CN110224817A - A kind of software popularization intelligent service system and method based on block chain technology - Google Patents

A kind of software popularization intelligent service system and method based on block chain technology Download PDF

Info

Publication number
CN110224817A
CN110224817A CN201910455460.6A CN201910455460A CN110224817A CN 110224817 A CN110224817 A CN 110224817A CN 201910455460 A CN201910455460 A CN 201910455460A CN 110224817 A CN110224817 A CN 110224817A
Authority
CN
China
Prior art keywords
user
contract
token
block chain
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910455460.6A
Other languages
Chinese (zh)
Inventor
秦波
王帅
伍前红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Renmin University of China
Original Assignee
Renmin University of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Renmin University of China filed Critical Renmin University of China
Priority to CN201910455460.6A priority Critical patent/CN110224817A/en
Publication of CN110224817A publication Critical patent/CN110224817A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of, and the software based on block chain technology promotes intelligent service system and method comprising: data memory module and block platform chain in the outer data desensitization module of chain, chain;The outer data desensitization module of the chain generates disposable symmetric key, and encrypt user information using symmetric encipherment algorithm for carrying out recoverable desensitization process to user information data;Data memory module on the chain realizes relevant service logic for that will encrypt user information and token transactions record storage to the block platform chain, and by intelligent contract.The present invention can be widely applied in software Extension Software Platform and its application.

Description

A kind of software popularization intelligent service system and method based on block chain technology
Technical field
The present invention relates to block chain technical fields, promote Intellectual garment more particularly to a kind of software based on block chain technology System and method of being engaged in concretely are related to a kind of based on the software popularization intelligent service system of intelligent contract technology realization and side Method.
Background technique
A successful application software, software development are the first step, than exploitation more importantly the operation of software.It answers Be also required to constantly pack publicity with software, manufacture topic and attract the use of user, at the same needs continue to introduce new it is interior Hold and activity carrys out the operation of support applications software, otherwise high software can also die out quickly among the mankind visual field quality again.? Current software operation in the market, carries out the popularization of application software there are no a gem-pure channel and method so far, Everybody is also in the stage of fumbling continuously attempted to.Other than conventional apple and Android application market, other popularization sides Formula, each Internet enterprises are different according to the difference of own resource and condition.So the listing and popularization of a application software, Except traditional channels mode, how block chain technology is combined, excavate the need of user and platform developer It asks, realizes that effective popularization is the direction of a very worth research, wherein the basis studied is block chain technology.
Programmer Vitalik Buterin proposes this concept of ether mill between 2013 to 2014.In ether mill Most important technology is exactly intelligent contract technology, and intelligence contract technological borrowing bit coin block chain technology carries out it The expansion of application.Intelligent contract is the computer program that can be performed automatically, the ginseng of itself or a system With person, storage message can receive, and received message is responded, while can also externally send message.Intelligent contract Operation execution always is carried out according to the rule set in advance, the people that it can be trusted as one, preservation information that can be interim And assets.Ether mill is directed at the computing platform that the spirit of foundation figure is complete in block chain network.
Based on ether mill block chain technology, how in the Internet user of magnanimity user is accurately obtained? it is at this Under the mobile Internet background of sample, one is how effectively carry out software popularization the problem of highly thinking. And current software channels there are brush nonoculture disadvantage, retain that conversion ratio is low, user enlivens that rate is low, accurate user's difficulty is big, (dimension Shield, is linked up at follow-up) the business pain spot such as at high cost.
Summary of the invention
In view of the above-mentioned problems, the object of the present invention is to provide a kind of, the software based on block chain technology promotes intelligent Service system System and method, to solve the problems, such as that user's retention ratio is low with rate is enlivened.
To achieve the above object, the present invention takes following technical scheme: a kind of software popularization intelligence based on block chain technology Energy service system comprising: data memory module and block platform chain in the outer data desensitization module of chain, chain;The outer data of the chain Desensitize module, for carrying out recoverable desensitization process to user information data, generates disposable symmetric key, and based on life At symmetrical code key using symmetric encipherment algorithm encryption desensitization process after user information;Data memory module on the chain is used In encrypted desensitization user information and token transactions record storage are realized to the block platform chain, and by intelligent contract Relevant service logic.
Further, on the chain data memory module by intelligent contract realize relevant service logic refer to use with Too the intelligent contract in mill is as the interface for accessing the block platform chain;The intelligent contract in the ether mill includes ERC20 API Contract " ERC20 Interface ", ERC20 api function specific implementation contract " SoftwareToken ", contract control " AccessControl " and user management contract " UserManager ";The inheritance of each intelligent contract are as follows: the use Family management agreement " UserManager " is inherited from ERC20 api function specific implementation contract " SoftwareToken " and closes " AccessControl " about is controlled, ERC20 api function specific implementation contract " SoftwareToken " is inherited from described ERC20 API contract " ERC20Interface ".
Further, the ether mill intelligence contract that data memory module uses on the chain is divided into three big modules: ERC20 generation The definition of coin interface and realization module, contract control module and user management module;The ERC20 token interface definition and realization mould Block includes that the ERC20 API contract " ERC20Interface " and ERC20 api function implement contract " SoftwareToken " for defining title, symbol, the minimum unit, total supply of token, and records the generation between user Coin money transfer transactions;The contract control module includes contract control " AccessControl ", for defining the control of contract The operating status of person and contract;The user management module includes the user management contract " UserManager ", is used for root The definition information of module and contract control module is defined and realized according to the ERC20 token interface, realizes entire intelligent contract industry Business executes operation, including the update of user's registration, user information, user log off, user enliven duration management and user query.
A kind of software based on block chain technology promotes the method for servicing of intelligent service system comprising following steps:
1) the token reward mechanism based on ERC20 standard is used, contacting between user and application software is established;
2) recoverable desensitization process carried out to the user information that is input in application software, and by the use after desensitization process Block platform chain is arrived in storage after the encryption of family information;
3) it based on the user information stored in block platform chain, is realized using intelligent contract and improves software popularization degree, user The service logic of viscosity.
Further, it in the step 3), based on the user information stored in block platform chain, is realized using intelligent contract Improve software popularization degree, user's viscosity service logic method, comprising the following steps:
3.1) it defines by ERC20 token interface and realizes module, to the title of token, symbol, minimum unit and supply Total amount is defined, and records the token money transfer transactions between user;
The process of token money transfer transactions between the user are as follows:
1. judging whether transfer amounts are greater than 0, if it is, continuing step 2., otherwise transfer accounts unsuccessfully;
2. judging whether sender's account balance is greater than transfer amounts, if it is, continuing step 3., otherwise transfer accounts Failure;
3. judging whether recipient's account balance is greater than former remaining sum plus transfer amounts, if it is, continuing step 4. otherwise transferring accounts unsuccessfully;
4. success of transferring accounts, sender's account balance updates, and recipient's account balance updates, and triggers event of transferring accounts, transaction It charges among block chain;
3.2) controller of contract and the operating status of contract are defined by contract control module, and are sent to User management module;
3.3) related definition obtained based on step 3.1) and step 3.2) realizes entire intelligence by user management module Contract business executes operation, including the update of user's registration, user information, user log off, user enlivens duration management and user looks into It askes.
Further, in the step 3.3), the process of the user's registration are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise registration failure;
2. judge whether the sender of transaction is CEO account, if it is, continue step 3., otherwise registration failure;
3. whether judge user registered, if do not registered, continue step 4., otherwise registration failure;
4. judging whether user information format is legal, then continue step 5. if legal, otherwise registration failure;
5. step is carried out 6. if user is registered using registered account invitation code, if not using other Account invitation code then directly carries out token reward to the login account, and will provide prize record and user encryption information and charge to Block chain;
6. carrying out token reward simultaneously to invitation code account and login account is provided, and prize record will be provided and user adds Confidential information charges to block chain.
Further, in the step 3.3), the process of the user information update are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise updated;
2. whether judge User ID format legal, if it is, continuing step 3., failure is otherwise updated;
3. judging whether it is user's update, if it is, continuing step 4., failure is otherwise updated;
4. updating user information, block chain will be charged to after updated user information encryption.
Further, in the step 3.3), the process of the user log off are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise nullified;
2. judging whether transaction sender is CEO account, if it is not, then continuing step 3., if it is CEO account Family then nullifies and fails, we are not provided with CEO permission and carry out user log off;
3. judging whether it is user to be unregistered, if it is, continuing step 4., failure is otherwise nullified;
4. deleting user information;
5. recycling account residue token;
6. deleting account information;
7. Logout Events charge to block chain.
Further, in the step 3.3), the user enlivens the process of duration management are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., otherwise duration management is called to hand over Easily failure;
2. judge whether transaction sender is CEO account, if it is, continue step 3., long tube when otherwise calling Manage Fail Transaction;
3. judging that user enlivens whether duration is greater than minimum limitation, if it is, continuing step 4., otherwise user is infused Pin;
4. it is accumulative that user enlivens duration;
5. carrying out token reward to any active ues, and block chain is charged to by prize record is provided.
Further, in the step 3.3), the process of the user query are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise inquiry failure;
2. judging whether user's ether mill account address format is legal, if it is, continuing step 3., otherwise inquires Failure;
3. whether judge user registered, if it is, continue step 4., otherwise inquiry failure;
4. returning to the user information of inquiry.
The invention adopts the above technical scheme, which has the following advantages: (1) resisting Sybil attack.The present invention solves Critical issue be resist user's registration multiple identities obtain token reward.The present invention is based on two levels to be solved, application Level: block chain one new user of every addition will do it authentication, and block chain is recorded and deposits card.It is used by statistics Family uses software timeliness, resists corpse user downloading.And it is checked and examined as unit of the fixed cycle, is not reached defined work The user for the duration that jumps, by logging off users identity, the reward of the token that is obtained cannot carry out again using;Network level: it is based on area Block chain PoW digs mine mechanism, carries out network node maintenance, resists block chain bottom Sybil attack.(2) " compatible incentives " policy.This The policy that invention proposes is " compatible incentives ", is rewarded by token and attracts user's downloading, promotes and use, enhancing user retains Conversion ratio, user realize recycling in platform purchase application product, reach user benefit and developer's Interdst goals unification It maximizes.(3) ERC20 standard token reward mechanism.Token reward mechanism based on ERC20 standard, precise positioning user attract User is to achieve the purpose that effectively to promote.(4) block chained record information.Utilize block chained record user information, record fund Flow direction is traded transparent traceable, can not be distorted.So the present invention can be widely applied in software extension service.
Detailed description of the invention
Fig. 1 is structural schematic diagram of the invention;
Fig. 2 is contract module of the present invention and inheritance schematic diagram;
Fig. 3 is transfer operation flow diagram of the invention;
Fig. 4 is user's registration flow diagram of the invention;
Fig. 5 is that user of the invention updates flow diagram;
Fig. 6 is user log off flow diagram of the invention;
Fig. 7 is of the invention to enliven duration management process schematic diagram;
Fig. 8 is account inquiries flow diagram of the invention.
Specific embodiment
The present invention is described in detail below with reference to the accompanying drawings and embodiments.It should be appreciated, however, that the offer of attached drawing is only For a better understanding of the present invention, they should not be interpreted as limitation of the present invention.
Block chain and intelligent contract technology are very burning hot, have attracted many companies and the concern of user, if by block chain Technology is promoted applied to software, token reward mechanism is added, this may attract more users to come using this software, therefore It is desirable that inventing a kind of software based on block chain technology promotes intelligent Service, facilitate developer by this Services Integration to soft In part.Integrated software popularization intelligent Service is very simple, does not need developer oneself and removes deployment block chain, oneself removes developing intellectual resource Contract, because these functions all have been integrated in our extension service, developer only needs to call using Web3 interface Intelligent bond service.
As shown in Figure 1, a kind of software based on block chain technology provided by the invention promotes intelligent service system comprising Data memory module and bottom block platform chain in the outer data desensitization module of chain, chain.Wherein, the outer data desensitization module of chain, is used for Recoverable desensitization process is carried out to user information data before user information data are recorded to block platform chain, generates one The symmetric key of secondary property, and using the user information after symmetric encipherment algorithm encryption desensitization, this is because the data on block chain It is all open to look into, in order to protect the individual privacy of user not to be leaked, need that subscriber identity information is encrypted; Data memory module on chain, for user information storage will to be encrypted to block platform chain, and it is relevant by intelligent contract realization Service logic, by encrypted user desensitization information and transaction record note on the block platform chain that can not be distorted.
Further, the outer data desensitization module of chain carries out encryption desensitization process to user information using national secret algorithm, using state Close algorithm not only can effective protection privacy of user, and the true initial data of user can be recovered.When user's registration, fill in Personally identifiable information, such as User ID, user name, gender, mailbox, cell-phone number key message, these information can only be by user's sheets People or administrator CEO are checked, so needing using national secret algorithm before block chain is recorded in subscriber identity information to it Recoverable desensitization process is carried out, contract controller calls the registering transaction in intelligent contract module, encrypted user is believed Block chain is recorded in breath.Using data desensitization energy effective protection privacy of user, but in the data inquired on block chain, need The user information that reversed decryption obtains plaintext version is carried out to the user information of encryption.
Further, data memory module by intelligent contract realizes that relevant service logic refers to using ether mill on chain Interface of the intelligent contract as access block chain, the software based on block chain promote the main business logic in intelligent Service Platform It is to be realized by ether mill intelligence contract.Wherein, the intelligent contract based on ether mill involved in the present invention includes that ERC20 API is closed About " ERC20Interface ", ERC20 api function specific implementation contract " SoftwareToken ", contract control " AccessControl " and user management contract " UserManager ".As shown in Fig. 2, the inheritance between each contract Are as follows: user management contract " UserManager " is inherited from " SoftwareToken " and " AccessControl ", and " SoftwareToken " is inherited from " ERC20Interface " again.
Further, the ether mill intelligence contract that data memory module uses on chain is broadly divided into three big modules: ERC20 token Interface definition and realization module, contract control module and user management module.Wherein, the definition of ERC20 token interface and realization mould Contract is implemented comprising ERC20 API contract " ERC20Interface ", ERC20 api function in block " SoftwareToken " two contracts define title, the symbol, minimum list of token for realizing ERC20 token standard API Position, total supply, and record the token money transfer transactions between user;Contract control module is controlled comprising contract " AccessControl " defines the controller of contract and the operating status of contract for realizing the control of intelligent contract; User management module includes user management contract " UserManager ", for module to be defined and realized according to ERC20 token interface With the definition information of contract control module, the operation that executes of entire intelligent contract business is realized, power function includes user's note Volume (with/without invitation code), Account Closure, enlivens duration management, account inquiries etc. at information update.
Intelligent service system is promoted based on the above-mentioned software based on block chain technology, the present invention also provides one kind to be based on block The software of chain technology promotes intelligent Service method, comprising the following steps:
1) the token reward mechanism based on ERC20 standard is used, precise positioning user attracts user, to establish user Contacting between application software.
Token represents digital asset, has value, and to comply with specific specification, the present invention, which uses, is based on homogeneity generation Coin standard ERC20 carries out token distribution, and by token reward mechanism, precise positioning user attracts user, effectively pushes away to reach Wide purpose.
" compatible incentives " policy of proposition.It is rewarded by token and attracts user's downloading, promotes and use, user purchases in platform It buys application product and realizes that recycling, individual interest interpromoting relation in five elements compatible with platform interests reach benefit.So software is promoted Intelligent Service should be directed to certain types of application software.Current application software is broadly divided into: audio-visual amusement class, game class, money News read class, electric business platform, tourism trip, social category, finance and money management class, the educational, enterprise of study handle official business class, utility etc. Deng.In order to encourage user to download reward, user be attracted to pay using software, the application software promoted needs to meet its internal packet Game skin, heroic technical ability containing the specific products for attracting user charges, such as game class application, learn educational other study Resource etc..The application scenarios that the present invention is directed to are the application software with payment value content, by using block chain software Promotional technique contacts between user and application software virtually strengthening, and enhances user's viscosity.
2) recoverable desensitization process is carried out to the user information being input in application software, and will be after encryption desensitization process User information encryption after storage arrive block platform chain.
Block chain is as underlying platform, using PoW common recognition mechanism, for recording the distribution and transfer of user identity, token. It can not be distorted since the data being recorded on block chain have, non-repudiation, retrospective characteristic, the present invention proposes to be based on PoW Common recognition mechanism carries out digging mine, using block chained record user information, record funds flow, makes to trade transparent traceable, can not usurp Change, while in order to protect privacy of user, needing user information carrying out desensitization process, while retaining restoring for desensitization data Property.
3) based on the user information and transaction record stored in block platform chain, realize that improving software pushes away using intelligent contract The service logic of range, user's viscosity.
The present invention carries out the exploitation of ether mill intelligence contract using the complete Solidity language of figure spirit, realize software promote, The service logic of user's viscosity specifically includes that user's registration downloading obtains token reward;User information updates;User utilizes certainly Oneself recommends code that software is recommended to successfully obtain token reward;User reaches defined duration of enlivening using software and obtains token reward etc. Deng.
Specifically, the following steps are included:
3.1) it defines by ERC20 token interface and realizes module, to the title of token, symbol, minimum unit and supply Total amount is defined, and records the token money transfer transactions between user.
The present invention using ERC20 token standard, contract " SoftwareToken " mainly to ERC20 standard API into It has gone concrete implementation, has been inherited from " ERC20Interface ".The present invention defines the entitled of extension service token " SoftwareToken ", symbol are as follows: " SWT ", the propulsion that software is promoted when token is used to reward user's registration, user enlivens Effect, token are also used for the circulation for promoting to carry out valuable commodity transaction between user and platform effect.In the present invention, precision is set Minimum unit for 0 i.e. token is 1, and token total supply is 1*108
As shown in figure 3, when occur transaction transfer accounts when, need to meet transfer amounts are non-zero, (authorization) amount of money of transferring accounts be less than transaction send out Condition of the remaining sum greater than (anti-spilled) before transferring accounts, corresponding treatment process after sending kelly-up volume, recipient to transfer accounts are as follows:
1. judging whether transfer amounts are greater than 0, if it is, continuing step 2., otherwise transfer accounts unsuccessfully.
2. judging whether sender's account balance is greater than transfer amounts, if it is, continuing step 3., otherwise transfer accounts Failure.
3. judging whether recipient's account balance is greater than former remaining sum plus transfer amounts, if it is, continuing step 4. otherwise transferring accounts unsuccessfully.
4. success of transferring accounts, sender's account balance updates, and recipient's account balance updates, and triggers event of transferring accounts, transaction It charges among block chain.
3.2) controller of contract and the operating status of contract are defined by contract control module, and are sent to User management module.
Contract control module is inherited for realizing the control to intelligent contract by user management contract, and contract function is exercised The effect of associated rights control.Wherein, contract control module mainly includes following functions:
Modifier onlyCEO (): defined function modifier indicates that the function must be called by CEO.
Function setCEO (): new CEO account is set.
Modifier whenNotPaused (): defined function modifier indicates that the function must be in operation in contract It is just capable of calling when state.
Modifier whenPaused (): function modifier indicates that the function must be when contract be placed in a suspend state Time is just capable of calling.
Function pause (): the operating status of contract is modified as pause.
Function unpasue (): the operating status of contract is modified as operation.
3.3) title of the token of module definition, symbol, most are defined and realized according to ERC20 token interface in step 3.1) Intelligence contract defined in token money transfer transactions and step 3.2) between subsection, total supply and the user of record Operating status realizes that entire intelligent contract business executes operation, including user's registration (with/without invitation by user management module Code), user information update, user log off, user enliven duration management, user query etc..
The design and realization of each power function is described in detail below.
3.3.1) as shown in figure 4, user's registration (with/without invitation code) detailed process is as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise registration failure.
2. judge whether the sender of transaction is CEO account, if it is, continue step 3., otherwise registration failure.
3. whether judge user registered, if do not registered, continue step 4., otherwise registration failure.
4. judging whether user information format is legal, then continue step 5. if legal, otherwise registration failure.
5. if user is registered using registered account invitation code (the ether mill account address of promoted account), into 6. row step, if not using other account invitation codes, directly carries out token reward to the login account, and encourage providing It encourages record and user encryption information charges to block chain.
6. carrying out token reward simultaneously to invitation code account and login account is provided, and prize record will be provided and user adds Confidential information charges to block chain.
3.3.2) as shown in figure 5, user updates, detailed process is as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise updated.
2. whether judge User ID format legal, if it is, continuing step 3., failure is otherwise updated.
3. judging whether it is user's update, if it is, continuing step 4., failure is otherwise updated.
4. updating user information, block chain will be charged to after updated user information encryption.
3.3.3) as shown in fig. 6, user log off detailed process is as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise nullified.
2. judging whether transaction sender is CEO account, if it is not, then continuing step 3., if it is CEO account Family then nullifies and fails, we are not provided with CEO permission and carry out user log off.
3. judging whether it is user to be unregistered, if it is, continuing step 4., failure is otherwise nullified.
4. deleting user information.
5. recycling account residue token.
6. deleting account information.
7. Logout Events charge to block chain.
3.3.4) as shown in fig. 7, enlivening duration management, detailed process is as follows:
1. whether judge contract in operating status, if it is, continuing step 2., otherwise duration management is called to hand over Easily failure.
2. judge whether transaction sender is CEO account, if it is, continue step 3., long tube when otherwise calling Manage Fail Transaction.
3. judging that user enlivens whether duration is greater than minimum limitation, if it is, continuing step 4., otherwise user is infused Pin.
4. it is accumulative that user enlivens duration.
5. carrying out token reward to any active ues, and block chain is charged to by prize record is provided.
3.3.5) as shown in figure 8, account inquiries detailed process is as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise inquiry failure.
2. judging whether user's ether mill account address format is legal, if it is, continuing step 3., otherwise inquires Failure.
3. whether judge user registered, if it is, continue step 4., otherwise inquiry failure.
4. returning to the user information of inquiry.
The various embodiments described above are merely to illustrate the present invention, wherein the structure of each component, connection type and manufacture craft etc. are all It can be varied, all equivalents and improvement carried out based on the technical solution of the present invention should not exclude Except protection scope of the present invention.

Claims (10)

1. a kind of software based on block chain technology promotes intelligent service system, it is characterised in that comprising: the outer data desensitization of chain Data memory module and block platform chain in module, chain;
The outer data desensitization module of the chain generates disposable for carrying out recoverable desensitization process to user information data Symmetric key, and the symmetrical code key based on generation is using the user information after symmetric encipherment algorithm encryption desensitization process;
Data memory module on the chain, for by encrypted desensitization user information and token transactions record storage to the area Block platform chain, and relevant service logic is realized by intelligent contract.
2. a kind of software based on block chain technology as described in claim 1 promotes intelligent service system, it is characterised in that: institute It states on chain data memory module and realizes that relevant service logic refers to the intelligent contract conduct using ether mill by intelligent contract Access the interface of the block platform chain;
The intelligent contract in the ether mill includes that ERC20 API contract " ERC20Interface ", ERC20 api function are specifically real Existing contract " SoftwareToken ", contract control " AccessControl " and user management contract " UserManager ";Respectively The inheritance of the intelligence contract are as follows: the user management contract " UserManager " is inherited from the ERC20 api function Contract " SoftwareToken " and contract control " AccessControl " are implemented, the ERC20 api function is specifically real Existing contract " SoftwareToken " is inherited from the ERC20 API contract " ERC20Interface ".
3. a kind of software based on block chain technology as claimed in claim 2 promotes intelligent service system, it is characterised in that: institute It states the ether mill intelligence contract that data memory module uses on chain and is divided into three big modules: the definition of ERC20 token interface and realization mould Block, contract control module and user management module;
ERC20 token interface definition and realize module include the ERC20 API contract " ERC20Interface " and ERC20 api function implements contract " SoftwareToken ", for defining title, symbol, the minimum unit, confession of token Total amount is answered, and records the token money transfer transactions between user;
The contract control module include the contract control " AccessControl ", for define contract controller and The operating status of contract;
The user management module includes the user management contract " UserManager ", for being connect according to the ERC20 token Mouth definition and the definition information for realizing module and contract control module realize the operation that executes of entire intelligence contract business, including User's registration, user information update, user log off, user enliven duration management and user query.
4. a kind of software using as described in any one of claims 1 to 3 based on block chain technology promotes intelligent service system Method of servicing, it is characterised in that the following steps are included:
1) the token reward mechanism based on ERC20 standard is used, contacting between user and application software is established;
2) recoverable desensitization process is carried out to the user information being input in application software, and the user after desensitization process is believed Block platform chain is arrived in storage after encryption for information;
3) it based on the user information stored in block platform chain, is realized using intelligent contract and improves software popularization degree, user's viscosity Service logic.
5. a kind of software based on block chain technology as claimed in claim 4 promotes intelligent Service method, it is characterised in that: institute It states in step 3), based on the user information stored in block platform chain, is realized using intelligent contract and improve software popularization degree, user The method of the service logic of viscosity, comprising the following steps:
3.1) it defines by ERC20 token interface and realizes module, to the title of token, symbol, minimum unit and total supply It is defined, and records the token money transfer transactions between user;
The process of token money transfer transactions between the user are as follows:
1. judging whether transfer amounts are greater than 0, if it is, continuing step 2., otherwise transfer accounts unsuccessfully;
2. judge whether sender's account balance is greater than transfer amounts, if it is, continue step 3., mistake of otherwise transferring accounts It loses;
3. judge whether recipient's account balance is greater than former remaining sum plus transfer amounts, if it is, continue step 4., it is no It then transfers accounts unsuccessfully;
4. success of transferring accounts, sender's account balance updates, and recipient's account balance updates, and triggers event of transferring accounts, transaction record It charges among block chain;
3.2) controller of contract and the operating status of contract are defined by contract control module, and are sent to user Management module;
3.3) related definition obtained based on step 3.1) and step 3.2) realizes entire intelligent contract by user management module Business executes operation, including the update of user's registration, user information, user log off, user enliven duration management and user query.
6. a kind of software based on block chain technology as claimed in claim 5 promotes intelligent Service method, it is characterised in that: institute It states in step 3.3), the process of the user's registration are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise registration failure;
2. judge whether the sender of transaction is CEO account, if it is, continue step 3., otherwise registration failure;
3. whether judge user registered, if do not registered, continue step 4., otherwise registration failure;
4. judging whether user information format is legal, then continue step 5. if legal, otherwise registration failure;
5. step is carried out 6. if user is registered using registered account invitation code, if not using other accounts Invitation code then directly carries out token reward to the login account, and will provide prize record and user encryption information and charge to block Chain;
6. to providing invitation code account and login account while carrying out token reward, and prize record and user encryption letter will be provided Breath charges to block chain.
7. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: institute It states in step 3.3), the process that the user information updates are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise updated;
2. whether judge User ID format legal, if it is, continuing step 3., failure is otherwise updated;
3. judging whether it is user's update, if it is, continuing step 4., failure is otherwise updated;
4. updating user information, block chain will be charged to after updated user information encryption.
8. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: institute It states in step 3.3), the process of the user log off are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise nullified;
2. judging whether transaction sender is CEO account, if it is not, then continuing step 3., if it is CEO account, then Failure is nullified, we are not provided with CEO permission and carry out user log off;
3. judging whether it is user to be unregistered, if it is, continuing step 4., failure is otherwise nullified;
4. deleting user information;
5. recycling account residue token;
6. deleting account information;
7. Logout Events charge to block chain.
9. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: institute It states in step 3.3), the user enlivens the process of duration management are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., duration management transaction is otherwise called to lose It loses;
2. judging whether transaction sender is CEO account, if it is, continuing step 3., otherwise duration management is called to hand over Easily failure;
3. judge that user enlivens whether duration is greater than minimum limitation, if it is, continue step 4., otherwise user log off;
4. it is accumulative that user enlivens duration;
5. carrying out token reward to any active ues, and block chain is charged to by prize record is provided.
10. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: In the step 3.3), the process of the user query are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise inquiry failure;
2. judging whether user's ether mill account address format is legal, if it is, continuing step 3., otherwise inquiry is lost It loses;
3. whether judge user registered, if it is, continue step 4., otherwise inquiry failure;
4. returning to the user information of inquiry.
CN201910455460.6A 2019-05-29 2019-05-29 A kind of software popularization intelligent service system and method based on block chain technology Pending CN110224817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910455460.6A CN110224817A (en) 2019-05-29 2019-05-29 A kind of software popularization intelligent service system and method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910455460.6A CN110224817A (en) 2019-05-29 2019-05-29 A kind of software popularization intelligent service system and method based on block chain technology

Publications (1)

Publication Number Publication Date
CN110224817A true CN110224817A (en) 2019-09-10

Family

ID=67818421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910455460.6A Pending CN110224817A (en) 2019-05-29 2019-05-29 A kind of software popularization intelligent service system and method based on block chain technology

Country Status (1)

Country Link
CN (1) CN110224817A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866270A (en) * 2019-10-18 2020-03-06 深圳市元征科技股份有限公司 Trade method, system and device for industry information
CN111178861A (en) * 2019-12-12 2020-05-19 上海链颉科技有限公司 Block chain intelligent contract popularization method, electronic device and storage medium
CN111611260A (en) * 2020-06-23 2020-09-01 上海优扬新媒信息技术有限公司 Method and device for deleting block chain data
CN112699344A (en) * 2020-12-29 2021-04-23 无锡井通网络科技有限公司 Software authorization method, incentive method and transaction authorization method based on block chain
CN113034223A (en) * 2021-03-10 2021-06-25 中国人民大学 Crowd sourcing service transaction matching method, system and medium based on incentive mechanism
CN114596092A (en) * 2022-02-24 2022-06-07 成都质数斯达克科技有限公司 Charging method, device and equipment based on block chain and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101830A (en) * 2018-09-03 2018-12-28 安徽太阳石科技有限公司 Real time data safety protecting method and system based on block chain
CN109409890A (en) * 2018-11-13 2019-03-01 华瓴(南京)信息技术有限公司 A kind of electricity transaction system and method based on block chain
CN109558748A (en) * 2018-11-23 2019-04-02 泰康保险集团股份有限公司 Data processing method, device, electronic equipment and storage medium
CN109740622A (en) * 2018-11-20 2019-05-10 众安信息技术服务有限公司 Image labeling task crowdsourcing method and system based on the logical card award method of block chain
CN109784886A (en) * 2018-12-29 2019-05-21 贵州蓝石科技有限公司 The dual accounts model for the restricted circulation that can be supervised
US20190273620A1 (en) * 2017-07-18 2019-09-05 Zhongan Information Technology Service Co., Ltd. Data sharing method and data sharing system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190273620A1 (en) * 2017-07-18 2019-09-05 Zhongan Information Technology Service Co., Ltd. Data sharing method and data sharing system
CN109101830A (en) * 2018-09-03 2018-12-28 安徽太阳石科技有限公司 Real time data safety protecting method and system based on block chain
CN109409890A (en) * 2018-11-13 2019-03-01 华瓴(南京)信息技术有限公司 A kind of electricity transaction system and method based on block chain
CN109740622A (en) * 2018-11-20 2019-05-10 众安信息技术服务有限公司 Image labeling task crowdsourcing method and system based on the logical card award method of block chain
CN109558748A (en) * 2018-11-23 2019-04-02 泰康保险集团股份有限公司 Data processing method, device, electronic equipment and storage medium
CN109784886A (en) * 2018-12-29 2019-05-21 贵州蓝石科技有限公司 The dual accounts model for the restricted circulation that can be supervised

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
IMAN VAKILINIA: ""Crowdfunding the insurance of a cyber-product using blockchain"", 《2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON)》 *
付梦琳: ""智能合约安全漏洞挖掘技术研究"", 《计算机应用》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866270A (en) * 2019-10-18 2020-03-06 深圳市元征科技股份有限公司 Trade method, system and device for industry information
CN110866270B (en) * 2019-10-18 2023-09-05 深圳市元征科技股份有限公司 Trade information transaction method, system and device
CN111178861A (en) * 2019-12-12 2020-05-19 上海链颉科技有限公司 Block chain intelligent contract popularization method, electronic device and storage medium
CN111611260A (en) * 2020-06-23 2020-09-01 上海优扬新媒信息技术有限公司 Method and device for deleting block chain data
CN112699344A (en) * 2020-12-29 2021-04-23 无锡井通网络科技有限公司 Software authorization method, incentive method and transaction authorization method based on block chain
CN113034223A (en) * 2021-03-10 2021-06-25 中国人民大学 Crowd sourcing service transaction matching method, system and medium based on incentive mechanism
CN113034223B (en) * 2021-03-10 2024-03-05 中国人民大学 Crowd-sourced service transaction matching method, system and medium based on incentive mechanism
CN114596092A (en) * 2022-02-24 2022-06-07 成都质数斯达克科技有限公司 Charging method, device and equipment based on block chain and readable storage medium
CN114596092B (en) * 2022-02-24 2024-05-28 成都质数斯达克科技有限公司 Charging method, device and equipment based on blockchain and readable storage medium

Similar Documents

Publication Publication Date Title
CN110224817A (en) A kind of software popularization intelligent service system and method based on block chain technology
Wang et al. Blockchain-based data privacy management with nudge theory in open banking
Yang et al. Federated machine learning: Concept and applications
van Rest et al. Designing privacy-by-design
Jaeger et al. Cloud computing and information policy: Computing in a policy cloud?
CN106204287A (en) Mutual insurance based on block chain and help each other guarantee operation method and system
CN112465627B (en) Financial loan auditing method and system based on block chain and machine learning
Yadav Blockchain security
Kshetri et al. Big data and cloud computing for development: Lessons from key industries and economies in the global south
Kreso et al. Data mining privacy preserving: Research agenda
US20230068770A1 (en) Federated model training method and apparatus, electronic device, computer program product, and computer-readable storage medium
Transaction et al. Blockchain: Opportunities for health care
Venkatesh An assessment of security vulnerabilities comprehension of cloud computing environments: A quantitative study using the unified theory of acceptance and use
Shen et al. Multifeature‐Based Behavior of Privilege Escalation Attack Detection Method for Android Applications
Jia et al. Privacy‐Preserving Blockchain‐Based Nonlinear SVM Classifier Training for Social Networks
Liu et al. Privacy-based adaptive context-aware authentication system for personal mobile devices
Ntsama et al. Determinants of cybercrime victimization: experiences and multi-stage recommendations from a survey in Cameroon
Chiang et al. Understanding interface design and mobile money perceptions in Latin America
Goldston et al. Digital inheritance in Web3: a case study of soulbound tokens and the social recovery pallet within the Polkadot and Kusama ecosystems
Chuqiao et al. Data security and privacy-preserving framework using machine learning and blockchain in big-data to data middle platform in the era of IR 4.0
Aljareh et al. A task-based security model to facilitate collaboration in trusted multi-agency networks
Fantaye An Introduction and Overview of Privacy-Enhancing Technologies for Data Processing and Analysis
Worthalter Fintech's need for holistic security
Bertran Free and open source software in the new digital public policies in Russia
Prasetio et al. On developing the conceptual model for measuring user acceptance of islamic financial technology service based on the unified theory of acceptance and use of technology (UTAUT)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190910

RJ01 Rejection of invention patent application after publication