CN110223053A - A kind of data trade method and its equipment - Google Patents

A kind of data trade method and its equipment Download PDF

Info

Publication number
CN110223053A
CN110223053A CN201910499750.0A CN201910499750A CN110223053A CN 110223053 A CN110223053 A CN 110223053A CN 201910499750 A CN201910499750 A CN 201910499750A CN 110223053 A CN110223053 A CN 110223053A
Authority
CN
China
Prior art keywords
data
client
public key
service server
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910499750.0A
Other languages
Chinese (zh)
Inventor
杨慧
吉建勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910499750.0A priority Critical patent/CN110223053A/en
Publication of CN110223053A publication Critical patent/CN110223053A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of data trade method and its equipment, in this method: the service server receives the data cochain request of the first client;Execute the data uplink operation;Receive the purchase request of the second client transmission;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the address remaining sum of second client, and freezes the purchasing price of the data;Receive the transaction request of second client;It is decrypted with private key to the data of the service server public key encryption, and the data encryption with second client public key to decryption, obtains the data of the second client public key encryption;The intelligent contract of triggering transaction, the intelligent contract of the transaction execute transferring accounts for the purchasing price, and the data cochain that second client public key is encrypted.This method can allow the transaction cochain of data to ensure the interests of data owner and data purchaser both sides so that the process of exchange of data is open and clear.

Description

A kind of data trade method and its equipment
Technical field
This application involves block chain technical field more particularly to a kind of data trade methods and its equipment.
Background technique
Currently, block chain, Internet of Things and artificial intelligence are listed as three big technologies of future technology.Block chain technology is base In the peer-to-peer network of decentralization, Cryptography Principles, time series data and common recognition mechanism are combined with open source software, to ensure point Each node is coherent and lasting in cloth database, so that information is verified, is can be traced immediately, but be difficult to tamper with and can not shield, To create a set of privacy, shareable value system efficiently, safe.
However, transferring accounts for digital cash can only be carried out on current block chain, the transaction of data can't be carried out;Data are handed over Easy scene is more and more.
Therefore, it needs to find a kind of method for carrying out data trade on block chain.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill Art.
Summary of the invention
To solve the above-mentioned problems, the application provides a kind of data trade method and its equipment, and this method can allow data Transaction cochain, on block chain carry out data transaction.
The application first aspect provides a kind of data trade method, which comprises
The service server receives the data cochain request of the first client, and the data cochain request includes with first The data of client public key encryption, and with the data of service server public key encryption and the setting price of the data;
The service server executes the data uplink operation;
The service server receives the purchase request that the second client is sent, and the purchase request includes the data Purchasing price, the purchasing price include the setting price of the data;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the address remaining sum of second client, And freeze the purchasing price of the data;
The service server receives the transaction request of second client;
The service server is decrypted with private key to the data of the service server public key encryption, and described in use Data encryption of second client public key to decryption obtains the data of the second client public key encryption;
Triggering is traded intelligent contract, and the transaction intelligence contract executes transferring accounts for the purchasing price, and by described second The data cochain of client public key encryption.
In one possible implementation, the method also includes: the service server receives second client Hold the data inquiry request sent;The service server is sent to the second client data inquiry response, the data Inquiry response includes the data of the second client public key encryption, in order to which the second client own private key is to described The data of second client public key encryption are decrypted.
In one possible implementation, the data purchasing price further includes the service charge of the service server.
In one possible implementation, the data be business datum, the business datum include relating attribute and Dereferenced attribute;Wherein, the attribute value of the relating attribute is superimposed automatically.
In one possible implementation, the first client own public key is to the data encryption, specifically: First client carries out the encryption of preset ratio with own public key to the data;And/or service server institute The public key of the second client is stated to the data encryption, specifically: the public key of the service server second client The data are carried out with the encryption of preset ratio.
The application second aspect provides a kind of equipment for data exchanging, and the equipment for data exchanging is service server, described Service server is block chain node, and the service server includes receiving unit and processing unit;Wherein,
The receiving unit receives the data cochain request of the first client, and the data cochain request includes with first The data of client public key encryption, and with the data of service server public key encryption and the setting price of the data;
The processing unit executes the data uplink operation;
The receiving unit receives the purchase request that the second client is sent, and the purchase request includes the data Purchasing price, the purchasing price include the setting price of the data;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the address of second client Remaining sum is verified, and freezes the purchasing price of the data;
The receiving unit receives the transaction request of second client;
The processing unit is decrypted with private key to the data of the service server public key encryption, and described in use Data encryption of second client public key to decryption obtains the data of the second client public key encryption;
The processing unit, the intelligent contract of triggering transaction, the intelligent contract of the transaction execute transferring accounts for the purchasing price, And the data cochain for encrypting second client public key.
In one possible implementation, the receiving unit receives the data query that second client is sent Request;
The transmission unit is sent to the second client data inquiry response, and the data query response includes institute The data of the second client public key encryption are stated, in order to which the second client own private key is to second client public key The data of encryption are decrypted.
In one possible implementation, the purchasing price further includes the service charge of the service server.
In one possible implementation, the data be business datum, the business datum include relating attribute and The attribute value of dereferenced attribute, the relating attribute is superimposed automatically.
In one possible implementation, the first client own public key is to the data encryption, specifically: First client carries out the encryption of preset ratio with own public key to the data;And/or
The public key of the service server second client to the data encryption, specifically: the business clothes Business device carries out the encryption of preset ratio with the public key of second client to the data.
This method can allow the transaction cochain of data to ensure that data are all so that the process of exchange of data is open and clear The interests of person and data purchaser both sides, entire process of exchange is more credible.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of data trade method flow schematic diagram provided by the embodiments of the present application;
Fig. 2 is another data trade method flow schematic diagram provided by the embodiments of the present application;
Fig. 3 is a kind of equipment for data exchanging structural schematic diagram provided by the embodiments of the present application.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other Step or unit.
So-called client in the embodiment of the present application, it can be understood as respond extraneous certain trigger condition, and by a set pattern The abstract machine of state conversion is then done, can be mobile phone, tablet computer, palm PC, individual's PC computer etc. can be according to application Software and the equipment that can be networked.
As shown in Figure 1, a kind of data trade method, the data trade method is applied in the equipment for data exchanging, The equipment for data exchanging is service server, and the service server is block chain node, and the method includes the steps S101- S107。
S101, the service server receive the data cochain request of the first client, and the data cochain request includes The data encrypted with the first client public key, and with the data of service server public key encryption and the setting valence of the data Lattice.
In one example, the data are business datum, and the business datum includes relating attribute and dereferenced attribute; Wherein, the attribute value of the relating attribute is superimposed automatically.
S102, the service server execute the data uplink operation.
S103, the service server receive the purchase request that the second client is sent, and the purchase request includes described The purchasing price of data, the purchasing price include the setting price of the data.
In one example, the purchasing price further includes the service charge of the service server.
S104, triggering verify intelligent contract, and the intelligence contract that verifies carries out the address remaining sum of second client Verification, and freeze the purchasing price of the data.
S105, the service server receive the transaction request of second client.
S106, the service server are decrypted with private key to the data of the service server public key encryption, and Data encryption with second client public key to decryption obtains the data of the second client public key encryption.
S107, the intelligent contract of triggering transaction, the intelligent contract of the transaction execute transferring accounts for the purchasing price, and will be described The data cochain of second client public key encryption.
Below by taking Fig. 2 as an example, the data trade process for being also block chain node to above-mentioned service server is illustrated, should Data method includes S201-S214.
First client is data owner, and the second client is data purchaser, and service server is data trade Secondary server, while being also block chain node.
S201, the first client encrypt data own public key a while a with service server public key encryption.
Data in the application are business datum.The business datum is divided into two attribute, relating attribute and dereferenced category Property.Such as: user comment content belongs to dereferenced attribute, and the comment content of every user may be stored on block chain;When When one businessman needs to buy the evaluation of certain part commodity, which can buy the evaluation of the commodity to multiple users, from block It is operated on chain, it is open and clear, the interests of businessman and user can be ensured simultaneously.Such as: the quantity of user comment content, just It is relating attribute, includes number of reviews in the business datum format of a commodity, it, should as long as there is user to comment on the commodity The number of reviews of commodity can be superimposed automatically;Another example is: in the application business datum transaction count, be relating attribute, the business The every transaction of data is primary, which increases by 1 automatically.
S202, the first client send cochain and request to service server, include the default valence of data in cochain request Lattice and above-mentioned two parts of encryption datas.
Two parts of encryption datas are executed uplink operation by S203, service server.
At this point, chain process in business datum, the application without associated description, such as: in the common recognition of proof of work PoW Under mechanism, after being packaged and being verified, it is synchronous that node broadcasts to all nodes carry out data.
S204, service server send cochain and respond to first client.
S205, the second client send purchase request and give the service server, and purchase request includes purchasing price, the purchase Price includes the default price of data, further includes transactional services expense, the service charge which takes for service server.The purchase Buying request further includes wanting the data of purchase.
Second client is the buyer of data, and the purchase request of the business datum is issued on block chain;It can look into After asking the business datum, then purchase is sent to block chain node and is requested.At this point, further including the number for wanting purchase in purchase request According to the mode of the data of purchase is wanted in instruction here, can be Data Identification;It is also possible to the corresponding user of the second client, After user views the data for wanting purchase on a second client, purchase is clicked directly on.
At this point, the first client encrypts the business datum with own public key, it can be and carry out Partial key field Encryption, is also possible to be encrypted (such as: encrypting 2/3rds of the business datum) purchase of the business datum according to preset ratio Buyer can not check the business datum in the case where not buying.
Include the scheduled price of the owner of the business datum in purchase request, further includes transactional services expense, that is, The transactional services of service server are taken;Transactional services expense has the buyer of the business datum to pay.
The buyer of business datum needs to possess digital cash, and the purchase of business datum could be carried out on block chain;Industry The digital cash that business data purchaser possesses, can be as the another kind of business datum owner, sells the another kind of business number According to digital cash obtained;The digital cash can use on the block chain.The application is to this without being described in detail.
S206 triggers the verification intelligence contract on block chain, digital cash of the verification intelligence contract to the second client The remaining sum of address is verified, and after confirmation remaining sum is sufficient, freezes the purchasing price.
At this point, just needing to freeze the purchasing price of the data after verification passes through;If verification does not pass through, i.e. the second client The corresponding remaining sum in address is less than or equal to the data purchasing price, then does not need the remaining sum for freezing the second client address, will not Execute subsequent step.
S207, the service server send purchase and respond to second client.
At this point, service server tells the second client, the data for having the second client wants to want on block chain.
S208, the second client send transaction request to service server.
S209, service server are decrypted with own private key to the data of service server public key encryption, after secret, With the second client (buyer) public key encryption.
S210, triggering are traded intelligent contract, and the purchasing price for executing the second client is transferred accounts, and by the second client public key The data of encryption execute uplink operation.
S211, service server send transaction and respond to the second client.
S212, the second client send business datum inquiry request to service server.
S213, service server send business datum inquiry response to the second client, in the business datum inquiry response Including the data encrypted with the second client public key.
This is decrypted with the data that the second client public key encrypts with own private key for S214, the second client.
It should be noted that verifying intelligent contract in the process of exchange of the application and intelligent contract of trading, can be same A intelligence contract, is also possible to two different intelligent contracts.The data trade process of the application, whole process of exchange data All it is stored on chain, it is open and clear, to ensure the interests of both parties.
As shown in figure 3, a kind of equipment for data exchanging, the equipment for data exchanging is service server, the business service Device is block chain node, and the service server includes receiving unit and processing unit.
The receiving unit receives the data cochain request of the first client, and the data cochain request includes with first The data of client public key encryption, and with the data of service server public key encryption and the setting price of the data;
The processing unit executes the data uplink operation;
The receiving unit receives the purchase request that the second client is sent, and the purchase request includes the data Purchasing price, the purchasing price include the setting price of the data;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the address of second client Remaining sum is verified, and freezes the purchasing price of the data;
The receiving unit receives the transaction request of second client;
The processing unit is decrypted with private key to the data of the service server public key encryption, and described in use Data encryption of second client public key to decryption obtains the data of the second client public key encryption;
The processing unit, the intelligent contract of triggering transaction, the intelligent contract of the transaction execute transferring accounts for the purchasing price, And the data cochain for encrypting second client public key.
In one example, the purchasing price further includes the service charge of the service server;The data are business Data, the business datum include relating attribute and dereferenced attribute, and the attribute value of the relating attribute is superimposed automatically.
In one example, the first client own public key is to the data encryption, specifically: first visitor Family end carries out the encryption of preset ratio with own public key to the data;And/or the service server is with second client The public key at end to the data encryption, specifically: the service server is with the public key of second client to the data Carry out the encryption of preset ratio.
In one example, the receiving unit receives the data inquiry request that second client is sent;The hair Unit is sent, the second client data inquiry response is sent to, the data query response includes that second client is public The data of key encryption, in order to which second client is carried out with the data that own private key encrypts second client public key Decryption.
This method can allow the transaction cochain of data to ensure that data are all so that the process of exchange of data is open and clear The interests of person and data purchaser both sides, entire process of exchange is more credible.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. a kind of data trade method, which is characterized in that the described method includes:
The service server receives the data cochain request of the first client, and the data cochain request includes with the first client The data of public key encryption are held, and with the data of service server public key encryption and the setting price of the data;
The service server executes the data uplink operation;
The service server receives the purchase request that the second client is sent, and the purchase request includes the purchase of the data Price, the purchasing price include the setting price of the data;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the address remaining sum of second client, and freezes Tie the purchasing price of the data;
The service server receives the transaction request of second client;
The service server is decrypted with private key to the data of the service server public key encryption, and with described second Data encryption of the client public key to decryption obtains the data of the second client public key encryption;
Triggering is traded intelligent contract, and the transaction intelligence contract executes transferring accounts for the purchasing price, and by second client Hold the data cochain of public key encryption.
2. the method according to claim 1, wherein the method also includes:
The service server receives the data inquiry request that second client is sent;
The service server is sent to the second client data inquiry response, and the data query response includes described the The data of two client public keys encryption, in order to which the second client own private key encrypts second client public key Data be decrypted.
3. the method according to claim 1, wherein the data purchasing price further includes the service server Service charge.
4. the business datum includes the method according to claim 1, wherein the data are business datum Relating attribute and dereferenced attribute;Wherein, the attribute value of the relating attribute is superimposed automatically.
5. the method according to claim 1, wherein the first client own public key adds the data It is close, specifically: first client carries out the encryption of preset ratio with own public key to the data;And/or
The public key of the service server second client to the data encryption, specifically: the service server With the public key of second client data are carried out with the encryption of preset ratio.
6. a kind of equipment for data exchanging, which is characterized in that the equipment for data exchanging is service server, the service server For block chain node, the service server includes receiving unit and processing unit;Wherein,
The receiving unit receives the data cochain request of the first client, and the data cochain request includes with the first client The data of public key encryption are held, and with the data of service server public key encryption and the setting price of the data;
The processing unit executes the data uplink operation;
The receiving unit, receives the purchase request that the second client is sent, and the purchase request includes the purchase of the data Price, the purchasing price include the setting price of the data;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the address remaining sum of second client It is verified, and freezes the purchasing price of the data;
The receiving unit receives the transaction request of second client;
The processing unit is decrypted with private key to the data of the service server public key encryption, and with described second Data encryption of the client public key to decryption obtains the data of the second client public key encryption;
The processing unit, the intelligent contract of triggering transaction, the intelligent contract of the transaction execute transferring accounts for the purchasing price, and will The data cochain of the second client public key encryption.
7. equipment according to claim 6, which is characterized in that
The receiving unit receives the data inquiry request that second client is sent;
The transmission unit, is sent to the second client data inquiry response, and the data query response includes described the The data of two client public keys encryption, in order to which the second client own private key encrypts second client public key Data be decrypted.
8. equipment according to claim 6, which is characterized in that the purchasing price further includes the clothes of the service server Business expense.
9. equipment according to claim 6, which is characterized in that the data are business datum, and the business datum includes Relating attribute and dereferenced attribute, the attribute value of the relating attribute are superimposed automatically.
10. equipment according to claim 6, which is characterized in that the first client own public key is to the data Encryption, specifically: first client carries out the encryption of preset ratio with own public key to the data;And/or
The public key of the service server second client to the data encryption, specifically: the service server With the public key of second client data are carried out with the encryption of preset ratio.
CN201910499750.0A 2019-06-11 2019-06-11 A kind of data trade method and its equipment Pending CN110223053A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910499750.0A CN110223053A (en) 2019-06-11 2019-06-11 A kind of data trade method and its equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910499750.0A CN110223053A (en) 2019-06-11 2019-06-11 A kind of data trade method and its equipment

Publications (1)

Publication Number Publication Date
CN110223053A true CN110223053A (en) 2019-09-10

Family

ID=67816241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910499750.0A Pending CN110223053A (en) 2019-06-11 2019-06-11 A kind of data trade method and its equipment

Country Status (1)

Country Link
CN (1) CN110223053A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599201A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Information processing method, device, node equipment of block chain network and storage medium
CN111353853A (en) * 2020-02-28 2020-06-30 广东工业大学 Automatic bargaining method and related device based on intelligent contract and multi-party security calculation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503574A (en) * 2016-09-13 2017-03-15 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN108876383A (en) * 2018-08-27 2018-11-23 广东工业大学 A kind of data trade method, device and equipment based on block chain
CN109462588A (en) * 2018-11-13 2019-03-12 上海物融智能科技有限公司 A kind of decentralization data trade method and system based on block chain
CN109493020A (en) * 2018-11-08 2019-03-19 众安信息技术服务有限公司 Method for secure transactions and device based on block chain
CN109658240A (en) * 2018-11-20 2019-04-19 深圳变设龙信息科技有限公司 A kind of data trade method, apparatus and terminal device based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503574A (en) * 2016-09-13 2017-03-15 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN108876383A (en) * 2018-08-27 2018-11-23 广东工业大学 A kind of data trade method, device and equipment based on block chain
CN109493020A (en) * 2018-11-08 2019-03-19 众安信息技术服务有限公司 Method for secure transactions and device based on block chain
CN109462588A (en) * 2018-11-13 2019-03-12 上海物融智能科技有限公司 A kind of decentralization data trade method and system based on block chain
CN109658240A (en) * 2018-11-20 2019-04-19 深圳变设龙信息科技有限公司 A kind of data trade method, apparatus and terminal device based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599201A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Information processing method, device, node equipment of block chain network and storage medium
CN111353853A (en) * 2020-02-28 2020-06-30 广东工业大学 Automatic bargaining method and related device based on intelligent contract and multi-party security calculation
CN111353853B (en) * 2020-02-28 2023-05-09 广东工业大学 Automatic bargaining method and related device based on intelligent contract and multiparty security calculation

Similar Documents

Publication Publication Date Title
US11223477B2 (en) Data sharing method, client, server, computing device, and storage medium
CN110009356B (en) A kind of business datum cochain method and its system based on block chain
AU2019325661B2 (en) Multi-blockchain digital transaction information segregation system
EP3537684B1 (en) Apparatus, method, and program for managing data
CN110210977A (en) A kind of data trade method and its equipment
CN110225032A (en) A kind of method of commerce and its equipment of business datum
CN108537047B (en) Method and device for generating information based on block chain
CN110134930A (en) Electronic contract management method, device, computer equipment and storage medium
US20190386968A1 (en) Method to securely broker trusted distributed task contracts
CN110210976A (en) A kind of method of commerce and its equipment based on block chain
CN110223053A (en) A kind of data trade method and its equipment
CN110766548A (en) Block chain based information processing method and device, storage medium and electronic equipment
CN112600830B (en) Service data processing method and device, electronic equipment and storage medium
CN110210975A (en) Data trade method and its equipment on block chain
CN110210861A (en) Data trade method and its equipment on block chain
US20040117220A1 (en) Secure system and method for self-management of customer relationship management database
CN111597060B (en) Data calling method and device, computer equipment and storage medium
CN110223065A (en) Business datum method of commerce and its equipment on a kind of chain
CN117036023A (en) Method, system, equipment and medium for identifying abnormal transaction network in meta universe
CN110210860A (en) Business datum method of commerce and its equipment on block chain
CN110189130A (en) Method of commerce and its equipment on block chain
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN110210862A (en) A kind of method of commerce and its equipment of business datum
CN111131227B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085

Applicant after: Beijing ruice Technology Co.,Ltd.

Address before: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085

Applicant before: BEIJING AIMORECE TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190910

RJ01 Rejection of invention patent application after publication