[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109034796A - Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain - Google Patents

Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain Download PDF

Info

Publication number
CN109034796A
CN109034796A CN201810618522.6A CN201810618522A CN109034796A CN 109034796 A CN109034796 A CN 109034796A CN 201810618522 A CN201810618522 A CN 201810618522A CN 109034796 A CN109034796 A CN 109034796A
Authority
CN
China
Prior art keywords
transaction
public key
alliance
chain
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810618522.6A
Other languages
Chinese (zh)
Other versions
CN109034796B (en
Inventor
董国超
刘倞坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anda Data Technology Shenzhen Co ltd
Original Assignee
Chongqing Financial Assets Exchange LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Financial Assets Exchange LLC filed Critical Chongqing Financial Assets Exchange LLC
Priority to CN201810618522.6A priority Critical patent/CN109034796B/en
Publication of CN109034796A publication Critical patent/CN109034796A/en
Application granted granted Critical
Publication of CN109034796B publication Critical patent/CN109034796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain, this method comprises: obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;The Transaction Information that initiator determines of trading on alliance's chain is encrypted using the encryption key of the encryption key centering, generates encrypting transactions data;The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, generates recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;Transaction is initiated on alliance's chain based on the transaction body.The present invention realizes the privacy that not only can guarantee transaction data, but also regulatory agency can be allowed effectively to supervise transaction.

Description

Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
Technical field
The present invention relates to field of computer technology more particularly to a kind of transaction monitoring and managing methods based on alliance's chain, electronics dress It sets and readable storage medium storing program for executing.
Background technique
When being traded in the block chain of alliance's chain type, transaction data belongs to mutual between each tissue in alliance's chain Confidential data, need to guarantee the privacy of transaction data, i.e., cannot allow the arbitrary node in block chain that can know transaction data Content, meanwhile, for the transaction in block chain, regulatory agency need to know be specifically what is doing between enterprise according to transaction data Whether illegal trading activity is being done between transaction, each organization.In the prior art, for the block chain of alliance's chain type In transaction, not can be implemented simultaneously the privacy that not only can guarantee transaction data, but also that regulatory agency can be allowed to carry out transaction is effective Supervision.
Summary of the invention
The purpose of the present invention is to provide a kind of transaction monitoring and managing method, electronic device and readable storage mediums based on alliance's chain Matter, it is intended to realize the privacy that not only can guarantee transaction data, but also regulatory agency can be allowed effectively to supervise transaction.
To achieve the above object, the present invention provides a kind of electronic device, and the electronic device includes memory, processor, The transaction supervisory systems based on alliance's chain that can be run on the processor is stored on the memory, it is described to be based on alliance The transaction supervisory systems of chain realizes following steps when being executed by the processor:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
Using the encryption key centering encryption key to trade on alliance's chain the Transaction Information that determines of initiator into Row encryption, generates encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, it is raw At recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side passes through preset reception Square private key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body using the encrypted public key decrypted, Complete the transaction with the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body, Transaction Information is supervised.
Preferably, the Transaction Information that determines of transaction initiator includes transaction business data and transaction content data, The encryption key using the encryption key centering adds the Transaction Information that initiator determines of trading on alliance's chain It is close, generate encrypting transactions data the step of include:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
Preferably, the processor is also used to execute the transaction supervisory systems based on alliance's chain, to realize following step It is rapid:
Using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering Encrypted public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
Transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key group of knowing are struck a bargain Yi Ti.
Preferably, the processor is also used to execute the transaction supervisory systems based on alliance's chain, to realize following step It is rapid:
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature key centering The cryptographic Hash that signature private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and by the cryptographic hash It is added in the transaction body.
In addition, to achieve the above object, it is described to be based on the present invention also provides a kind of transaction monitoring and managing method based on alliance's chain The transaction monitoring and managing method of alliance's chain includes:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
Using the encryption key centering encryption key to trade on alliance's chain the Transaction Information that determines of initiator into Row encryption, generates encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, it is raw At recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side passes through preset reception Square private key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body using the encrypted public key decrypted, Complete the transaction with the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body, Transaction Information is supervised.
Preferably, the Transaction Information that determines of transaction initiator includes transaction business data and transaction content data, The encryption key using the encryption key centering adds the Transaction Information that initiator determines of trading on alliance's chain It is close, generate encrypting transactions data the step of include:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
Preferably, further includes:
Using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering Encrypted public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
Transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key group of knowing are struck a bargain Yi Ti.
Preferably, further includes:
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature key centering The cryptographic Hash that signature private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and by the cryptographic hash It is added in the transaction body.
Preferably, further includes:
The encryption in transaction body received using the public signature key of the signature key centering to the transaction acceptance side is breathed out Uncommon value is decrypted, the cryptographic Hash decrypted;
Corresponding cryptographic Hash is calculated using hashing algorithm to the transaction body that the transaction acceptance side receives, by the Hash of calculating Value is compared with the cryptographic Hash of decryption;
If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, based on the transaction body complete the transaction acceptance side and The transaction of the transaction initiator;
If the cryptographic Hash calculated is different from the cryptographic Hash of decryption, process of closing the trade.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers Readable storage medium storing program for executing is stored with the transaction supervisory systems based on alliance's chain, and the transaction supervisory systems based on alliance's chain can be by extremely A few processor executes, so that at least one described processor executes the transaction monitoring and managing method as above-mentioned based on alliance's chain Step.
Transaction monitoring and managing method, system and readable storage medium storing program for executing proposed by the present invention based on alliance's chain, by presetting The encryption key of encryption key centering the Transaction Information that determines of initiator of trading on alliance's chain is encrypted, generate encryption Transaction data;The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, Generate recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;Based on described Transaction body initiates transaction on alliance's chain.Due to can be by by the encrypting transactions data and recipient's encrypted public key The mode of composition transaction body is traded on alliance's chain, and the transaction acceptance on alliance's chain can pass through preset recipient's private key Recipient's encrypted public key in the transaction body is decrypted to obtain the encrypted public key of the encryption key centering, and utilizes solution It is close go out encrypted public key the Transaction Information determined is decrypted to the encrypting transactions data in the transaction body, complete with The transaction of the transaction initiator;Due to only having recipient's encrypted public key in transaction body, other nodes on alliance's chain can not Decryption gets the encrypted public key of the encryption key centering, and the encrypting transactions data in transaction body can not be decrypted, from And it ensure that the privacy of transaction data in alliance's chain.Meanwhile monitoring party can be according to the encryption key centering synchronized Encrypted public key to it is described transaction body in encrypting transactions data the Transaction Information determined is decrypted, to Transaction Information It is supervised.The privacy that not only can guarantee transaction data is realized, but also regulatory agency can be allowed effectively to supervise transaction.
Detailed description of the invention
Fig. 1 is that the present invention is based on the running environment schematic diagrames of 10 preferred embodiment of transaction supervisory systems of alliance's chain;
Fig. 2 is the flow diagram of transaction one embodiment of monitoring and managing method the present invention is based on alliance's chain.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
The present invention provides a kind of transaction supervisory systems based on alliance's chain.Referring to Fig. 1, being that the present invention is based on alliance's chains The running environment schematic diagram of transaction 10 preferred embodiment of supervisory systems.
In the present embodiment, the transaction supervisory systems 10 based on alliance's chain is installed and is run in electronic device 1. The electronic device 1 may include, but be not limited only to, memory 11, processor 12 and display 13.Fig. 1 is illustrated only with component The electronic device 1 of 11-13, it should be understood that being not required for implementing all components shown, the implementation that can be substituted is more Or less component.
The memory 11 is the readable computer storage medium of at least one type, and the memory 11 is in some implementations It can be the internal storage unit of the electronic device 1, such as the hard disk or memory of the electronic device 1 in example.The memory 11 are also possible to the External memory equipment of the electronic device 1 in further embodiments, such as are equipped on the electronic device 1 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, Flash card (Flash Card) etc..Further, the memory 11 can also both include the storage inside of the electronic device 1 Unit also includes External memory equipment.The memory 11 for store the application software for being installed on the electronic device 1 and respectively Class data, such as the program code etc. of the transaction supervisory systems 10 based on alliance's chain.The memory 11 can be also used for Temporarily store the data that has exported or will export.
The processor 12 can be in some embodiments a central processing unit (Central Processing Unit, CPU), microprocessor or other data processing chips, for running the program code stored in the memory 11 or processing number According to, such as execute the transaction supervisory systems 10 etc. based on alliance's chain.
The display 13 can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display in some embodiments And OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..The display 13 is used In being shown in the information handled in the electronic device 1 and for showing visual user interface, such as the transaction of generation Informed side's node, stateful transaction in body, alliance's chain etc..The component 11-13 of the electronic device 1 passes through the intercommunication of system bus phase Letter.
Transaction supervisory systems 10 based on alliance's chain includes at least one computer being stored in the memory 11 can Reading instruction, at least one computer-readable instruction can be executed by the processor 12, to realize each embodiment of the application.
Wherein, above-mentioned to realize following steps when being executed based on the transaction supervisory systems 10 of alliance's chain by the processor 12:
Step S1, obtains preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
Step S2, the transaction that the initiator that trades on alliance's chain is determined using the encryption key of the encryption key centering Information is encrypted, and encrypting transactions data is generated;
Step S3 is carried out using encrypted public key of the preset recipient's public key in transaction acceptance side to the encryption key centering Encryption generates recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Step S4 initiates transaction based on the transaction body on alliance's chain, so that the transaction acceptance side passes through in advance If recipient's private key to recipient's encrypted public key in the transaction body be decrypted to obtain the encryption key centering plus Migong key, and using the encrypted public key that decrypts the encrypting transactions data in the transaction body is decrypted and to be determined Transaction Information completes the transaction with the transaction initiator;The monitoring party is according to the encryption key centering synchronized Encrypted public key to it is described transaction body in encrypting transactions data the Transaction Information determined is decrypted, to Transaction Information It is supervised.
It is true to the initiator that trades on alliance's chain by the encryption key of preset encryption key centering in the present embodiment The Transaction Information set is encrypted, and encrypting transactions data is generated;Using the preset recipient's public key in transaction acceptance side to described The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated;By the encrypting transactions data and described connect Debit's encrypted public key composition transaction body;Transaction is initiated on alliance's chain based on the transaction body.It will be described due to that can pass through The mode of encrypting transactions data and recipient's encrypted public key composition transaction body is traded on alliance's chain, on alliance's chain Transaction acceptance can be decrypted to obtain institute by preset recipient's private key to recipient's encrypted public key in the transaction body State the encrypted public key of encryption key centering, and using the encrypted public key decrypted to the encrypting transactions data in the transaction body into The Transaction Information that row decryption is determined completes the transaction with the transaction initiator;Due to only being received in transaction body Square encrypted public key, other nodes on alliance's chain can not decrypt the encrypted public key for getting the encryption key centering, can not be right Encrypting transactions data in transaction body is decrypted, to ensure that the privacy of transaction data in alliance's chain.Meanwhile monitoring party The encrypting transactions data in the transaction body can be solved according to the encrypted public key of the encryption key centering synchronized The close Transaction Information determined, supervises Transaction Information.Realize the privacy that not only can guarantee transaction data, but also energy Regulatory agency is allowed effectively to supervise transaction.
Further, in this embodiment the Transaction Information that determines of transaction initiator include transaction business data (such as Identity information, service parameter of both parties etc.) and transaction content data (such as trade share, the exchange rate), described in the utilization The encryption key of encryption key centering encrypts the Transaction Information that initiator determines of trading on alliance's chain, generates encryption and hands over The step of easy data includes:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
It further include the informed square node (packet of default third party in addition to the transaction partners in alliance's chain described in the present embodiment Include the node that can be had full knowledge that or partially know this time to trade), such as using the informed Fang Jie of third party default on alliance's chain Informed side's public key of point encrypts the encrypted public key of the encryption key centering, generates square encrypted public key of knowing;It will transaction Business datum, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
Further, in this embodiment further including the steps that signature authentication, firstly, obtaining preset signature key It is right;Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added To in the transaction body.After transaction acceptance side receives the transaction body on alliance's chain, signature authentication is carried out first, as described in utilizing The cryptographic hash in transaction body that the public signature key of signature key centering receives the transaction acceptance side is decrypted, and obtains The cryptographic Hash of decryption;Corresponding cryptographic Hash is calculated using hashing algorithm to the transaction body that the transaction acceptance side receives, will be calculated Cryptographic Hash be compared with the cryptographic Hash of decryption;If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, it is based on the friendship Easy body completes the transaction of the transaction acceptance side and the transaction initiator;If the cryptographic Hash of the cryptographic Hash and decryption that calculate is not Together, then it closes the trade process.
Specifically, in one embodiment, the present embodiment is in the transaction on alliance's chain type block chain, pair that is related to As node includes both parties' node, the first informed square node, the second informed square node, monitoring party, wherein both parties are in fact The both sides of transaction are applied, such as both parties' node includes node A and node B, trades and transfers accounts for A to B, transfer amounts 100;First Side's node of knowing is that it can be allowed to have full knowledge that a side of entire Transaction Details such as node C, and C is allowed to be known that this time transaction is A It transfers accounts to B, and knows specific transfer amounts 100;Second informed square node is the side that it can be allowed to know part Transaction Information Such as node D, D is allowed to be known that this time transaction is that A transfers accounts to B, but D cannot be allowed to know specific transfer amounts 100;Monitoring party i.e. by In supervision demand, need to know that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100, according to both sides' body of transferring accounts Whether part and transfer amounts are legal to judge this time to trade, to realize that transaction is supervised.
It gets out dual key pair in advance: signature code key, encryption key.It should be noted that these key pairs can be it is pre- It first sets, and synchronization notice is to monitoring party.These key pairs are also possible to apply obtaining from the center CA, and monitoring party can be with itself Supervision identity go the center CA application know key pair.Transaction Information is divided into transaction business data and transaction content data, For example, transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts 100 ".
Transaction initiator A obtains the encryption key pair of this pre-set transaction, or application obtains this from the center CA The encryption key pair of secondary transaction.Transaction initiator A trades to this using the encryption key for the encryption key centering applied Transaction content data are encrypted, and encryption transaction content data are generated, for example, encrypting to clear data 100, generate encryption Transaction content data, and transaction body is formed, it include transaction business data and encryption transaction content data in the transaction body.
Further, transaction initiator A is applied from the center CA using recipient's public key of transaction acceptance side B itself The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated.It is public using the first of the first informed square node Key encrypts the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and it is public to generate the first encryption Key.By recipient's encrypted public key, the first encrypted public key be added to transaction body in, then new transaction body include transaction business data, Encrypt transaction content data, recipient's encrypted public key and the first encrypted public key.
The initiator A that trades uses hashing algorithm to entire transaction body, calculates corresponding hash value, applies using from the center CA Signature private key hash value that entire transaction body is calculated encrypt, obtain encryption hash value, and by encryption hash value It is added in transaction body, then finally formed transaction body includes five parts, respectively transaction business data, encryption transaction content number According to, recipient's encrypted public key, the first encrypted public key and encryption hash value.
Transaction initiator A is based on transaction body and initiates transaction on block chain, and transaction acceptance side B gets friendship from block chain Yi Tihou, first progress signature authentication operation are as follows:
Transaction acceptance side B applies for public signature key corresponding to the signature private key of transaction initiator A, transaction acceptance from the center CA Square B is decrypted the encryption hash value in transaction body using the public signature key of application, the hash value decrypted, the decryption Hash value is to trade initiator A to the hash value that entirely transaction body calculates.Transaction acceptance side B uses the transaction body of acquisition scattered Column algorithm calculates corresponding hash value.The B hash value calculated in transaction acceptance side is compared with the hash value decrypted before Compared with if transaction acceptance side B the hash value calculated and the hash value striking resemblances decrypted before, illustrate the transaction for transaction hair It plays side A signature and Transaction Information is not tampered with, that is, prove the really transaction initiator A initiation of the transaction and authentic and valid , then transaction acceptance side B can carry out subsequent operation according to the transaction body.Otherwise, illustrate that the Transaction Information has been tampered, process knot Beam.
Transaction acceptance side B verifies the transaction for transaction initiator A signature and after Transaction Information is not tampered with, and transaction connects Operation can be decrypted to recipient's encrypted public key by the recipient's private key of itself in debit B, to obtain transaction initiator A from CA The encrypted public key for the encryption key centering that center is applied.Transaction acceptance side B is using the encrypted public key decrypted to transaction body In encryption transaction content data operation is decrypted, can decrypt to obtain transaction content data, such as " transfer amounts 100 ", then Transaction acceptance side B can according to decryption obtain transaction content data is completed on block chain with trade initiator A transaction.
Due to including the first encrypted public key in body of trading, the first encrypted public key is the first public affairs using the first informed square node Key carries out encryption generation to the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and therefore, first knows Operation can be decrypted to the first encrypted public key by the first private key of itself in feelings side node C, to obtain transaction initiator A from CA The encrypted public key for the encryption key centering that center is applied.First knows the square available encrypted public key decrypted of node C to friendship Operation is decrypted in encryption transaction content data in easy body, can decrypt to obtain transaction content data, such as " transfer amounts 100 ", thus, the first informed side node C is known that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100.
And square node D informed for second, since the public key encryption that second knows square node D is not put into transaction body In, therefore, after the second informed side node D receives transaction body, the encryption transaction content data in transaction body can not be solved Close, then the second informed side node D can not know that transaction content data such as " transfer amounts 100 ", are handed in block chain to ensure that The privacy of easy data.
For monitoring party, due to getting out dual key pair in advance: signature code key, encryption key, monitoring party can basis Supervision demand gets the signature code key, encryption key, can supervise to the transaction body in block chain, such as available friendship It easy business datum and the encryption transaction content data in transaction body is decrypted obtains transaction content data, judge transaction business Whether data and transaction content data are legal.For example, monitoring party can be the center CA, transaction initiator A from the center CA apply to Encryption key to rear, the encryption key pair of this transaction of CA central store.When being supervised, the center CA obtains transaction The transaction body that initiator A is generated can be in transaction body using the encryption key centering corresponding secret key of this transaction of storage Encryption transaction content data are decrypted, and know that transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts 100 ", that is, can determine whether transaction business data and transaction content data are legal.
It should be noted that algorithm used in the present embodiment is needed according to business using symmetrical and asymmetric arithmetic, it is right Title algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256bit), DES, AES (128bit) scheduling algorithm.It is non- Symmetry algorithm includes but is not limited to: RSA (2048bit), SM2 (domestic), ECC (210bit), DH, DSA, RSA (1024bit) etc. Algorithm.Unidirectionally (hashing) algorithm includes but is not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5 scheduling algorithm.Its In, for symmetry algorithm for encrypting, asymmetric arithmetic and hashing algorithm are used for the process that cryptographic Hash calculates.
As shown in Fig. 2, Fig. 2 is the flow diagram of transaction one embodiment of monitoring and managing method the present invention is based on alliance's chain, it should Transaction monitoring and managing method based on alliance's chain the following steps are included:
Step S10, obtains preset encryption key pair, and by the encryption key to being synchronized to preset supervision Side;
Step S20, the friendship that the initiator that trades on alliance's chain is determined using the encryption key of the encryption key centering Easy information is encrypted, and encrypting transactions data is generated;
Step S30, using the preset recipient's public key in transaction acceptance side to the encrypted public key of the encryption key centering into Row encryption, generates recipient's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Step S40 initiates transaction based on the transaction body on alliance's chain, so that the transaction acceptance side passes through in advance If recipient's private key to recipient's encrypted public key in the transaction body be decrypted to obtain the encryption key centering plus Migong key, and using the encrypted public key that decrypts the encrypting transactions data in the transaction body is decrypted and to be determined Transaction Information completes the transaction with the transaction initiator;The monitoring party is according to the encryption key centering synchronized Encrypted public key to it is described transaction body in encrypting transactions data the Transaction Information determined is decrypted, to Transaction Information It is supervised.
It is true to the initiator that trades on alliance's chain by the encryption key of preset encryption key centering in the present embodiment The Transaction Information set is encrypted, and encrypting transactions data is generated;Using the preset recipient's public key in transaction acceptance side to described The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated;By the encrypting transactions data and described connect Debit's encrypted public key composition transaction body;Transaction is initiated on alliance's chain based on the transaction body.It will be described due to that can pass through The mode of encrypting transactions data and recipient's encrypted public key composition transaction body is traded on alliance's chain, on alliance's chain Transaction acceptance can be decrypted to obtain institute by preset recipient's private key to recipient's encrypted public key in the transaction body State the encrypted public key of encryption key centering, and using the encrypted public key decrypted to the encrypting transactions data in the transaction body into The Transaction Information that row decryption is determined completes the transaction with the transaction initiator;Due to only being received in transaction body Square encrypted public key, other nodes on alliance's chain can not decrypt the encrypted public key for getting the encryption key centering, can not be right Encrypting transactions data in transaction body is decrypted, to ensure that the privacy of transaction data in alliance's chain.Meanwhile monitoring party The encrypting transactions data in the transaction body can be solved according to the encrypted public key of the encryption key centering synchronized The close Transaction Information determined, supervises Transaction Information.Realize the privacy that not only can guarantee transaction data, but also energy Regulatory agency is allowed effectively to supervise transaction.
Further, in this embodiment the Transaction Information that determines of transaction initiator include transaction business data (such as Identity information, service parameter of both parties etc.) and transaction content data (such as trade share, the exchange rate), described in the utilization The encryption key of encryption key centering encrypts the Transaction Information that initiator determines of trading on alliance's chain, generates encryption and hands over The step of easy data includes:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, Generate encryption transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
It further include the informed square node (packet of default third party in addition to the transaction partners in alliance's chain described in the present embodiment Include the node that can be had full knowledge that or partially know this time to trade), such as using the informed Fang Jie of third party default on alliance's chain Informed side's public key of point encrypts the encrypted public key of the encryption key centering, generates square encrypted public key of knowing;It will transaction Business datum, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
Further, in this embodiment further including the steps that signature authentication, firstly, obtaining preset signature key It is right;Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added To in the transaction body.After transaction acceptance side receives the transaction body on alliance's chain, signature authentication is carried out first, as described in utilizing The cryptographic hash in transaction body that the public signature key of signature key centering receives the transaction acceptance side is decrypted, and obtains The cryptographic Hash of decryption;Corresponding cryptographic Hash is calculated using hashing algorithm to the transaction body that the transaction acceptance side receives, will be calculated Cryptographic Hash be compared with the cryptographic Hash of decryption;If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, it is based on the friendship Easy body completes the transaction of the transaction acceptance side and the transaction initiator;If the cryptographic Hash of the cryptographic Hash and decryption that calculate is not Together, then it closes the trade process.
Specifically, in one embodiment, the present embodiment is in the transaction on alliance's chain type block chain, pair that is related to As node includes both parties' node, the first informed square node, the second informed square node, monitoring party, wherein both parties are in fact The both sides of transaction are applied, such as both parties' node includes node A and node B, trades and transfers accounts for A to B, transfer amounts 100;First Side's node of knowing is that it can be allowed to have full knowledge that a side of entire Transaction Details such as node C, and C is allowed to be known that this time transaction is A It transfers accounts to B, and knows specific transfer amounts 100;Second informed square node is the side that it can be allowed to know part Transaction Information Such as node D, D is allowed to be known that this time transaction is that A transfers accounts to B, but D cannot be allowed to know specific transfer amounts 100;Monitoring party i.e. by In supervision demand, need to know that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100, according to both sides' body of transferring accounts Whether part and transfer amounts are legal to judge this time to trade, to realize that transaction is supervised.
It gets out dual key pair in advance: signature code key, encryption key.It should be noted that these key pairs can be it is pre- It first sets, and synchronization notice is to monitoring party.These key pairs are also possible to apply obtaining from the center CA, and monitoring party can be with itself Supervision identity go the center CA application know key pair.Transaction Information is divided into transaction business data and transaction content data, For example, transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts 100 ".
Transaction initiator A obtains the encryption key pair of this pre-set transaction, or application obtains this from the center CA The encryption key pair of secondary transaction.Transaction initiator A trades to this using the encryption key for the encryption key centering applied Transaction content data are encrypted, and encryption transaction content data are generated, for example, encrypting to clear data 100, generate encryption Transaction content data, and transaction body is formed, it include transaction business data and encryption transaction content data in the transaction body.
Further, transaction initiator A is applied from the center CA using recipient's public key of transaction acceptance side B itself The encrypted public key of encryption key centering is encrypted, and recipient's encrypted public key is generated.It is public using the first of the first informed square node Key encrypts the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and it is public to generate the first encryption Key.By recipient's encrypted public key, the first encrypted public key be added to transaction body in, then new transaction body include transaction business data, Encrypt transaction content data, recipient's encrypted public key and the first encrypted public key.
The initiator A that trades uses hashing algorithm to entire transaction body, calculates corresponding hash value, applies using from the center CA Signature private key hash value that entire transaction body is calculated encrypt, obtain encryption hash value, and by encryption hash value It is added in transaction body, then finally formed transaction body includes five parts, respectively transaction business data, encryption transaction content number According to, recipient's encrypted public key, the first encrypted public key and encryption hash value.
Transaction initiator A is based on transaction body and initiates transaction on block chain, and transaction acceptance side B gets friendship from block chain Yi Tihou, first progress signature authentication operation are as follows:
Transaction acceptance side B applies for public signature key corresponding to the signature private key of transaction initiator A, transaction acceptance from the center CA Square B is decrypted the encryption hash value in transaction body using the public signature key of application, the hash value decrypted, the decryption Hash value is to trade initiator A to the hash value that entirely transaction body calculates.Transaction acceptance side B uses the transaction body of acquisition scattered Column algorithm calculates corresponding hash value.The B hash value calculated in transaction acceptance side is compared with the hash value decrypted before Compared with if transaction acceptance side B the hash value calculated and the hash value striking resemblances decrypted before, illustrate the transaction for transaction hair It plays side A signature and Transaction Information is not tampered with, that is, prove the really transaction initiator A initiation of the transaction and authentic and valid , then transaction acceptance side B can carry out subsequent operation according to the transaction body.Otherwise, illustrate that the Transaction Information has been tampered, process knot Beam.
Transaction acceptance side B verifies the transaction for transaction initiator A signature and after Transaction Information is not tampered with, and transaction connects Operation can be decrypted to recipient's encrypted public key by the recipient's private key of itself in debit B, to obtain transaction initiator A from CA The encrypted public key for the encryption key centering that center is applied.Transaction acceptance side B is using the encrypted public key decrypted to transaction body In encryption transaction content data operation is decrypted, can decrypt to obtain transaction content data, such as " transfer amounts 100 ", then Transaction acceptance side B can according to decryption obtain transaction content data is completed on block chain with trade initiator A transaction.
Due to including the first encrypted public key in body of trading, the first encrypted public key is the first public affairs using the first informed square node Key carries out encryption generation to the encrypted public key of the transaction initiator A encryption key centering applied from the center CA, and therefore, first knows Operation can be decrypted to the first encrypted public key by the first private key of itself in feelings side node C, to obtain transaction initiator A from CA The encrypted public key for the encryption key centering that center is applied.First knows the square available encrypted public key decrypted of node C to friendship Operation is decrypted in encryption transaction content data in easy body, can decrypt to obtain transaction content data, such as " transfer amounts 100 ", thus, the first informed side node C is known that this time transaction is that A transfers accounts to B, and knows specific transfer amounts 100.
And square node D informed for second, since the public key encryption that second knows square node D is not put into transaction body In, therefore, after the second informed side node D receives transaction body, the encryption transaction content data in transaction body can not be solved Close, then the second informed side node D can not know that transaction content data such as " transfer amounts 100 ", are handed in block chain to ensure that The privacy of easy data.
For monitoring party, due to getting out dual key pair in advance: signature code key, encryption key, monitoring party can basis Supervision demand gets the signature code key, encryption key, can supervise to the transaction body in block chain, such as available friendship It easy business datum and the encryption transaction content data in transaction body is decrypted obtains transaction content data, judge transaction business Whether data and transaction content data are legal.For example, monitoring party can be the center CA, transaction initiator A from the center CA apply to Encryption key to rear, the encryption key pair of this transaction of CA central store.When being supervised, the center CA obtains transaction The transaction body that initiator A is generated can be in transaction body using the encryption key centering corresponding secret key of this transaction of storage Encryption transaction content data are decrypted, and know that transaction business data are " A transfers accounts to B ", transaction content data are " transfer amounts 100 ", that is, can determine whether transaction business data and transaction content data are legal.
It should be noted that algorithm used in the present embodiment is needed according to business using symmetrical and asymmetric arithmetic, it is right Title algorithm includes but is not limited to: SM4, RC2, RC4, RC5, IDEA, AES (256bit), DES, AES (128bit) scheduling algorithm.It is non- Symmetry algorithm includes but is not limited to: RSA (2048bit), SM2 (domestic), ECC (210bit), DH, DSA, RSA (1024bit) etc. Algorithm.Unidirectionally (hashing) algorithm includes but is not limited to: SM3 (domestic), SHA-224, SHA-256, SHA-1, MD5 scheduling algorithm.Its In, for symmetry algorithm for encrypting, asymmetric arithmetic and hashing algorithm are used for the process that cryptographic Hash calculates.
In addition, the computer-readable recording medium storage has the present invention also provides a kind of computer readable storage medium Transaction supervisory systems based on alliance's chain, the transaction supervisory systems based on alliance's chain can be executed by least one processor, So that at least one described processor executes the step of transaction monitoring and managing method based on alliance's chain in such as above-described embodiment, the base As described above in specific implementation process such as step S10, S20, S30 of transaction monitoring and managing method of alliance's chain, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to be realized by hardware, but very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
Preferred embodiments of the present invention have been described above with reference to the accompanying drawings, not thereby limiting the scope of the invention.On It is for illustration only to state serial number of the embodiment of the present invention, does not represent the advantages or disadvantages of the embodiments.It is patrolled in addition, though showing in flow charts Sequence is collected, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.
Without departing from the scope and spirit of the invention, there are many variations to implement the present invention by those skilled in the art, It can be used for another embodiment for example as the feature of one embodiment and obtain another embodiment.It is all to use technology of the invention Made any modifications, equivalent replacements, and improvements within design, should all be within interest field of the invention.

Claims (10)

1. a kind of electronic device, which is characterized in that the electronic device includes memory, processor, is stored on the memory There are the transaction supervisory systems based on alliance's chain that can be run on the processor, the transaction supervisory systems based on alliance's chain Following steps are realized when being executed by the processor:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
The Transaction Information that initiator determines of trading on alliance's chain is added using the encryption key of the encryption key centering It is close, generate encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, generation connects Debit's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side is private by preset recipient Key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and utilizes The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body in the encrypted public key decrypted, completes With the transaction of the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized to institute The Transaction Information determined is decrypted in the encrypting transactions data stated in transaction body, supervises to Transaction Information.
2. electronic device as described in claim 1, which is characterized in that the Transaction Information that determines of transaction initiator includes Transaction business data and transaction content data, the encryption key using the encryption key centering are sent out trading on alliance's chain Playing the step of Transaction Information just determined is encrypted, generates encrypting transactions data includes:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, are generated Encrypt transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
3. electronic device as claimed in claim 2, which is characterized in that the processor is also used to execute described based on alliance's chain Transaction supervisory systems, to perform the steps of
Encryption using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering Public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
4. electronic device as claimed in claim 3, which is characterized in that the processor is also used to execute described based on alliance's chain Transaction supervisory systems, to perform the steps of
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added To in the transaction body.
5. a kind of transaction monitoring and managing method based on alliance's chain, which is characterized in that the transaction monitoring and managing method packet based on alliance's chain It includes:
Obtain preset encryption key pair, and by the encryption key to being synchronized to preset monitoring party;
The Transaction Information that initiator determines of trading on alliance's chain is added using the encryption key of the encryption key centering It is close, generate encrypting transactions data;
The encrypted public key of the encryption key centering is encrypted using the preset recipient's public key in transaction acceptance side, generation connects Debit's encrypted public key;By the encrypting transactions data and recipient's encrypted public key composition transaction body;
Transaction is initiated, on alliance's chain based on the transaction body so that the transaction acceptance side is private by preset recipient Key is decrypted to obtain the encrypted public key of the encryption key centering to recipient's encrypted public key in the transaction body, and utilizes The Transaction Information determined is decrypted to the encrypting transactions data in the transaction body in the encrypted public key decrypted, completes With the transaction of the transaction initiator;The monitoring party is according to the encrypted public key of the encryption key centering synchronized to institute The Transaction Information determined is decrypted in the encrypting transactions data stated in transaction body, supervises to Transaction Information.
6. as claimed in claim 5 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that the transaction initiator determines Good Transaction Information includes transaction business data and transaction content data, the encryption key using the encryption key centering The step of encrypting to the Transaction Information that determines of initiator of trading on alliance's chain, generate encrypting transactions data include:
The transaction content data in the Transaction Information are encrypted using the encryption key of the encryption key centering, are generated Encrypt transaction content data;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key composition transaction body.
7. as claimed in claim 6 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that further include:
Encryption using informed side's public key of the informed square node of third party default on alliance's chain to the encryption key centering Public key is encrypted, and square encrypted public key of knowing is generated;
It is described to include: by the encrypting transactions data and recipient's encrypted public key composition transaction body
By transaction business data, encryption transaction content data, recipient's encrypted public key and square encrypted public key composition transaction body of knowing.
8. as claimed in claim 7 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that further include:
Obtain preset signature key pair;
Corresponding cryptographic Hash is calculated using hashing algorithm to the entire transaction body, and utilizes the signature of the signature key centering The cryptographic Hash that private key calculates the entire transaction body encrypts, and obtains cryptographic hash, and the cryptographic hash is added To in the transaction body.
9. as claimed in claim 8 based on the transaction monitoring and managing method of alliance's chain, which is characterized in that further include:
The cryptographic hash in transaction body that the transaction acceptance side is received using the public signature key of the signature key centering It is decrypted, the cryptographic Hash decrypted;
The transaction body received to the transaction acceptance side calculates corresponding cryptographic Hash using hashing algorithm, by the cryptographic Hash of calculating with The cryptographic Hash of decryption is compared;
If the cryptographic Hash calculated is identical as the cryptographic Hash of decryption, based on the transaction body completion transaction acceptance side with it is described The transaction of transaction initiator;
If the cryptographic Hash calculated is different from the cryptographic Hash of decryption, process of closing the trade.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on connection The transaction supervisory systems of alliance's chain realizes such as claim 5 when the transaction supervisory systems based on alliance's chain is executed by processor The step of to transaction monitoring and managing method described in any one of 9 based on alliance's chain.
CN201810618522.6A 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium Active CN109034796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810618522.6A CN109034796B (en) 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810618522.6A CN109034796B (en) 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium

Publications (2)

Publication Number Publication Date
CN109034796A true CN109034796A (en) 2018-12-18
CN109034796B CN109034796B (en) 2023-09-22

Family

ID=64609745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810618522.6A Active CN109034796B (en) 2018-06-15 2018-06-15 Alliance chain-based transaction supervision method, electronic device and readable storage medium

Country Status (1)

Country Link
CN (1) CN109034796B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816525A (en) * 2018-12-27 2019-05-28 石更箭数据科技(上海)有限公司 A kind of data processing method and its device, medium, terminal
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110474908A (en) * 2019-08-16 2019-11-19 微位(深圳)网络科技有限公司 Transaction monitoring and managing method and device, storage medium and computer equipment
CN110519059A (en) * 2019-09-29 2019-11-29 四川师范大学 A kind of block chain dual key concealment address processing method based on bilinear map
CN110808999A (en) * 2019-11-12 2020-02-18 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium
CN110855631A (en) * 2019-10-24 2020-02-28 南京可信区块链与算法经济研究院有限公司 Monitorable zero knowledge verification method and system in block chain and storage medium
CN111177259A (en) * 2019-12-13 2020-05-19 杭州复杂美科技有限公司 Parallel chain transaction encryption method, device and storage medium
CN111698192A (en) * 2019-03-13 2020-09-22 华为技术有限公司 Method for monitoring transaction system, transaction device, monitoring device and system
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium
CN112749965A (en) * 2019-10-30 2021-05-04 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184495A (en) * 2011-04-21 2011-09-14 北京天地融科技有限公司 Network payment method and system
CN103108245A (en) * 2011-11-15 2013-05-15 中国银联股份有限公司 Smart television payment secret key system and payment method based on smart television
CN104751364A (en) * 2013-12-30 2015-07-01 上海方付通商务服务有限公司 Security certification type trans-regional direct-selling bank alliance transaction method and system
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN106534097A (en) * 2016-10-27 2017-03-22 上海亿账通区块链科技有限公司 Block chain trading based authority control method and system
CN106685989A (en) * 2017-02-07 2017-05-17 杭州秘猿科技有限公司 Privacy communication method based on license chain support and supervision
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
JP2017204704A (en) * 2016-05-10 2017-11-16 日本電信電話株式会社 Validity guarantee method, validity guarantee system and validity guarantee program
US20180158051A1 (en) * 2016-12-01 2018-06-07 Mastercard International Incorporated Method and system for payment card verification via blockchain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184495A (en) * 2011-04-21 2011-09-14 北京天地融科技有限公司 Network payment method and system
CN103108245A (en) * 2011-11-15 2013-05-15 中国银联股份有限公司 Smart television payment secret key system and payment method based on smart television
CN104751364A (en) * 2013-12-30 2015-07-01 上海方付通商务服务有限公司 Security certification type trans-regional direct-selling bank alliance transaction method and system
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
JP2017204704A (en) * 2016-05-10 2017-11-16 日本電信電話株式会社 Validity guarantee method, validity guarantee system and validity guarantee program
CN106534097A (en) * 2016-10-27 2017-03-22 上海亿账通区块链科技有限公司 Block chain trading based authority control method and system
US20180158051A1 (en) * 2016-12-01 2018-06-07 Mastercard International Incorporated Method and system for payment card verification via blockchain
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN106685989A (en) * 2017-02-07 2017-05-17 杭州秘猿科技有限公司 Privacy communication method based on license chain support and supervision
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
DIANLI GUO, 等: "Adaptively Secure Broadcast Encryption With Constant Ciphertexts" *
MAKOTO SATO,等: "Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking" *
孙媛媛: "基于信任链的P2P可信身份认证模型的研究与设计" *
庹小忠: "基于区块链的加密信息备份系统研究与设计" *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816525A (en) * 2018-12-27 2019-05-28 石更箭数据科技(上海)有限公司 A kind of data processing method and its device, medium, terminal
CN111698192B (en) * 2019-03-13 2021-12-03 华为技术有限公司 Method for monitoring transaction system, transaction device, monitoring device and system
CN111698192A (en) * 2019-03-13 2020-09-22 华为技术有限公司 Method for monitoring transaction system, transaction device, monitoring device and system
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110474908A (en) * 2019-08-16 2019-11-19 微位(深圳)网络科技有限公司 Transaction monitoring and managing method and device, storage medium and computer equipment
CN110519059A (en) * 2019-09-29 2019-11-29 四川师范大学 A kind of block chain dual key concealment address processing method based on bilinear map
CN110855631B (en) * 2019-10-24 2022-05-17 南京可信区块链与算法经济研究院有限公司 Method, system and storage medium for verifying supervision-capable zero knowledge in block chain
CN110855631A (en) * 2019-10-24 2020-02-28 南京可信区块链与算法经济研究院有限公司 Monitorable zero knowledge verification method and system in block chain and storage medium
CN112749965A (en) * 2019-10-30 2021-05-04 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium
CN112749965B (en) * 2019-10-30 2024-04-09 深圳市迅雷网络技术有限公司 Information monitoring method, system, equipment and storage medium
CN110808999A (en) * 2019-11-12 2020-02-18 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium
CN111177259A (en) * 2019-12-13 2020-05-19 杭州复杂美科技有限公司 Parallel chain transaction encryption method, device and storage medium
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium
WO2022126967A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Blockchain-based data supervision method, apparatus and device, and storage medium

Also Published As

Publication number Publication date
CN109034796B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
CN109034796A (en) Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
US10164778B2 (en) Method and system for distributing attestation key and certificate in trusted computing
US10142107B2 (en) Token binding using trust module protected keys
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN109064324A (en) Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
TW201918049A (en) Trusted remote attestation method, device and system capable of ensuring information security without causing an influence on the operation of the server terminal during the policy deployment process
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
CN110800250A (en) Controlled distribution of encrypted private keys
EP3780484B1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
TW202015378A (en) Cryptographic operation method, method for creating work key, and cryptographic service platform and device
CN104836784B (en) A kind of information processing method, client and server
US10439809B2 (en) Method and apparatus for managing application identifier
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN111027981B (en) Method and device for multi-party joint training of risk assessment model for IoT (Internet of things) machine
US11416821B1 (en) Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
WO2018112482A1 (en) Method and system for distributing attestation key and certificate in trusted computing
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN111327419A (en) Method and system for resisting quantum computation block chain based on secret sharing
CN109660344A (en) Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pond route device
CN110677253B (en) Anti-quantum computation RFID authentication method and system based on asymmetric key pool and ECC
CN104820807B (en) A kind of intelligent card data processing method
WO2023284691A1 (en) Account opening method, system, and apparatus
CN109816525A (en) A kind of data processing method and its device, medium, terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230825

Address after: 518000, Building 2410, Building 2, Research and Development Building 1 and 2, Fangda Plaza (Phase I), North Ring Avenue, Taoyuan Community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong Province

Applicant after: Anda Data Technology (Shenzhen) Co.,Ltd.

Address before: 400010 38 / F, 39 / F, unit 1, 99 Wuyi Road, Yuzhong District, Chongqing

Applicant before: CHONGQING FINANCIAL ASSETS EXCHANGE Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant