic contract after acquiring the electronic contract, the access end may send a verification request to the blockchain network, and the blockchain network verifies the authenticity of the contract according to the first hash value.
Further, when the second processor executes the second computer program, the step S5 specifically includes:
and the verification intelligent contract receives an electronic contract verification request containing a second hash value at the access terminal, compares and verifies the first hash value and the second hash value, and returns a verification result to the access terminal, wherein the second hash value is obtained by performing hash calculation on the electronic contract at the access terminal.
According to the description, if the access terminal doubts the authenticity of the electronic contract, the hash value of the electronic contract is calculated, the hash value and the verification request are sent to the block chain network together, and the authenticity and effectiveness of the contract are verified through hash value comparison by the block chain network, so that the method is faster and more accurate.
Further, the identity information of the access terminal includes name, gender and company.
According to the description, the identity information of the access terminal comprises the name, the gender and the company, so that the identity of the user at the access terminal can be effectively identified.
The method and the system for storing and sharing the electronic contract are suitable for scenes that the electronic contract needs to be shared, and meanwhile, the confidentiality of the electronic contract and management and control on personnel accessing the electronic contract are guaranteed.
Referring to fig. 1, fig. 3 and fig. 4, a first embodiment of the present invention is:
in this embodiment, a blockchain environment is built based on the hyper-ridger Fabric, so that basic functional requirements of the electronic contract can be provided, and functions of chain loading and verification, chain inquiry, safe sharing, contract verification and the like of the electronic contract are realized. The program is divided into three functional modules according to functions:
(1) electronic contract cochain module
The signing party of the contract sets access control rules for the electronic contract according to the attributes, and only users meeting the set requirements can access the electronic contract. And then, randomly generating a symmetric key to encrypt the electronic contract and uploading the electronic contract ciphertext to a block chain network for chain loading and certificate storage, so that the electronic contract is guaranteed to be not falsifiable.
(2) Electronic contract sharing module
The intelligent contract of the block chain is combined with the agent re-encryption algorithm to realize safe sharing, and the role of the agent intelligent contract is constructed to realize the function of a semi-trusted agent in the traditional agent re-encryption process. The signing party of the contract generates a re-encryption key by using the public and private key pair of the signing party and the public key of the visitor, and then sends the re-encryption key to the agent intelligent contract. And the agent intelligent contract is automatically triggered after receiving the re-encryption key, calls the electronic contract ciphertext uploaded to the block chain by the owner for re-encryption operation, and returns the re-encrypted ciphertext to the visitor.
(3) Checking and verifying module
After receiving the re-encrypted electronic contract ciphertext, the visitor can use the private key of the visitor to decrypt and obtain the electronic contract plaintext. Through the verification function of the system, whether the received electronic contract is consistent with the electronic contract stored on the block chain or not can be verified, and the authenticity of the electronic contract is verified.
The three functional modules jointly realize a method for storing and sharing the electronic contract, which comprises the following steps:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
the step S1 specifically includes:
and the signing terminal sets an access control rule for the electronic contract according to the user request and calculates a first hash value of the electronic contract.
In this embodiment, each user in the system has its own attributes, such as name, gender, company, etc. And the signing end of the electronic contract sets an access control rule for the electronic contract according to the attribute information, and then performs hash operation on the electronic contract to obtain a hash value of the contract.
S2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
the step S2 specifically includes:
and generating a public and private key pair, encrypting the electronic contract through the public and private key pair, and uploading the encrypted electronic contract and the first hash value to a block chain network.
In this embodiment, the signing end of the electronic contract randomly generates a symmetric key k to encrypt the electronic contract to obtain an electronic contract ciphertext, and finally uploads the hash value and the electronic contract ciphertext to the block chain network. The symmetric key includes a private key and a public key.
S3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and the self public and private key, and sends the re-encryption key to the agent intelligent contract of the block chain network terminal.
In this embodiment, if the access terminal wants to access the electronic contract, the access terminal needs to apply for accessing the electronic contract to the signing terminal of the electronic contract. And judging whether the access control strategy is met by the signing end, if the access control strategy is met, generating a re-encryption key for the visitor by using the public and private key pair of the signing end and the public key of the visitor, and sending the re-encryption key to the agent intelligent contract.
And S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
In this embodiment, the agent intelligent contract in the block chain network is automatically triggered after receiving the re-encryption key, and according to the re-encryption key, the electronic contract ciphertext uploaded to the block chain by the signing terminal is called to perform re-encryption operation, so as to generate a re-encrypted ciphertext, and the re-encrypted ciphertext is returned to the access terminal. And after the access terminal receives the re-encrypted ciphertext, the electronic contract ciphertext can be decrypted by using the private key of the access terminal, the plaintext information of the electronic contract is obtained, and the sharing process of the electronic contract is finished.
In the conventional proxy re-encryption process, a semi-trusted proxy role is required, and this requirement is contradictory to the decentralized nature of the blockchain. Therefore, the sending text is combined with the intelligent contract to construct an agent intelligent contract, and the safe sharing of data can be realized in a decentralized mode.
The step S4 is followed by the step of:
s5, receiving an electronic contract verification request sent by the access terminal by the verification intelligent contract, verifying the electronic contract according to the first hash value, and returning a verification result to the access terminal;
the step S5 specifically includes:
and the verification intelligent contract of the block chain network end receives an electronic contract verification request of the access end containing a second hash value, compares and verifies the first hash value and the second hash value, and returns a verification result to the access end, wherein the second hash value is obtained by performing hash calculation on the electronic contract by the access end.
In this embodiment, if the access terminal suspects the decrypted electronic contract, the hash operation may be performed on the plaintext of the electronic contract to obtain a hash value, and the authenticity of the electronic contract is verified by verifying that the intelligent contract is compared with the hash value stored in the block chain.
Referring to fig. 2, the second embodiment of the present invention is:
referring to fig. 2, a system for storing and sharing electronic contracts includes a signing peer 2 and a blockchain network peer 5, where the signing peer 2 includes a first processor 3, a first memory 4 and a first computer program stored in the first memory 4 and operable on the first processor 3, the blockchain network peer 5 includes a second processor 6, a second memory 7 and a second computer program stored in the second memory 7 and operable on the second processor 6, the first processor 2 implements the steps performed by the signing peer 2 according to the above embodiment when executing the first computer program, and the second processor 6 implements the steps performed by the blockchain network peer 5 according to the above embodiment when executing the second computer program.
The main principle of the method and the system for storing and sharing the electronic contract is that the access sharing of the electronic contract is realized by utilizing the block chain, and meanwhile, the electronic contract is ensured not to be modified or leaked and the access of the electronic contract is controlled by combining the access control rule, the proxy re-encryption and the intelligent contract.
In summary, according to the method and system for storing and sharing an electronic contract provided by the present invention, the electronic contract is stored in an encrypted manner, and the identity of the access terminal can be verified by configuring the access control rule, so that the access control of the electronic contract is better and automatically realized.
The above description is only an embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent modifications made by the present invention and the contents of the accompanying drawings, which are directly or indirectly applied to the related technical fields, are included in the scope of the present invention.
Claims (8)
1. A method for storing and sharing electronic contracts is characterized by comprising the following steps:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
2. The method for storing and sharing electronic contracts according to claim 1, wherein the step S1 specifically comprises:
the signing end sets an access control rule for the electronic contract according to a user request and calculates a first hash value of the electronic contract;
the step S2 specifically includes:
a signing end generates a public and private key pair, encrypts the electronic contract through the public and private key pair, and uploads the encrypted electronic contract and the first hash value to a block chain network;
the step S4 is followed by the step of:
s5, the check intelligent contract of the blockchain network end receives the electronic contract check request sent by the access end, checks the electronic contract according to the first hash value, and returns the check result to the access end.
3. The method for storing and sharing electronic contracts according to claim 2, wherein the step S5 specifically comprises:
and the verification intelligent contract of the block chain network end receives an electronic contract verification request of the access end containing a second hash value, compares and verifies the first hash value and the second hash value, and returns a verification result to the access end, wherein the second hash value is obtained by performing hash calculation on the electronic contract by the access end.
4. The method for storing and sharing electronic contracts according to claim 1, wherein the identity information of the access terminal comprises name, gender and company.
5. A system for storing and sharing electronic contracts, comprising a signing end and a blockchain network end, wherein the signing end comprises a first processor, a first memory and a first computer program stored in the first memory and executable on the first processor, and the blockchain network end comprises a second processor, a second memory and a second computer program stored in the second memory and executable on the second processor, and wherein the first processor implements the following steps when executing the first computer program:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
6. The system according to claim 5, wherein the step S1 when the first processor executes the first computer program is specifically as follows:
setting an access control rule for the electronic contract according to a user request, and calculating a first hash value of the electronic contract;
the step S2 specifically includes:
generating a public and private key pair, encrypting the electronic contract through the public and private key pair, and uploading the encrypted electronic contract and the first hash value to a block chain network;
the second processor executing the second computer program further comprises, after the step S4, the steps of:
and S5, receiving the electronic contract verification request sent by the access terminal by the verification intelligent contract, verifying the electronic contract according to the first hash value, and returning the verification result to the access terminal.
7. The system according to claim 6, wherein the step S5 when the second processor executes the second computer program is specifically:
and the verification intelligent contract receives an electronic contract verification request containing a second hash value at the access terminal, compares and verifies the first hash value and the second hash value, and returns a verification result to the access terminal, wherein the second hash value is obtained by performing hash calculation on the electronic contract at the access terminal.
8. The system for storing and sharing electronic contracts according to claim 5, wherein the identity information of the access terminal comprises name, gender and company.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210123470.1A CN114500069A (en) | 2022-02-10 | 2022-02-10 | Method and system for storing and sharing electronic contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210123470.1A CN114500069A (en) | 2022-02-10 | 2022-02-10 | Method and system for storing and sharing electronic contract |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114500069A true CN114500069A (en) | 2022-05-13 |
Family
ID=81477843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210123470.1A Pending CN114500069A (en) | 2022-02-10 | 2022-02-10 | Method and system for storing and sharing electronic contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114500069A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115033645A (en) * | 2022-07-06 | 2022-09-09 | 贵州电网有限责任公司 | Electric power data storage method and system based on block chain technology |
CN115085934A (en) * | 2022-06-14 | 2022-09-20 | 润联软件系统(深圳)有限公司 | Contract management method based on block chain and combined key and related equipment |
CN117009933A (en) * | 2023-06-25 | 2023-11-07 | 上海朗晖慧科技术有限公司 | Information security approval monitoring system and method based on Internet of things |
CN117574414A (en) * | 2024-01-16 | 2024-02-20 | 支付宝(杭州)信息技术有限公司 | Electronic contract signing processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109120639A (en) * | 2018-09-26 | 2019-01-01 | 众安信息技术服务有限公司 | A kind of data cloud storage encryption method and system based on block chain |
CN111541678A (en) * | 2020-04-17 | 2020-08-14 | 上海朝夕网络技术有限公司 | Block chain-based proxy re-encryption method, system and storage medium |
CN112861157A (en) * | 2021-03-01 | 2021-05-28 | 北京欧凯联创网络科技有限公司 | Data sharing method based on decentralized identity and proxy re-encryption |
CN113556363A (en) * | 2021-09-18 | 2021-10-26 | 中国人民解放军国防科技大学 | Data sharing method and system based on decentralized and distributed proxy re-encryption |
-
2022
- 2022-02-10 CN CN202210123470.1A patent/CN114500069A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109120639A (en) * | 2018-09-26 | 2019-01-01 | 众安信息技术服务有限公司 | A kind of data cloud storage encryption method and system based on block chain |
CN111541678A (en) * | 2020-04-17 | 2020-08-14 | 上海朝夕网络技术有限公司 | Block chain-based proxy re-encryption method, system and storage medium |
CN112861157A (en) * | 2021-03-01 | 2021-05-28 | 北京欧凯联创网络科技有限公司 | Data sharing method based on decentralized identity and proxy re-encryption |
CN113556363A (en) * | 2021-09-18 | 2021-10-26 | 中国人民解放军国防科技大学 | Data sharing method and system based on decentralized and distributed proxy re-encryption |
Non-Patent Citations (2)
Title |
---|
ZHAO H, ZHU Z, PAN C, ET AL: "A New Electronic Contract System Model Based on Blockchain", INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, 1 January 2022 (2022-01-01), pages 1 - 11 * |
张勇: "基于区块链技术的数字版权隐私性研究", 信息与电脑, no. 3, 15 February 2019 (2019-02-15), pages 1 - 2 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115085934A (en) * | 2022-06-14 | 2022-09-20 | 润联软件系统(深圳)有限公司 | Contract management method based on block chain and combined key and related equipment |
CN115033645A (en) * | 2022-07-06 | 2022-09-09 | 贵州电网有限责任公司 | Electric power data storage method and system based on block chain technology |
CN115033645B (en) * | 2022-07-06 | 2023-11-21 | 贵州电网有限责任公司 | Power data storage method and system based on block chain technology |
CN117009933A (en) * | 2023-06-25 | 2023-11-07 | 上海朗晖慧科技术有限公司 | Information security approval monitoring system and method based on Internet of things |
CN117009933B (en) * | 2023-06-25 | 2024-03-29 | 上海朗晖慧科技术有限公司 | Information security approval monitoring system and method based on Internet of things |
CN117574414A (en) * | 2024-01-16 | 2024-02-20 | 支付宝(杭州)信息技术有限公司 | Electronic contract signing processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111191286B (en) | Hyperledger Fabric blockchain privacy data storage and access system and method | |
CN110417750B (en) | Block chain technology-based file reading and storing method, terminal device and storage medium | |
JP5562687B2 (en) | Securing communications sent by a first user to a second user | |
CN112836229A (en) | A trusted data access control scheme combining attribute-based encryption and blockchain | |
CN109067528B (en) | Password operation method, work key creation method, password service platform and equipment | |
US20210218720A1 (en) | Systems and methods for secure custodial service | |
CN112825520B (en) | User privacy data processing method, device, system and storage medium | |
CN114500069A (en) | Method and system for storing and sharing electronic contract | |
US20220014367A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
CN115296838B (en) | Block chain-based data sharing method, system and storage medium | |
CN111917711B (en) | Data access method and device, computer equipment and storage medium | |
JP2023500570A (en) | Digital signature generation using cold wallet | |
CN110445840B (en) | File storage and reading method based on block chain technology | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN104158827A (en) | Cryptograph data sharing method and device, inquiring server and data uploading client terminal | |
CN106059760A (en) | Cipher system for calling system private key from user side cipher module | |
CN112651049B (en) | Privacy data sharing method and system based on block chain | |
CN113328860A (en) | Block chain-based user privacy data security providing method | |
CN113726772A (en) | Method, device, equipment and storage medium for realizing on-line inquiry session | |
CN110401535B (en) | Digital certificate generation, secure communication and identity authentication method and device | |
Luo et al. | Accountable data sharing scheme based on blockchain and SGX | |
CN110086627B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp | |
CN114662073B (en) | Verification method and device for LED system, computer equipment and medium | |
US20240193255A1 (en) | Systems and methods of protecting secrets in use with containerized applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |