CN109034796A - Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain - Google Patents
Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain Download PDFInfo
- Publication number
- CN109034796A CN109034796A CN201810618522.6A CN201810618522A CN109034796A CN 109034796 A CN109034796 A CN 109034796A CN 201810618522 A CN201810618522 A CN 201810618522A CN 109034796 A CN109034796 A CN 109034796A
- Authority
- CN
- China
- Prior art keywords
- transaction
- public key
- alliance
- chain
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 50
- 238000000034 method Methods 0.000 title claims abstract description 40
- 239000003999 initiator Substances 0.000 claims abstract description 66
- 230000001360 synchronised effect Effects 0.000 claims abstract description 16
- 230000008569 process Effects 0.000 claims description 12
- 230000001105 regulatory effect Effects 0.000 abstract description 7
- 238000012546 transfer Methods 0.000 description 36
- 238000010586 diagram Methods 0.000 description 4
- 230000009977 dual effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000000977 initiatory effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain, this method comprises: obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;The Transaction Information that initiator determines of trading on alliance's chain is encrypted using the encryption key of the encryption key centering, generates encrypting transactions data;The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, generates recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;Transaction is initiated on alliance's chain based on the transaction body.The present invention realizes the privacy that not only can guarantee transaction data, but also regulatory agency can be allowed effectively to supervise transaction.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of transaction monitoring and managing methods based on alliance's chain, electronics dress
It sets and readable storage medium storing program for executing.
Background technique
When being traded in the block chain of alliance's chain type, transaction data belongs to mutual between each tissue in alliance's chain
Confidential data, need to guarantee the privacy of transaction data, i.e., cannot allow the arbitrary node in block chain that can know transaction data
Content, meanwhile, for the transaction in block chain, regulatory agency need to know be specifically what is doing between enterprise according to transaction data
Whether illegal trading activity is being done between transaction, each organization.In the prior art, for the block chain of alliance's chain type
In transaction, not can be implemented simultaneously the privacy that not only can guarantee transaction data, but also that regulatory agency can be allowed to carry out transaction is effective
Supervision.
Summary of the invention
The purpose of the present invention is to provide a kind of transaction monitoring and managing method, electronic device and readable storage mediums based on alliance's chain
Matter, it is intended to realize the privacy that not only can guarantee transaction data, but also regulatory agency can be allowed effectively to supervise transaction.
To achieve the above object, the present invention provides a kind of electronic device, and the electronic device includes memory, processor,
The transaction supervisory systems based on alliance's chain that can be run on the processor is stored on the memory, it is described to be based on alliance
The transaction supervisory systems of chain realizes following steps when being executed by the processor:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
Using the encryption key centering encryption key to trade on alliance's chain the Transaction Information that determines of initiator into
Row encryption, generates encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, it is raw
At recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side passes through preset reception
Square private key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and
The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body using the encrypted public key decrypted,
Complete the transaction with the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized
The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body, Transaction Information is supervised.
Preferably, the Transaction Information that determines of transaction initiator includes transaction business data and transaction content data,
The encryption key using the encryption key centering adds the Transaction Information that initiator determines of trading on alliance's chain
It is close, generate encrypting transactions data the step of include:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering,
Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
Preferably, the processor is also used to execute the transaction supervisory systems based on alliance's chain, to realize following step
It is rapid:
Using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering
Encrypted public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
Transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key group of knowing are struck a bargain
Yi Ti.
Preferably, the processor is also used to execute the transaction supervisory systems based on alliance's chain, to realize following step
It is rapid:
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature key centering
The cryptographic Hash that signature private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and by the cryptographic hash
It is added in the transaction body.
In addition, to achieve the above object, it is described to be based on the present invention also provides a kind of transaction monitoring and managing method based on alliance's chain
The transaction monitoring and managing method of alliance's chain includes:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
Using the encryption key centering encryption key to trade on alliance's chain the Transaction Information that determines of initiator into
Row encryption, generates encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, it is raw
At recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side passes through preset reception
Square private key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and
The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body using the encrypted public key decrypted,
Complete the transaction with the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized
The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body, Transaction Information is supervised.
Preferably, the Transaction Information that determines of transaction initiator includes transaction business data and transaction content data,
The encryption key using the encryption key centering adds the Transaction Information that initiator determines of trading on alliance's chain
It is close, generate encrypting transactions data the step of include:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering,
Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
Preferably, further includes:
Using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering
Encrypted public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
Transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key group of knowing are struck a bargain
Yi Ti.
Preferably, further includes:
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature key centering
The cryptographic Hash that signature private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and by the cryptographic hash
It is added in the transaction body.
Preferably, further includes:
The encryption in transaction body received using the public signature key of the signature key centering to the transaction acceptance side is breathed out
Uncommon value is decrypted, the cryptographic Hash decrypted;
Corresponding cryptographic Hash is calculated using hashing algorithm to the transaction body that the transaction acceptance side receives, by the Hash of calculating
Value is compared with the cryptographic Hash of decryption;
If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, based on the transaction body complete the transaction acceptance side and
The transaction of the transaction initiator;
If the cryptographic Hash calculated is different from the cryptographic Hash of decryption, process of closing the trade.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers
Readable storage medium storing program for executing is stored with the transaction supervisory systems based on alliance's chain, and the transaction supervisory systems based on alliance's chain can be by extremely
A few processor executes, so that at least one described processor executes the transaction monitoring and managing method as above-mentioned based on alliance's chain
Step.
Transaction monitoring and managing method, system and readable storage medium storing program for executing proposed by the present invention based on alliance's chain, by presetting
The encryption key of encryption key centering the Transaction Information that determines of initiator of trading on alliance's chain is encrypted, generate encryption
Transaction data;The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side,
Generate recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;Based on described
Transaction body initiates transaction on alliance's chain.Due to can be by by the encrypting transactions data and recipient's encrypted public key
The mode of composition transaction body is traded on alliance's chain, and the transaction acceptance on alliance's chain can pass through preset recipient's private key
Recipient's encrypted public key in the transaction body is decrypted to obtain the encrypted public key of the encryption key centering, and utilizes solution
It is close go out encrypted public key the Transaction Information determined is decrypted to the encrypting transactions data in the transaction body, complete with
The transaction of the transaction initiator;Due to only having recipient's encrypted public key in transaction body, other nodes on alliance's chain can not
Decryption gets the encrypted public key of the encryption key centering, and the encrypting transactions data in transaction body can not be decrypted, from
And it ensure that the privacy of transaction data in alliance's chain.Meanwhile monitoring party can be according to the encryption key centering synchronized
Encrypted public key to it is described transaction body in encrypting transactions data the Transaction Information determined is decrypted, to Transaction Information
It is supervised.The privacy that not only can guarantee transaction data is realized, but also regulatory agency can be allowed effectively to supervise transaction.
Detailed description of the invention
Fig. 1 is that the present invention is based on the running environment schematic diagrames of 10 preferred embodiment of transaction supervisory systems of alliance's chain;
Fig. 2 is the flow diagram of transaction one embodiment of monitoring and managing method the present invention is based on alliance's chain.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot
It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims
Protection scope within.
The present invention provides a kind of transaction supervisory systems based on alliance's chain.Referring to Fig. 1, being that the present invention is based on alliance's chains
The running environment schematic diagram of transaction 10 preferred embodiment of supervisory systems.
In the present embodiment, the transaction supervisory systems 10 based on alliance's chain is installed and is run in electronic device 1.
The electronic device 1 may include, but be not limited only to, memory 11, processor 12 and display 13.Fig. 1 is illustrated only with component
The electronic device 1 of 11-13, it should be understood that being not required for implementing all components shown, the implementation that can be substituted is more
Or less component.
The memory 11 is the readable computer storage medium of at least one type, and the memory 11 is in some implementations
It can be the internal storage unit of the electronic device 1, such as the hard disk or memory of the electronic device 1 in example.The memory
11 are also possible to the External memory equipment of the electronic device 1 in further embodiments, such as are equipped on the electronic device 1
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card,
Flash card (Flash Card) etc..Further, the memory 11 can also both include the storage inside of the electronic device 1
Unit also includes External memory equipment.The memory 11 for store the application software for being installed on the electronic device 1 and respectively
Class data, such as the program code etc. of the transaction supervisory systems 10 based on alliance's chain.The memory 11 can be also used for
Temporarily store the data that has exported or will export.
The processor 12 can be in some embodiments a central processing unit (Central Processing Unit,
CPU), microprocessor or other data processing chips, for running the program code stored in the memory 11 or processing number
According to, such as execute the transaction supervisory systems 10 etc. based on alliance's chain.
The display 13 can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display in some embodiments
And OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..The display 13 is used
In being shown in the information handled in the electronic device 1 and for showing visual user interface, such as the transaction of generation
Informed side's node, stateful transaction in body, alliance's chain etc..The component 11-13 of the electronic device 1 passes through the intercommunication of system bus phase
Letter.
Transaction supervisory systems 10 based on alliance's chain includes at least one computer being stored in the memory 11 can
Reading instruction, at least one computer-readable instruction can be executed by the processor 12, to realize each embodiment of the application.
Wherein, above-mentioned to realize following steps when being executed based on the transaction supervisory systems 10 of alliance's chain by the processor 12:
Step S1, obtains preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
Step S2, the transaction that the initiator that trades on alliance's chain is determined using the encryption key of the encryption key centering
Information is encrypted, and encrypting transactions data is generated;
Step S3 is carried out using encrypted public key of the preset recipient's public key in transaction acceptance side to the encryption key centering
Encryption generates recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Step S4 initiates transaction based on the transaction body on alliance's chain, so that the transaction acceptance side passes through in advance
If recipient's private key to recipient's encrypted public key in the transaction body be decrypted to obtain the encryption key centering plus
Migong key, and using the encrypted public key that decrypts the encrypting transactions data in the transaction body is decrypted and to be determined
Transaction Information completes the transaction with the transaction initiator;The monitoring party is according to the encryption key centering synchronized
Encrypted public key to it is described transaction body in encrypting transactions data the Transaction Information determined is decrypted, to Transaction Information
It is supervised.
It is true to the initiator that trades on alliance's chain by the encryption key of preset encryption key centering in the present embodiment
The Transaction Information set is encrypted, and encrypting transactions data is generated;Using the preset recipient's public key in transaction acceptance side to described
The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated;By the encrypting transactions data and described connect
Debit's encrypted public key composition transaction body;Transaction is initiated on alliance's chain based on the transaction body.It will be described due to that can pass through
The mode of encrypting transactions data and recipient's encrypted public key composition transaction body is traded on alliance's chain, on alliance's chain
Transaction acceptance can be decrypted to obtain institute by preset recipient's private key to recipient's encrypted public key in the transaction body
State the encrypted public key of encryption key centering, and using the encrypted public key decrypted to the encrypting transactions data in the transaction body into
The Transaction Information that row decryption is determined completes the transaction with the transaction initiator;Due to only being received in transaction body
Square encrypted public key, other nodes on alliance's chain can not decrypt the encrypted public key for getting the encryption key centering, can not be right
Encrypting transactions data in transaction body is decrypted, to ensure that the privacy of transaction data in alliance's chain.Meanwhile monitoring party
The encrypting transactions data in the transaction body can be solved according to the encrypted public key of the encryption key centering synchronized
The close Transaction Information determined, supervises Transaction Information.Realize the privacy that not only can guarantee transaction data, but also energy
Regulatory agency is allowed effectively to supervise transaction.
Further, in this embodiment the Transaction Information that determines of transaction initiator include transaction business data (such as
Identity information, service parameter of both parties etc.) and transaction content data (such as trade share, the exchange rate), described in the utilization
The encryption key of encryption key centering encrypts the Transaction Information that initiator determines of trading on alliance's chain, generates encryption and hands over
The step of easy data includes:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering,
Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
It further include the informed square node (packet of default third party in addition to the transaction partners in alliance's chain described in the present embodiment
Include the node that can be had full knowledge that or partially know this time to trade), such as using the informed Fang Jie of third party default on alliance's chain
Informed side's public key of point encrypts the encrypted public key of the encryption key centering, generates square encrypted public key of knowing;It will transaction
Business datum, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
Further, in this embodiment further including the steps that signature authentication, firstly, obtaining preset signature key
It is right;Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering
The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added
To in the transaction body.After transaction acceptance side receives the transaction body on alliance's chain, signature authentication is carried out first, as described in utilizing
The cryptographic hash in transaction body that the public signature key of signature key centering receives the transaction acceptance side is decrypted, and obtains
The cryptographic Hash of decryption;Corresponding cryptographic Hash is calculated using hashing algorithm to the transaction body that the transaction acceptance side receives, will be calculated
Cryptographic Hash be compared with the cryptographic Hash of decryption;If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, it is based on the friendship
Easy body completes the transaction of the transaction acceptance side and the transaction initiator;If the cryptographic Hash of the cryptographic Hash and decryption that calculate is not
Together, then it closes the trade process.
Specifically, in one embodiment, the present embodiment is in the transaction on alliance's chain type block chain, pair that is related to
As node includes both parties' node, the first informed square node, the second informed square node, monitoring party, wherein both parties are in fact
The both sides of transaction are applied, such as both parties' node includes node A and node B, trades and transfers accounts for A to B, transfer amounts 100;First
Side's node of knowing is that it can be allowed to have full knowledge that a side of entire Transaction Details such as node C, and C is allowed to be known that this time transaction is A
It transfers accounts to B, and knows specific transfer amounts 100;Second informed square node is the side that it can be allowed to know part Transaction Information
Such as node D, D is allowed to be known that this time transaction is that A transfers accounts to B, but D cannot be allowed to know specific transfer amounts 100;Monitoring party i.e. by
In supervision demand, need to know that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100, according to both sides' body of transferring accounts
Whether part and transfer amounts are legal to judge this time to trade, to realize that transaction is supervised.
It gets out dual key pair in advance: signature code key, encryption key.It should be noted that these key pairs can be it is pre-
It first sets, and synchronization notice is to monitoring party.These key pairs are also possible to apply obtaining from the center CA, and monitoring party can be with itself
Supervision identity go the center CA application know key pair.Transaction Information is divided into transaction business data and transaction content data,
For example, transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts 100 ".
Transaction initiator A obtains the encryption key pair of this pre-set transaction, or application obtains this from the center CA
The encryption key pair of secondary transaction.Transaction initiator A trades to this using the encryption key for the encryption key centering applied
Transaction content data are encrypted, and encryption transaction content data are generated, for example, encrypting to clear data 100, generate encryption
Transaction content data, and transaction body is formed, it include transaction business data and encryption transaction content data in the transaction body.
Further, transaction initiator A is applied from the center CA using recipient's public key of transaction acceptance side B itself
The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated.It is public using the first of the first informed square node
Key encrypts the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and it is public to generate the first encryption
Key.By recipient's encrypted public key, the first encrypted public key be added to transaction body in, then new transaction body include transaction business data,
Encrypt transaction content data, recipient's encrypted public key and the first encrypted public key.
The initiator A that trades uses hashing algorithm to entire transaction body, calculates corresponding hash value, applies using from the center CA
Signature private key hash value that entire transaction body is calculated encrypt, obtain encryption hash value, and by encryption hash value
It is added in transaction body, then finally formed transaction body includes five parts, respectively transaction business data, encryption transaction content number
According to, recipient's encrypted public key, the first encrypted public key and encryption hash value.
Transaction initiator A is based on transaction body and initiates transaction on block chain, and transaction acceptance side B gets friendship from block chain
Yi Tihou, first progress signature authentication operation are as follows:
Transaction acceptance side B applies for public signature key corresponding to the signature private key of transaction initiator A, transaction acceptance from the center CA
Square B is decrypted the encryption hash value in transaction body using the public signature key of application, the hash value decrypted, the decryption
Hash value is to trade initiator A to the hash value that entirely transaction body calculates.Transaction acceptance side B uses the transaction body of acquisition scattered
Column algorithm calculates corresponding hash value.The B hash value calculated in transaction acceptance side is compared with the hash value decrypted before
Compared with if transaction acceptance side B the hash value calculated and the hash value striking resemblances decrypted before, illustrate the transaction for transaction hair
It plays side A signature and Transaction Information is not tampered with, that is, prove the really transaction initiator A initiation of the transaction and authentic and valid
, then transaction acceptance side B can carry out subsequent operation according to the transaction body.Otherwise, illustrate that the Transaction Information has been tampered, process knot
Beam.
Transaction acceptance side B verifies the transaction for transaction initiator A signature and after Transaction Information is not tampered with, and transaction connects
Operation can be decrypted to recipient's encrypted public key by the recipient's private key of itself in debit B, to obtain transaction initiator A from CA
The encrypted public key for the encryption key centering that center is applied.Transaction acceptance side B is using the encrypted public key decrypted to transaction body
In encryption transaction content data operation is decrypted, can decrypt to obtain transaction content data, such as " transfer amounts 100 ", then
Transaction acceptance side B can according to decryption obtain transaction content data is completed on block chain with trade initiator A transaction.
Due to including the first encrypted public key in body of trading, the first encrypted public key is the first public affairs using the first informed square node
Key carries out encryption generation to the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and therefore, first knows
Operation can be decrypted to the first encrypted public key by the first private key of itself in feelings side node C, to obtain transaction initiator A from CA
The encrypted public key for the encryption key centering that center is applied.First knows the square available encrypted public key decrypted of node C to friendship
Operation is decrypted in encryption transaction content data in easy body, can decrypt to obtain transaction content data, such as " transfer amounts
100 ", thus, the first informed side node C is known that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100.
And square node D informed for second, since the public key encryption that second knows square node D is not put into transaction body
In, therefore, after the second informed side node D receives transaction body, the encryption transaction content data in transaction body can not be solved
Close, then the second informed side node D can not know that transaction content data such as " transfer amounts 100 ", are handed in block chain to ensure that
The privacy of easy data.
For monitoring party, due to getting out dual key pair in advance: signature code key, encryption key, monitoring party can basis
Supervision demand gets the signature code key, encryption key, can supervise to the transaction body in block chain, such as available friendship
It easy business datum and the encryption transaction content data in transaction body is decrypted obtains transaction content data, judge transaction business
Whether data and transaction content data are legal.For example, monitoring party can be the center CA, transaction initiator A from the center CA apply to
Encryption key to rear, the encryption key pair of this transaction of CA central store.When being supervised, the center CA obtains transaction
The transaction body that initiator A is generated can be in transaction body using the encryption key centering corresponding secret key of this transaction of storage
Encryption transaction content data are decrypted, and know that transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts
100 ", that is, can determine whether transaction business data and transaction content data are legal.
It should be noted that algorithm used in the present embodiment is needed according to business using symmetrical and asymmetric arithmetic, it is right
Title algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256bit), DES, AES (128bit) scheduling algorithm.It is non-
Symmetry algorithm includes but is not limited to: RSA (2048bit), SM2 (domestic), ECC (210bit), DH, DSA, RSA (1024bit) etc.
Algorithm.Unidirectionally (hashing) algorithm includes but is not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5 scheduling algorithm.Its
In, for symmetry algorithm for encrypting, asymmetric arithmetic and hashing algorithm are used for the process that cryptographic Hash calculates.
As shown in Fig. 2, Fig. 2 is the flow diagram of transaction one embodiment of monitoring and managing method the present invention is based on alliance's chain, it should
Transaction monitoring and managing method based on alliance's chain the following steps are included:
Step S10, obtains preset encryption key pair, and by the encryption key to being synchronized to preset supervision
Side;
Step S20, the friendship that the initiator that trades on alliance's chain is determined using the encryption key of the encryption key centering
Easy information is encrypted, and encrypting transactions data is generated;
Step S30, using the preset recipient's public key in transaction acceptance side to the encrypted public key of the encryption key centering into
Row encryption, generates recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Step S40 initiates transaction based on the transaction body on alliance's chain, so that the transaction acceptance side passes through in advance
If recipient's private key to recipient's encrypted public key in the transaction body be decrypted to obtain the encryption key centering plus
Migong key, and using the encrypted public key that decrypts the encrypting transactions data in the transaction body is decrypted and to be determined
Transaction Information completes the transaction with the transaction initiator;The monitoring party is according to the encryption key centering synchronized
Encrypted public key to it is described transaction body in encrypting transactions data the Transaction Information determined is decrypted, to Transaction Information
It is supervised.
It is true to the initiator that trades on alliance's chain by the encryption key of preset encryption key centering in the present embodiment
The Transaction Information set is encrypted, and encrypting transactions data is generated;Using the preset recipient's public key in transaction acceptance side to described
The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated;By the encrypting transactions data and described connect
Debit's encrypted public key composition transaction body;Transaction is initiated on alliance's chain based on the transaction body.It will be described due to that can pass through
The mode of encrypting transactions data and recipient's encrypted public key composition transaction body is traded on alliance's chain, on alliance's chain
Transaction acceptance can be decrypted to obtain institute by preset recipient's private key to recipient's encrypted public key in the transaction body
State the encrypted public key of encryption key centering, and using the encrypted public key decrypted to the encrypting transactions data in the transaction body into
The Transaction Information that row decryption is determined completes the transaction with the transaction initiator;Due to only being received in transaction body
Square encrypted public key, other nodes on alliance's chain can not decrypt the encrypted public key for getting the encryption key centering, can not be right
Encrypting transactions data in transaction body is decrypted, to ensure that the privacy of transaction data in alliance's chain.Meanwhile monitoring party
The encrypting transactions data in the transaction body can be solved according to the encrypted public key of the encryption key centering synchronized
The close Transaction Information determined, supervises Transaction Information.Realize the privacy that not only can guarantee transaction data, but also energy
Regulatory agency is allowed effectively to supervise transaction.
Further, in this embodiment the Transaction Information that determines of transaction initiator include transaction business data (such as
Identity information, service parameter of both parties etc.) and transaction content data (such as trade share, the exchange rate), described in the utilization
The encryption key of encryption key centering encrypts the Transaction Information that initiator determines of trading on alliance's chain, generates encryption and hands over
The step of easy data includes:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering,
Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
It further include the informed square node (packet of default third party in addition to the transaction partners in alliance's chain described in the present embodiment
Include the node that can be had full knowledge that or partially know this time to trade), such as using the informed Fang Jie of third party default on alliance's chain
Informed side's public key of point encrypts the encrypted public key of the encryption key centering, generates square encrypted public key of knowing;It will transaction
Business datum, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
Further, in this embodiment further including the steps that signature authentication, firstly, obtaining preset signature key
It is right;Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering
The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added
To in the transaction body.After transaction acceptance side receives the transaction body on alliance's chain, signature authentication is carried out first, as described in utilizing
The cryptographic hash in transaction body that the public signature key of signature key centering receives the transaction acceptance side is decrypted, and obtains
The cryptographic Hash of decryption;Corresponding cryptographic Hash is calculated using hashing algorithm to the transaction body that the transaction acceptance side receives, will be calculated
Cryptographic Hash be compared with the cryptographic Hash of decryption;If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, it is based on the friendship
Easy body completes the transaction of the transaction acceptance side and the transaction initiator;If the cryptographic Hash of the cryptographic Hash and decryption that calculate is not
Together, then it closes the trade process.
Specifically, in one embodiment, the present embodiment is in the transaction on alliance's chain type block chain, pair that is related to
As node includes both parties' node, the first informed square node, the second informed square node, monitoring party, wherein both parties are in fact
The both sides of transaction are applied, such as both parties' node includes node A and node B, trades and transfers accounts for A to B, transfer amounts 100;First
Side's node of knowing is that it can be allowed to have full knowledge that a side of entire Transaction Details such as node C, and C is allowed to be known that this time transaction is A
It transfers accounts to B, and knows specific transfer amounts 100;Second informed square node is the side that it can be allowed to know part Transaction Information
Such as node D, D is allowed to be known that this time transaction is that A transfers accounts to B, but D cannot be allowed to know specific transfer amounts 100;Monitoring party i.e. by
In supervision demand, need to know that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100, according to both sides' body of transferring accounts
Whether part and transfer amounts are legal to judge this time to trade, to realize that transaction is supervised.
It gets out dual key pair in advance: signature code key, encryption key.It should be noted that these key pairs can be it is pre-
It first sets, and synchronization notice is to monitoring party.These key pairs are also possible to apply obtaining from the center CA, and monitoring party can be with itself
Supervision identity go the center CA application know key pair.Transaction Information is divided into transaction business data and transaction content data,
For example, transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts 100 ".
Transaction initiator A obtains the encryption key pair of this pre-set transaction, or application obtains this from the center CA
The encryption key pair of secondary transaction.Transaction initiator A trades to this using the encryption key for the encryption key centering applied
Transaction content data are encrypted, and encryption transaction content data are generated, for example, encrypting to clear data 100, generate encryption
Transaction content data, and transaction body is formed, it include transaction business data and encryption transaction content data in the transaction body.
Further, transaction initiator A is applied from the center CA using recipient's public key of transaction acceptance side B itself
The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated.It is public using the first of the first informed square node
Key encrypts the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and it is public to generate the first encryption
Key.By recipient's encrypted public key, the first encrypted public key be added to transaction body in, then new transaction body include transaction business data,
Encrypt transaction content data, recipient's encrypted public key and the first encrypted public key.
The initiator A that trades uses hashing algorithm to entire transaction body, calculates corresponding hash value, applies using from the center CA
Signature private key hash value that entire transaction body is calculated encrypt, obtain encryption hash value, and by encryption hash value
It is added in transaction body, then finally formed transaction body includes five parts, respectively transaction business data, encryption transaction content number
According to, recipient's encrypted public key, the first encrypted public key and encryption hash value.
Transaction initiator A is based on transaction body and initiates transaction on block chain, and transaction acceptance side B gets friendship from block chain
Yi Tihou, first progress signature authentication operation are as follows:
Transaction acceptance side B applies for public signature key corresponding to the signature private key of transaction initiator A, transaction acceptance from the center CA
Square B is decrypted the encryption hash value in transaction body using the public signature key of application, the hash value decrypted, the decryption
Hash value is to trade initiator A to the hash value that entirely transaction body calculates.Transaction acceptance side B uses the transaction body of acquisition scattered
Column algorithm calculates corresponding hash value.The B hash value calculated in transaction acceptance side is compared with the hash value decrypted before
Compared with if transaction acceptance side B the hash value calculated and the hash value striking resemblances decrypted before, illustrate the transaction for transaction hair
It plays side A signature and Transaction Information is not tampered with, that is, prove the really transaction initiator A initiation of the transaction and authentic and valid
, then transaction acceptance side B can carry out subsequent operation according to the transaction body.Otherwise, illustrate that the Transaction Information has been tampered, process knot
Beam.
Transaction acceptance side B verifies the transaction for transaction initiator A signature and after Transaction Information is not tampered with, and transaction connects
Operation can be decrypted to recipient's encrypted public key by the recipient's private key of itself in debit B, to obtain transaction initiator A from CA
The encrypted public key for the encryption key centering that center is applied.Transaction acceptance side B is using the encrypted public key decrypted to transaction body
In encryption transaction content data operation is decrypted, can decrypt to obtain transaction content data, such as " transfer amounts 100 ", then
Transaction acceptance side B can according to decryption obtain transaction content data is completed on block chain with trade initiator A transaction.
Due to including the first encrypted public key in body of trading, the first encrypted public key is the first public affairs using the first informed square node
Key carries out encryption generation to the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and therefore, first knows
Operation can be decrypted to the first encrypted public key by the first private key of itself in feelings side node C, to obtain transaction initiator A from CA
The encrypted public key for the encryption key centering that center is applied.First knows the square available encrypted public key decrypted of node C to friendship
Operation is decrypted in encryption transaction content data in easy body, can decrypt to obtain transaction content data, such as " transfer amounts
100 ", thus, the first informed side node C is known that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100.
And square node D informed for second, since the public key encryption that second knows square node D is not put into transaction body
In, therefore, after the second informed side node D receives transaction body, the encryption transaction content data in transaction body can not be solved
Close, then the second informed side node D can not know that transaction content data such as " transfer amounts 100 ", are handed in block chain to ensure that
The privacy of easy data.
For monitoring party, due to getting out dual key pair in advance: signature code key, encryption key, monitoring party can basis
Supervision demand gets the signature code key, encryption key, can supervise to the transaction body in block chain, such as available friendship
It easy business datum and the encryption transaction content data in transaction body is decrypted obtains transaction content data, judge transaction business
Whether data and transaction content data are legal.For example, monitoring party can be the center CA, transaction initiator A from the center CA apply to
Encryption key to rear, the encryption key pair of this transaction of CA central store.When being supervised, the center CA obtains transaction
The transaction body that initiator A is generated can be in transaction body using the encryption key centering corresponding secret key of this transaction of storage
Encryption transaction content data are decrypted, and know that transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts
100 ", that is, can determine whether transaction business data and transaction content data are legal.
It should be noted that algorithm used in the present embodiment is needed according to business using symmetrical and asymmetric arithmetic, it is right
Title algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256bit), DES, AES (128bit) scheduling algorithm.It is non-
Symmetry algorithm includes but is not limited to: RSA (2048bit), SM2 (domestic), ECC (210bit), DH, DSA, RSA (1024bit) etc.
Algorithm.Unidirectionally (hashing) algorithm includes but is not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5 scheduling algorithm.Its
In, for symmetry algorithm for encrypting, asymmetric arithmetic and hashing algorithm are used for the process that cryptographic Hash calculates.
In addition, the computer-readable recording medium storage has the present invention also provides a kind of computer readable storage medium
Transaction supervisory systems based on alliance's chain, the transaction supervisory systems based on alliance's chain can be executed by least one processor,
So that at least one described processor executes the step of transaction monitoring and managing method based on alliance's chain in such as above-described embodiment, the base
As described above in specific implementation process such as step S10, S20, S30 of transaction monitoring and managing method of alliance's chain, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to be realized by hardware, but very much
In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing
The part that technology contributes can be embodied in the form of software products, which is stored in a storage
In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate
Machine, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
Preferred embodiments of the present invention have been described above with reference to the accompanying drawings, not thereby limiting the scope of the invention.On
It is for illustration only to state serial number of the embodiment of the present invention, does not represent the advantages or disadvantages of the embodiments.It is patrolled in addition, though showing in flow charts
Sequence is collected, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.
Without departing from the scope and spirit of the invention, there are many variations to implement the present invention by those skilled in the art,
It can be used for another embodiment for example as the feature of one embodiment and obtain another embodiment.It is all to use technology of the invention
Made any modifications, equivalent replacements, and improvements within design, should all be within interest field of the invention.
Claims (10)
1. a kind of electronic device, which is characterized in that the electronic device includes memory, processor, is stored on the memory
There are the transaction supervisory systems based on alliance's chain that can be run on the processor, the transaction supervisory systems based on alliance's chain
Following steps are realized when being executed by the processor:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
The Transaction Information that initiator determines of trading on alliance's chain is added using the encryption key of the encryption key centering
It is close, generate encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, generation connects
Debit's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side is private by preset recipient
Key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and utilizes
The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body in the encrypted public key decrypted, completes
With the transaction of the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized to institute
The Transaction Information determined is decrypted in the encrypting transactions data stated in transaction body, supervises to Transaction Information.
2. electronic device as described in claim 1, which is characterized in that the Transaction Information that determines of transaction initiator includes
Transaction business data and transaction content data, the encryption key using the encryption key centering are sent out trading on alliance's chain
Playing the step of Transaction Information just determined is encrypted, generates encrypting transactions data includes:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, are generated
Encrypt transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
3. electronic device as claimed in claim 2, which is characterized in that the processor is also used to execute described based on alliance's chain
Transaction supervisory systems, to perform the steps of
Encryption using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering
Public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
4. electronic device as claimed in claim 3, which is characterized in that the processor is also used to execute described based on alliance's chain
Transaction supervisory systems, to perform the steps of
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering
The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added
To in the transaction body.
5. a kind of transaction monitoring and managing method based on alliance's chain, which is characterized in that the transaction monitoring and managing method packet based on alliance's chain
It includes:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
The Transaction Information that initiator determines of trading on alliance's chain is added using the encryption key of the encryption key centering
It is close, generate encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, generation connects
Debit's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side is private by preset recipient
Key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and utilizes
The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body in the encrypted public key decrypted, completes
With the transaction of the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized to institute
The Transaction Information determined is decrypted in the encrypting transactions data stated in transaction body, supervises to Transaction Information.
6. as claimed in claim 5 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that the transaction initiator determines
Good Transaction Information includes transaction business data and transaction content data, the encryption key using the encryption key centering
The step of encrypting to the Transaction Information that determines of initiator of trading on alliance's chain, generate encrypting transactions data include:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, are generated
Encrypt transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
7. as claimed in claim 6 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that further include:
Encryption using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering
Public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
8. as claimed in claim 7 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that further include:
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering
The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added
To in the transaction body.
9. as claimed in claim 8 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that further include:
The cryptographic hash in transaction body that the transaction acceptance side is received using the public signature key of the signature key centering
It is decrypted, the cryptographic Hash decrypted;
The transaction body received to the transaction acceptance side calculates corresponding cryptographic Hash using hashing algorithm, by the cryptographic Hash of calculating with
The cryptographic Hash of decryption is compared;
If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, based on the transaction body completion transaction acceptance side with it is described
The transaction of transaction initiator;
If the cryptographic Hash calculated is different from the cryptographic Hash of decryption, process of closing the trade.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on connection
The transaction supervisory systems of alliance's chain realizes such as claim 5 when the transaction supervisory systems based on alliance's chain is executed by processor
The step of to transaction monitoring and managing method described in any one of 9 based on alliance's chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810618522.6A CN109034796B (en) | 2018-06-15 | 2018-06-15 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810618522.6A CN109034796B (en) | 2018-06-15 | 2018-06-15 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109034796A true CN109034796A (en) | 2018-12-18 |
CN109034796B CN109034796B (en) | 2023-09-22 |
Family
ID=64609745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810618522.6A Active CN109034796B (en) | 2018-06-15 | 2018-06-15 | Alliance chain-based transaction supervision method, electronic device and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109034796B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109816525A (en) * | 2018-12-27 | 2019-05-28 | 石更箭数据科技(上海)有限公司 | A kind of data processing method and its device, medium, terminal |
CN110458558A (en) * | 2019-07-04 | 2019-11-15 | 重庆金融资产交易所有限责任公司 | Data encryption method, device and computer equipment based on block chain |
CN110474908A (en) * | 2019-08-16 | 2019-11-19 | 微位(深圳)网络科技有限公司 | Transaction monitoring and managing method and device, storage medium and computer equipment |
CN110519059A (en) * | 2019-09-29 | 2019-11-29 | 四川师范大学 | A kind of block chain dual key concealment address processing method based on bilinear map |
CN110808999A (en) * | 2019-11-12 | 2020-02-18 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium |
CN110855631A (en) * | 2019-10-24 | 2020-02-28 | 南京可信区块链与算法经济研究院有限公司 | Monitorable zero knowledge verification method and system in block chain and storage medium |
CN111177259A (en) * | 2019-12-13 | 2020-05-19 | 杭州复杂美科技有限公司 | Parallel chain transaction encryption method, device and storage medium |
CN111698192A (en) * | 2019-03-13 | 2020-09-22 | 华为技术有限公司 | Method for monitoring transaction system, transaction device, monitoring device and system |
CN112507363A (en) * | 2020-12-15 | 2021-03-16 | 平安科技(深圳)有限公司 | Data supervision method, device and equipment based on block chain and storage medium |
CN112749965A (en) * | 2019-10-30 | 2021-05-04 | 深圳市网心科技有限公司 | Information monitoring method, system, equipment and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184495A (en) * | 2011-04-21 | 2011-09-14 | 北京天地融科技有限公司 | Network payment method and system |
CN103108245A (en) * | 2011-11-15 | 2013-05-15 | 中国银联股份有限公司 | Smart television payment secret key system and payment method based on smart television |
CN104751364A (en) * | 2013-12-30 | 2015-07-01 | 上海方付通商务服务有限公司 | Security certification type trans-regional direct-selling bank alliance transaction method and system |
US20160330027A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices |
CN106534097A (en) * | 2016-10-27 | 2017-03-22 | 上海亿账通区块链科技有限公司 | Block chain trading based authority control method and system |
CN106685989A (en) * | 2017-02-07 | 2017-05-17 | 杭州秘猿科技有限公司 | Privacy communication method based on license chain support and supervision |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN107172074A (en) * | 2017-06-26 | 2017-09-15 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
JP2017204704A (en) * | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | Validity guarantee method, validity guarantee system and validity guarantee program |
US20180158051A1 (en) * | 2016-12-01 | 2018-06-07 | Mastercard International Incorporated | Method and system for payment card verification via blockchain |
-
2018
- 2018-06-15 CN CN201810618522.6A patent/CN109034796B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184495A (en) * | 2011-04-21 | 2011-09-14 | 北京天地融科技有限公司 | Network payment method and system |
CN103108245A (en) * | 2011-11-15 | 2013-05-15 | 中国银联股份有限公司 | Smart television payment secret key system and payment method based on smart television |
CN104751364A (en) * | 2013-12-30 | 2015-07-01 | 上海方付通商务服务有限公司 | Security certification type trans-regional direct-selling bank alliance transaction method and system |
US20160330027A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices |
JP2017204704A (en) * | 2016-05-10 | 2017-11-16 | 日本電信電話株式会社 | Validity guarantee method, validity guarantee system and validity guarantee program |
CN106534097A (en) * | 2016-10-27 | 2017-03-22 | 上海亿账通区块链科技有限公司 | Block chain trading based authority control method and system |
US20180158051A1 (en) * | 2016-12-01 | 2018-06-07 | Mastercard International Incorporated | Method and system for payment card verification via blockchain |
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN106685989A (en) * | 2017-02-07 | 2017-05-17 | 杭州秘猿科技有限公司 | Privacy communication method based on license chain support and supervision |
CN107172074A (en) * | 2017-06-26 | 2017-09-15 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
Non-Patent Citations (4)
Title |
---|
DIANLI GUO, 等: "Adaptively Secure Broadcast Encryption With Constant Ciphertexts" * |
MAKOTO SATO,等: "Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking" * |
孙媛媛: "基于信任链的P2P可信身份认证模型的研究与设计" * |
庹小忠: "基于区块链的加密信息备份系统研究与设计" * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109816525A (en) * | 2018-12-27 | 2019-05-28 | 石更箭数据科技(上海)有限公司 | A kind of data processing method and its device, medium, terminal |
CN111698192B (en) * | 2019-03-13 | 2021-12-03 | 华为技术有限公司 | Method for monitoring transaction system, transaction device, monitoring device and system |
CN111698192A (en) * | 2019-03-13 | 2020-09-22 | 华为技术有限公司 | Method for monitoring transaction system, transaction device, monitoring device and system |
CN110458558A (en) * | 2019-07-04 | 2019-11-15 | 重庆金融资产交易所有限责任公司 | Data encryption method, device and computer equipment based on block chain |
CN110474908A (en) * | 2019-08-16 | 2019-11-19 | 微位(深圳)网络科技有限公司 | Transaction monitoring and managing method and device, storage medium and computer equipment |
CN110519059A (en) * | 2019-09-29 | 2019-11-29 | 四川师范大学 | A kind of block chain dual key concealment address processing method based on bilinear map |
CN110855631B (en) * | 2019-10-24 | 2022-05-17 | 南京可信区块链与算法经济研究院有限公司 | Method, system and storage medium for verifying supervision-capable zero knowledge in block chain |
CN110855631A (en) * | 2019-10-24 | 2020-02-28 | 南京可信区块链与算法经济研究院有限公司 | Monitorable zero knowledge verification method and system in block chain and storage medium |
CN112749965A (en) * | 2019-10-30 | 2021-05-04 | 深圳市网心科技有限公司 | Information monitoring method, system, equipment and storage medium |
CN112749965B (en) * | 2019-10-30 | 2024-04-09 | 深圳市迅雷网络技术有限公司 | Information monitoring method, system, equipment and storage medium |
CN110808999A (en) * | 2019-11-12 | 2020-02-18 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium |
CN111177259A (en) * | 2019-12-13 | 2020-05-19 | 杭州复杂美科技有限公司 | Parallel chain transaction encryption method, device and storage medium |
CN112507363A (en) * | 2020-12-15 | 2021-03-16 | 平安科技(深圳)有限公司 | Data supervision method, device and equipment based on block chain and storage medium |
WO2022126967A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Blockchain-based data supervision method, apparatus and device, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109034796B (en) | 2023-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034796A (en) | Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain | |
CN109862041B (en) | Digital identity authentication method, equipment, device, system and storage medium | |
US10164778B2 (en) | Method and system for distributing attestation key and certificate in trusted computing | |
US10142107B2 (en) | Token binding using trust module protected keys | |
US11210658B2 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
CN109064324A (en) | Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain | |
TW201918049A (en) | Trusted remote attestation method, device and system capable of ensuring information security without causing an influence on the operation of the server terminal during the policy deployment process | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
CN110800250A (en) | Controlled distribution of encrypted private keys | |
EP3780484B1 (en) | Cryptographic operation and working key creation method and cryptographic service platform and device | |
TW202015378A (en) | Cryptographic operation method, method for creating work key, and cryptographic service platform and device | |
CN104836784B (en) | A kind of information processing method, client and server | |
US10439809B2 (en) | Method and apparatus for managing application identifier | |
CN103067160A (en) | Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD) | |
CN111027981B (en) | Method and device for multi-party joint training of risk assessment model for IoT (Internet of things) machine | |
US11416821B1 (en) | Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing | |
WO2018112482A1 (en) | Method and system for distributing attestation key and certificate in trusted computing | |
CN109815747A (en) | Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN111327419A (en) | Method and system for resisting quantum computation block chain based on secret sharing | |
CN109660344A (en) | Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pond route device | |
CN110677253B (en) | Anti-quantum computation RFID authentication method and system based on asymmetric key pool and ECC | |
CN104820807B (en) | A kind of intelligent card data processing method | |
WO2023284691A1 (en) | Account opening method, system, and apparatus | |
CN109816525A (en) | A kind of data processing method and its device, medium, terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230825 Address after: 518000, Building 2410, Building 2, Research and Development Building 1 and 2, Fangda Plaza (Phase I), North Ring Avenue, Taoyuan Community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong Province Applicant after: Anda Data Technology (Shenzhen) Co.,Ltd. Address before: 400010 38 / F, 39 / F, unit 1, 99 Wuyi Road, Yuzhong District, Chongqing Applicant before: CHONGQING FINANCIAL ASSETS EXCHANGE Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |