CN110224817A - A kind of software popularization intelligent service system and method based on block chain technology - Google Patents
A kind of software popularization intelligent service system and method based on block chain technology Download PDFInfo
- Publication number
- CN110224817A CN110224817A CN201910455460.6A CN201910455460A CN110224817A CN 110224817 A CN110224817 A CN 110224817A CN 201910455460 A CN201910455460 A CN 201910455460A CN 110224817 A CN110224817 A CN 110224817A
- Authority
- CN
- China
- Prior art keywords
- user
- contract
- token
- block chain
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000008569 process Effects 0.000 claims abstract description 34
- 238000000586 desensitisation Methods 0.000 claims abstract description 29
- 238000003860 storage Methods 0.000 claims abstract description 8
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 claims description 36
- 238000012546 transfer Methods 0.000 claims description 29
- 230000006870 function Effects 0.000 claims description 24
- 230000007246 mechanism Effects 0.000 claims description 10
- 238000004064 recycling Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 8
- 239000003607 modifier Substances 0.000 description 6
- 230000000694 effects Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000001737 promoting effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 206010017472 Fumbling Diseases 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of, and the software based on block chain technology promotes intelligent service system and method comprising: data memory module and block platform chain in the outer data desensitization module of chain, chain;The outer data desensitization module of the chain generates disposable symmetric key, and encrypt user information using symmetric encipherment algorithm for carrying out recoverable desensitization process to user information data;Data memory module on the chain realizes relevant service logic for that will encrypt user information and token transactions record storage to the block platform chain, and by intelligent contract.The present invention can be widely applied in software Extension Software Platform and its application.
Description
Technical field
The present invention relates to block chain technical fields, promote Intellectual garment more particularly to a kind of software based on block chain technology
System and method of being engaged in concretely are related to a kind of based on the software popularization intelligent service system of intelligent contract technology realization and side
Method.
Background technique
A successful application software, software development are the first step, than exploitation more importantly the operation of software.It answers
Be also required to constantly pack publicity with software, manufacture topic and attract the use of user, at the same needs continue to introduce new it is interior
Hold and activity carrys out the operation of support applications software, otherwise high software can also die out quickly among the mankind visual field quality again.?
Current software operation in the market, carries out the popularization of application software there are no a gem-pure channel and method so far,
Everybody is also in the stage of fumbling continuously attempted to.Other than conventional apple and Android application market, other popularization sides
Formula, each Internet enterprises are different according to the difference of own resource and condition.So the listing and popularization of a application software,
Except traditional channels mode, how block chain technology is combined, excavate the need of user and platform developer
It asks, realizes that effective popularization is the direction of a very worth research, wherein the basis studied is block chain technology.
Programmer Vitalik Buterin proposes this concept of ether mill between 2013 to 2014.In ether mill
Most important technology is exactly intelligent contract technology, and intelligence contract technological borrowing bit coin block chain technology carries out it
The expansion of application.Intelligent contract is the computer program that can be performed automatically, the ginseng of itself or a system
With person, storage message can receive, and received message is responded, while can also externally send message.Intelligent contract
Operation execution always is carried out according to the rule set in advance, the people that it can be trusted as one, preservation information that can be interim
And assets.Ether mill is directed at the computing platform that the spirit of foundation figure is complete in block chain network.
Based on ether mill block chain technology, how in the Internet user of magnanimity user is accurately obtained? it is at this
Under the mobile Internet background of sample, one is how effectively carry out software popularization the problem of highly thinking.
And current software channels there are brush nonoculture disadvantage, retain that conversion ratio is low, user enlivens that rate is low, accurate user's difficulty is big, (dimension
Shield, is linked up at follow-up) the business pain spot such as at high cost.
Summary of the invention
In view of the above-mentioned problems, the object of the present invention is to provide a kind of, the software based on block chain technology promotes intelligent Service system
System and method, to solve the problems, such as that user's retention ratio is low with rate is enlivened.
To achieve the above object, the present invention takes following technical scheme: a kind of software popularization intelligence based on block chain technology
Energy service system comprising: data memory module and block platform chain in the outer data desensitization module of chain, chain;The outer data of the chain
Desensitize module, for carrying out recoverable desensitization process to user information data, generates disposable symmetric key, and based on life
At symmetrical code key using symmetric encipherment algorithm encryption desensitization process after user information;Data memory module on the chain is used
In encrypted desensitization user information and token transactions record storage are realized to the block platform chain, and by intelligent contract
Relevant service logic.
Further, on the chain data memory module by intelligent contract realize relevant service logic refer to use with
Too the intelligent contract in mill is as the interface for accessing the block platform chain;The intelligent contract in the ether mill includes ERC20 API
Contract " ERC20 Interface ", ERC20 api function specific implementation contract " SoftwareToken ", contract control
" AccessControl " and user management contract " UserManager ";The inheritance of each intelligent contract are as follows: the use
Family management agreement " UserManager " is inherited from ERC20 api function specific implementation contract " SoftwareToken " and closes
" AccessControl " about is controlled, ERC20 api function specific implementation contract " SoftwareToken " is inherited from described
ERC20 API contract " ERC20Interface ".
Further, the ether mill intelligence contract that data memory module uses on the chain is divided into three big modules: ERC20 generation
The definition of coin interface and realization module, contract control module and user management module;The ERC20 token interface definition and realization mould
Block includes that the ERC20 API contract " ERC20Interface " and ERC20 api function implement contract
" SoftwareToken " for defining title, symbol, the minimum unit, total supply of token, and records the generation between user
Coin money transfer transactions;The contract control module includes contract control " AccessControl ", for defining the control of contract
The operating status of person and contract;The user management module includes the user management contract " UserManager ", is used for root
The definition information of module and contract control module is defined and realized according to the ERC20 token interface, realizes entire intelligent contract industry
Business executes operation, including the update of user's registration, user information, user log off, user enliven duration management and user query.
A kind of software based on block chain technology promotes the method for servicing of intelligent service system comprising following steps:
1) the token reward mechanism based on ERC20 standard is used, contacting between user and application software is established;
2) recoverable desensitization process carried out to the user information that is input in application software, and by the use after desensitization process
Block platform chain is arrived in storage after the encryption of family information;
3) it based on the user information stored in block platform chain, is realized using intelligent contract and improves software popularization degree, user
The service logic of viscosity.
Further, it in the step 3), based on the user information stored in block platform chain, is realized using intelligent contract
Improve software popularization degree, user's viscosity service logic method, comprising the following steps:
3.1) it defines by ERC20 token interface and realizes module, to the title of token, symbol, minimum unit and supply
Total amount is defined, and records the token money transfer transactions between user;
The process of token money transfer transactions between the user are as follows:
1. judging whether transfer amounts are greater than 0, if it is, continuing step 2., otherwise transfer accounts unsuccessfully;
2. judging whether sender's account balance is greater than transfer amounts, if it is, continuing step 3., otherwise transfer accounts
Failure;
3. judging whether recipient's account balance is greater than former remaining sum plus transfer amounts, if it is, continuing step
4. otherwise transferring accounts unsuccessfully;
4. success of transferring accounts, sender's account balance updates, and recipient's account balance updates, and triggers event of transferring accounts, transaction
It charges among block chain;
3.2) controller of contract and the operating status of contract are defined by contract control module, and are sent to
User management module;
3.3) related definition obtained based on step 3.1) and step 3.2) realizes entire intelligence by user management module
Contract business executes operation, including the update of user's registration, user information, user log off, user enlivens duration management and user looks into
It askes.
Further, in the step 3.3), the process of the user's registration are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise registration failure;
2. judge whether the sender of transaction is CEO account, if it is, continue step 3., otherwise registration failure;
3. whether judge user registered, if do not registered, continue step 4., otherwise registration failure;
4. judging whether user information format is legal, then continue step 5. if legal, otherwise registration failure;
5. step is carried out 6. if user is registered using registered account invitation code, if not using other
Account invitation code then directly carries out token reward to the login account, and will provide prize record and user encryption information and charge to
Block chain;
6. carrying out token reward simultaneously to invitation code account and login account is provided, and prize record will be provided and user adds
Confidential information charges to block chain.
Further, in the step 3.3), the process of the user information update are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise updated;
2. whether judge User ID format legal, if it is, continuing step 3., failure is otherwise updated;
3. judging whether it is user's update, if it is, continuing step 4., failure is otherwise updated;
4. updating user information, block chain will be charged to after updated user information encryption.
Further, in the step 3.3), the process of the user log off are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise nullified;
2. judging whether transaction sender is CEO account, if it is not, then continuing step 3., if it is CEO account
Family then nullifies and fails, we are not provided with CEO permission and carry out user log off;
3. judging whether it is user to be unregistered, if it is, continuing step 4., failure is otherwise nullified;
4. deleting user information;
5. recycling account residue token;
6. deleting account information;
7. Logout Events charge to block chain.
Further, in the step 3.3), the user enlivens the process of duration management are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., otherwise duration management is called to hand over
Easily failure;
2. judge whether transaction sender is CEO account, if it is, continue step 3., long tube when otherwise calling
Manage Fail Transaction;
3. judging that user enlivens whether duration is greater than minimum limitation, if it is, continuing step 4., otherwise user is infused
Pin;
4. it is accumulative that user enlivens duration;
5. carrying out token reward to any active ues, and block chain is charged to by prize record is provided.
Further, in the step 3.3), the process of the user query are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise inquiry failure;
2. judging whether user's ether mill account address format is legal, if it is, continuing step 3., otherwise inquires
Failure;
3. whether judge user registered, if it is, continue step 4., otherwise inquiry failure;
4. returning to the user information of inquiry.
The invention adopts the above technical scheme, which has the following advantages: (1) resisting Sybil attack.The present invention solves
Critical issue be resist user's registration multiple identities obtain token reward.The present invention is based on two levels to be solved, application
Level: block chain one new user of every addition will do it authentication, and block chain is recorded and deposits card.It is used by statistics
Family uses software timeliness, resists corpse user downloading.And it is checked and examined as unit of the fixed cycle, is not reached defined work
The user for the duration that jumps, by logging off users identity, the reward of the token that is obtained cannot carry out again using;Network level: it is based on area
Block chain PoW digs mine mechanism, carries out network node maintenance, resists block chain bottom Sybil attack.(2) " compatible incentives " policy.This
The policy that invention proposes is " compatible incentives ", is rewarded by token and attracts user's downloading, promotes and use, enhancing user retains
Conversion ratio, user realize recycling in platform purchase application product, reach user benefit and developer's Interdst goals unification
It maximizes.(3) ERC20 standard token reward mechanism.Token reward mechanism based on ERC20 standard, precise positioning user attract
User is to achieve the purpose that effectively to promote.(4) block chained record information.Utilize block chained record user information, record fund
Flow direction is traded transparent traceable, can not be distorted.So the present invention can be widely applied in software extension service.
Detailed description of the invention
Fig. 1 is structural schematic diagram of the invention;
Fig. 2 is contract module of the present invention and inheritance schematic diagram;
Fig. 3 is transfer operation flow diagram of the invention;
Fig. 4 is user's registration flow diagram of the invention;
Fig. 5 is that user of the invention updates flow diagram;
Fig. 6 is user log off flow diagram of the invention;
Fig. 7 is of the invention to enliven duration management process schematic diagram;
Fig. 8 is account inquiries flow diagram of the invention.
Specific embodiment
The present invention is described in detail below with reference to the accompanying drawings and embodiments.It should be appreciated, however, that the offer of attached drawing is only
For a better understanding of the present invention, they should not be interpreted as limitation of the present invention.
Block chain and intelligent contract technology are very burning hot, have attracted many companies and the concern of user, if by block chain
Technology is promoted applied to software, token reward mechanism is added, this may attract more users to come using this software, therefore
It is desirable that inventing a kind of software based on block chain technology promotes intelligent Service, facilitate developer by this Services Integration to soft
In part.Integrated software popularization intelligent Service is very simple, does not need developer oneself and removes deployment block chain, oneself removes developing intellectual resource
Contract, because these functions all have been integrated in our extension service, developer only needs to call using Web3 interface
Intelligent bond service.
As shown in Figure 1, a kind of software based on block chain technology provided by the invention promotes intelligent service system comprising
Data memory module and bottom block platform chain in the outer data desensitization module of chain, chain.Wherein, the outer data desensitization module of chain, is used for
Recoverable desensitization process is carried out to user information data before user information data are recorded to block platform chain, generates one
The symmetric key of secondary property, and using the user information after symmetric encipherment algorithm encryption desensitization, this is because the data on block chain
It is all open to look into, in order to protect the individual privacy of user not to be leaked, need that subscriber identity information is encrypted;
Data memory module on chain, for user information storage will to be encrypted to block platform chain, and it is relevant by intelligent contract realization
Service logic, by encrypted user desensitization information and transaction record note on the block platform chain that can not be distorted.
Further, the outer data desensitization module of chain carries out encryption desensitization process to user information using national secret algorithm, using state
Close algorithm not only can effective protection privacy of user, and the true initial data of user can be recovered.When user's registration, fill in
Personally identifiable information, such as User ID, user name, gender, mailbox, cell-phone number key message, these information can only be by user's sheets
People or administrator CEO are checked, so needing using national secret algorithm before block chain is recorded in subscriber identity information to it
Recoverable desensitization process is carried out, contract controller calls the registering transaction in intelligent contract module, encrypted user is believed
Block chain is recorded in breath.Using data desensitization energy effective protection privacy of user, but in the data inquired on block chain, need
The user information that reversed decryption obtains plaintext version is carried out to the user information of encryption.
Further, data memory module by intelligent contract realizes that relevant service logic refers to using ether mill on chain
Interface of the intelligent contract as access block chain, the software based on block chain promote the main business logic in intelligent Service Platform
It is to be realized by ether mill intelligence contract.Wherein, the intelligent contract based on ether mill involved in the present invention includes that ERC20 API is closed
About " ERC20Interface ", ERC20 api function specific implementation contract " SoftwareToken ", contract control
" AccessControl " and user management contract " UserManager ".As shown in Fig. 2, the inheritance between each contract
Are as follows: user management contract " UserManager " is inherited from " SoftwareToken " and " AccessControl ", and
" SoftwareToken " is inherited from " ERC20Interface " again.
Further, the ether mill intelligence contract that data memory module uses on chain is broadly divided into three big modules: ERC20 token
Interface definition and realization module, contract control module and user management module.Wherein, the definition of ERC20 token interface and realization mould
Contract is implemented comprising ERC20 API contract " ERC20Interface ", ERC20 api function in block
" SoftwareToken " two contracts define title, the symbol, minimum list of token for realizing ERC20 token standard API
Position, total supply, and record the token money transfer transactions between user;Contract control module is controlled comprising contract
" AccessControl " defines the controller of contract and the operating status of contract for realizing the control of intelligent contract;
User management module includes user management contract " UserManager ", for module to be defined and realized according to ERC20 token interface
With the definition information of contract control module, the operation that executes of entire intelligent contract business is realized, power function includes user's note
Volume (with/without invitation code), Account Closure, enlivens duration management, account inquiries etc. at information update.
Intelligent service system is promoted based on the above-mentioned software based on block chain technology, the present invention also provides one kind to be based on block
The software of chain technology promotes intelligent Service method, comprising the following steps:
1) the token reward mechanism based on ERC20 standard is used, precise positioning user attracts user, to establish user
Contacting between application software.
Token represents digital asset, has value, and to comply with specific specification, the present invention, which uses, is based on homogeneity generation
Coin standard ERC20 carries out token distribution, and by token reward mechanism, precise positioning user attracts user, effectively pushes away to reach
Wide purpose.
" compatible incentives " policy of proposition.It is rewarded by token and attracts user's downloading, promotes and use, user purchases in platform
It buys application product and realizes that recycling, individual interest interpromoting relation in five elements compatible with platform interests reach benefit.So software is promoted
Intelligent Service should be directed to certain types of application software.Current application software is broadly divided into: audio-visual amusement class, game class, money
News read class, electric business platform, tourism trip, social category, finance and money management class, the educational, enterprise of study handle official business class, utility etc.
Deng.In order to encourage user to download reward, user be attracted to pay using software, the application software promoted needs to meet its internal packet
Game skin, heroic technical ability containing the specific products for attracting user charges, such as game class application, learn educational other study
Resource etc..The application scenarios that the present invention is directed to are the application software with payment value content, by using block chain software
Promotional technique contacts between user and application software virtually strengthening, and enhances user's viscosity.
2) recoverable desensitization process is carried out to the user information being input in application software, and will be after encryption desensitization process
User information encryption after storage arrive block platform chain.
Block chain is as underlying platform, using PoW common recognition mechanism, for recording the distribution and transfer of user identity, token.
It can not be distorted since the data being recorded on block chain have, non-repudiation, retrospective characteristic, the present invention proposes to be based on PoW
Common recognition mechanism carries out digging mine, using block chained record user information, record funds flow, makes to trade transparent traceable, can not usurp
Change, while in order to protect privacy of user, needing user information carrying out desensitization process, while retaining restoring for desensitization data
Property.
3) based on the user information and transaction record stored in block platform chain, realize that improving software pushes away using intelligent contract
The service logic of range, user's viscosity.
The present invention carries out the exploitation of ether mill intelligence contract using the complete Solidity language of figure spirit, realize software promote,
The service logic of user's viscosity specifically includes that user's registration downloading obtains token reward;User information updates;User utilizes certainly
Oneself recommends code that software is recommended to successfully obtain token reward;User reaches defined duration of enlivening using software and obtains token reward etc.
Deng.
Specifically, the following steps are included:
3.1) it defines by ERC20 token interface and realizes module, to the title of token, symbol, minimum unit and supply
Total amount is defined, and records the token money transfer transactions between user.
The present invention using ERC20 token standard, contract " SoftwareToken " mainly to ERC20 standard API into
It has gone concrete implementation, has been inherited from " ERC20Interface ".The present invention defines the entitled of extension service token
" SoftwareToken ", symbol are as follows: " SWT ", the propulsion that software is promoted when token is used to reward user's registration, user enlivens
Effect, token are also used for the circulation for promoting to carry out valuable commodity transaction between user and platform effect.In the present invention, precision is set
Minimum unit for 0 i.e. token is 1, and token total supply is 1*108。
As shown in figure 3, when occur transaction transfer accounts when, need to meet transfer amounts are non-zero, (authorization) amount of money of transferring accounts be less than transaction send out
Condition of the remaining sum greater than (anti-spilled) before transferring accounts, corresponding treatment process after sending kelly-up volume, recipient to transfer accounts are as follows:
1. judging whether transfer amounts are greater than 0, if it is, continuing step 2., otherwise transfer accounts unsuccessfully.
2. judging whether sender's account balance is greater than transfer amounts, if it is, continuing step 3., otherwise transfer accounts
Failure.
3. judging whether recipient's account balance is greater than former remaining sum plus transfer amounts, if it is, continuing step
4. otherwise transferring accounts unsuccessfully.
4. success of transferring accounts, sender's account balance updates, and recipient's account balance updates, and triggers event of transferring accounts, transaction
It charges among block chain.
3.2) controller of contract and the operating status of contract are defined by contract control module, and are sent to
User management module.
Contract control module is inherited for realizing the control to intelligent contract by user management contract, and contract function is exercised
The effect of associated rights control.Wherein, contract control module mainly includes following functions:
Modifier onlyCEO (): defined function modifier indicates that the function must be called by CEO.
Function setCEO (): new CEO account is set.
Modifier whenNotPaused (): defined function modifier indicates that the function must be in operation in contract
It is just capable of calling when state.
Modifier whenPaused (): function modifier indicates that the function must be when contract be placed in a suspend state
Time is just capable of calling.
Function pause (): the operating status of contract is modified as pause.
Function unpasue (): the operating status of contract is modified as operation.
3.3) title of the token of module definition, symbol, most are defined and realized according to ERC20 token interface in step 3.1)
Intelligence contract defined in token money transfer transactions and step 3.2) between subsection, total supply and the user of record
Operating status realizes that entire intelligent contract business executes operation, including user's registration (with/without invitation by user management module
Code), user information update, user log off, user enliven duration management, user query etc..
The design and realization of each power function is described in detail below.
3.3.1) as shown in figure 4, user's registration (with/without invitation code) detailed process is as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise registration failure.
2. judge whether the sender of transaction is CEO account, if it is, continue step 3., otherwise registration failure.
3. whether judge user registered, if do not registered, continue step 4., otherwise registration failure.
4. judging whether user information format is legal, then continue step 5. if legal, otherwise registration failure.
5. if user is registered using registered account invitation code (the ether mill account address of promoted account), into
6. row step, if not using other account invitation codes, directly carries out token reward to the login account, and encourage providing
It encourages record and user encryption information charges to block chain.
6. carrying out token reward simultaneously to invitation code account and login account is provided, and prize record will be provided and user adds
Confidential information charges to block chain.
3.3.2) as shown in figure 5, user updates, detailed process is as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise updated.
2. whether judge User ID format legal, if it is, continuing step 3., failure is otherwise updated.
3. judging whether it is user's update, if it is, continuing step 4., failure is otherwise updated.
4. updating user information, block chain will be charged to after updated user information encryption.
3.3.3) as shown in fig. 6, user log off detailed process is as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise nullified.
2. judging whether transaction sender is CEO account, if it is not, then continuing step 3., if it is CEO account
Family then nullifies and fails, we are not provided with CEO permission and carry out user log off.
3. judging whether it is user to be unregistered, if it is, continuing step 4., failure is otherwise nullified.
4. deleting user information.
5. recycling account residue token.
6. deleting account information.
7. Logout Events charge to block chain.
3.3.4) as shown in fig. 7, enlivening duration management, detailed process is as follows:
1. whether judge contract in operating status, if it is, continuing step 2., otherwise duration management is called to hand over
Easily failure.
2. judge whether transaction sender is CEO account, if it is, continue step 3., long tube when otherwise calling
Manage Fail Transaction.
3. judging that user enlivens whether duration is greater than minimum limitation, if it is, continuing step 4., otherwise user is infused
Pin.
4. it is accumulative that user enlivens duration.
5. carrying out token reward to any active ues, and block chain is charged to by prize record is provided.
3.3.5) as shown in figure 8, account inquiries detailed process is as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise inquiry failure.
2. judging whether user's ether mill account address format is legal, if it is, continuing step 3., otherwise inquires
Failure.
3. whether judge user registered, if it is, continue step 4., otherwise inquiry failure.
4. returning to the user information of inquiry.
The various embodiments described above are merely to illustrate the present invention, wherein the structure of each component, connection type and manufacture craft etc. are all
It can be varied, all equivalents and improvement carried out based on the technical solution of the present invention should not exclude
Except protection scope of the present invention.
Claims (10)
1. a kind of software based on block chain technology promotes intelligent service system, it is characterised in that comprising: the outer data desensitization of chain
Data memory module and block platform chain in module, chain;
The outer data desensitization module of the chain generates disposable for carrying out recoverable desensitization process to user information data
Symmetric key, and the symmetrical code key based on generation is using the user information after symmetric encipherment algorithm encryption desensitization process;
Data memory module on the chain, for by encrypted desensitization user information and token transactions record storage to the area
Block platform chain, and relevant service logic is realized by intelligent contract.
2. a kind of software based on block chain technology as described in claim 1 promotes intelligent service system, it is characterised in that: institute
It states on chain data memory module and realizes that relevant service logic refers to the intelligent contract conduct using ether mill by intelligent contract
Access the interface of the block platform chain;
The intelligent contract in the ether mill includes that ERC20 API contract " ERC20Interface ", ERC20 api function are specifically real
Existing contract " SoftwareToken ", contract control " AccessControl " and user management contract " UserManager ";Respectively
The inheritance of the intelligence contract are as follows: the user management contract " UserManager " is inherited from the ERC20 api function
Contract " SoftwareToken " and contract control " AccessControl " are implemented, the ERC20 api function is specifically real
Existing contract " SoftwareToken " is inherited from the ERC20 API contract " ERC20Interface ".
3. a kind of software based on block chain technology as claimed in claim 2 promotes intelligent service system, it is characterised in that: institute
It states the ether mill intelligence contract that data memory module uses on chain and is divided into three big modules: the definition of ERC20 token interface and realization mould
Block, contract control module and user management module;
ERC20 token interface definition and realize module include the ERC20 API contract " ERC20Interface " and
ERC20 api function implements contract " SoftwareToken ", for defining title, symbol, the minimum unit, confession of token
Total amount is answered, and records the token money transfer transactions between user;
The contract control module include the contract control " AccessControl ", for define contract controller and
The operating status of contract;
The user management module includes the user management contract " UserManager ", for being connect according to the ERC20 token
Mouth definition and the definition information for realizing module and contract control module realize the operation that executes of entire intelligence contract business, including
User's registration, user information update, user log off, user enliven duration management and user query.
4. a kind of software using as described in any one of claims 1 to 3 based on block chain technology promotes intelligent service system
Method of servicing, it is characterised in that the following steps are included:
1) the token reward mechanism based on ERC20 standard is used, contacting between user and application software is established;
2) recoverable desensitization process is carried out to the user information being input in application software, and the user after desensitization process is believed
Block platform chain is arrived in storage after encryption for information;
3) it based on the user information stored in block platform chain, is realized using intelligent contract and improves software popularization degree, user's viscosity
Service logic.
5. a kind of software based on block chain technology as claimed in claim 4 promotes intelligent Service method, it is characterised in that: institute
It states in step 3), based on the user information stored in block platform chain, is realized using intelligent contract and improve software popularization degree, user
The method of the service logic of viscosity, comprising the following steps:
3.1) it defines by ERC20 token interface and realizes module, to the title of token, symbol, minimum unit and total supply
It is defined, and records the token money transfer transactions between user;
The process of token money transfer transactions between the user are as follows:
1. judging whether transfer amounts are greater than 0, if it is, continuing step 2., otherwise transfer accounts unsuccessfully;
2. judge whether sender's account balance is greater than transfer amounts, if it is, continue step 3., mistake of otherwise transferring accounts
It loses;
3. judge whether recipient's account balance is greater than former remaining sum plus transfer amounts, if it is, continue step 4., it is no
It then transfers accounts unsuccessfully;
4. success of transferring accounts, sender's account balance updates, and recipient's account balance updates, and triggers event of transferring accounts, transaction record
It charges among block chain;
3.2) controller of contract and the operating status of contract are defined by contract control module, and are sent to user
Management module;
3.3) related definition obtained based on step 3.1) and step 3.2) realizes entire intelligent contract by user management module
Business executes operation, including the update of user's registration, user information, user log off, user enliven duration management and user query.
6. a kind of software based on block chain technology as claimed in claim 5 promotes intelligent Service method, it is characterised in that: institute
It states in step 3.3), the process of the user's registration are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise registration failure;
2. judge whether the sender of transaction is CEO account, if it is, continue step 3., otherwise registration failure;
3. whether judge user registered, if do not registered, continue step 4., otherwise registration failure;
4. judging whether user information format is legal, then continue step 5. if legal, otherwise registration failure;
5. step is carried out 6. if user is registered using registered account invitation code, if not using other accounts
Invitation code then directly carries out token reward to the login account, and will provide prize record and user encryption information and charge to block
Chain;
6. to providing invitation code account and login account while carrying out token reward, and prize record and user encryption letter will be provided
Breath charges to block chain.
7. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: institute
It states in step 3.3), the process that the user information updates are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise updated;
2. whether judge User ID format legal, if it is, continuing step 3., failure is otherwise updated;
3. judging whether it is user's update, if it is, continuing step 4., failure is otherwise updated;
4. updating user information, block chain will be charged to after updated user information encryption.
8. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: institute
It states in step 3.3), the process of the user log off are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., failure is otherwise nullified;
2. judging whether transaction sender is CEO account, if it is not, then continuing step 3., if it is CEO account, then
Failure is nullified, we are not provided with CEO permission and carry out user log off;
3. judging whether it is user to be unregistered, if it is, continuing step 4., failure is otherwise nullified;
4. deleting user information;
5. recycling account residue token;
6. deleting account information;
7. Logout Events charge to block chain.
9. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that: institute
It states in step 3.3), the user enlivens the process of duration management are as follows:
1. whether judge contract in operating status, if it is, continuing step 2., duration management transaction is otherwise called to lose
It loses;
2. judging whether transaction sender is CEO account, if it is, continuing step 3., otherwise duration management is called to hand over
Easily failure;
3. judge that user enlivens whether duration is greater than minimum limitation, if it is, continue step 4., otherwise user log off;
4. it is accumulative that user enlivens duration;
5. carrying out token reward to any active ues, and block chain is charged to by prize record is provided.
10. a kind of software based on block chain technology as claimed in claim 6 promotes intelligent Service method, it is characterised in that:
In the step 3.3), the process of the user query are as follows:
1. whether judge contract in operating status, if it is, continue step 2., otherwise inquiry failure;
2. judging whether user's ether mill account address format is legal, if it is, continuing step 3., otherwise inquiry is lost
It loses;
3. whether judge user registered, if it is, continue step 4., otherwise inquiry failure;
4. returning to the user information of inquiry.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910455460.6A CN110224817A (en) | 2019-05-29 | 2019-05-29 | A kind of software popularization intelligent service system and method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910455460.6A CN110224817A (en) | 2019-05-29 | 2019-05-29 | A kind of software popularization intelligent service system and method based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110224817A true CN110224817A (en) | 2019-09-10 |
Family
ID=67818421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910455460.6A Pending CN110224817A (en) | 2019-05-29 | 2019-05-29 | A kind of software popularization intelligent service system and method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110224817A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110866270A (en) * | 2019-10-18 | 2020-03-06 | 深圳市元征科技股份有限公司 | Trade method, system and device for industry information |
CN111178861A (en) * | 2019-12-12 | 2020-05-19 | 上海链颉科技有限公司 | Block chain intelligent contract popularization method, electronic device and storage medium |
CN111611260A (en) * | 2020-06-23 | 2020-09-01 | 上海优扬新媒信息技术有限公司 | Method and device for deleting block chain data |
CN112699344A (en) * | 2020-12-29 | 2021-04-23 | 无锡井通网络科技有限公司 | Software authorization method, incentive method and transaction authorization method based on block chain |
CN113034223A (en) * | 2021-03-10 | 2021-06-25 | 中国人民大学 | Crowd sourcing service transaction matching method, system and medium based on incentive mechanism |
CN114596092A (en) * | 2022-02-24 | 2022-06-07 | 成都质数斯达克科技有限公司 | Charging method, device and equipment based on block chain and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109101830A (en) * | 2018-09-03 | 2018-12-28 | 安徽太阳石科技有限公司 | Real time data safety protecting method and system based on block chain |
CN109409890A (en) * | 2018-11-13 | 2019-03-01 | 华瓴(南京)信息技术有限公司 | A kind of electricity transaction system and method based on block chain |
CN109558748A (en) * | 2018-11-23 | 2019-04-02 | 泰康保险集团股份有限公司 | Data processing method, device, electronic equipment and storage medium |
CN109740622A (en) * | 2018-11-20 | 2019-05-10 | 众安信息技术服务有限公司 | Image labeling task crowdsourcing method and system based on the logical card award method of block chain |
CN109784886A (en) * | 2018-12-29 | 2019-05-21 | 贵州蓝石科技有限公司 | The dual accounts model for the restricted circulation that can be supervised |
US20190273620A1 (en) * | 2017-07-18 | 2019-09-05 | Zhongan Information Technology Service Co., Ltd. | Data sharing method and data sharing system |
-
2019
- 2019-05-29 CN CN201910455460.6A patent/CN110224817A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190273620A1 (en) * | 2017-07-18 | 2019-09-05 | Zhongan Information Technology Service Co., Ltd. | Data sharing method and data sharing system |
CN109101830A (en) * | 2018-09-03 | 2018-12-28 | 安徽太阳石科技有限公司 | Real time data safety protecting method and system based on block chain |
CN109409890A (en) * | 2018-11-13 | 2019-03-01 | 华瓴(南京)信息技术有限公司 | A kind of electricity transaction system and method based on block chain |
CN109740622A (en) * | 2018-11-20 | 2019-05-10 | 众安信息技术服务有限公司 | Image labeling task crowdsourcing method and system based on the logical card award method of block chain |
CN109558748A (en) * | 2018-11-23 | 2019-04-02 | 泰康保险集团股份有限公司 | Data processing method, device, electronic equipment and storage medium |
CN109784886A (en) * | 2018-12-29 | 2019-05-21 | 贵州蓝石科技有限公司 | The dual accounts model for the restricted circulation that can be supervised |
Non-Patent Citations (2)
Title |
---|
IMAN VAKILINIA: ""Crowdfunding the insurance of a cyber-product using blockchain"", 《2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON)》 * |
付梦琳: ""智能合约安全漏洞挖掘技术研究"", 《计算机应用》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110866270A (en) * | 2019-10-18 | 2020-03-06 | 深圳市元征科技股份有限公司 | Trade method, system and device for industry information |
CN110866270B (en) * | 2019-10-18 | 2023-09-05 | 深圳市元征科技股份有限公司 | Trade information transaction method, system and device |
CN111178861A (en) * | 2019-12-12 | 2020-05-19 | 上海链颉科技有限公司 | Block chain intelligent contract popularization method, electronic device and storage medium |
CN111611260A (en) * | 2020-06-23 | 2020-09-01 | 上海优扬新媒信息技术有限公司 | Method and device for deleting block chain data |
CN112699344A (en) * | 2020-12-29 | 2021-04-23 | 无锡井通网络科技有限公司 | Software authorization method, incentive method and transaction authorization method based on block chain |
CN113034223A (en) * | 2021-03-10 | 2021-06-25 | 中国人民大学 | Crowd sourcing service transaction matching method, system and medium based on incentive mechanism |
CN113034223B (en) * | 2021-03-10 | 2024-03-05 | 中国人民大学 | Crowd-sourced service transaction matching method, system and medium based on incentive mechanism |
CN114596092A (en) * | 2022-02-24 | 2022-06-07 | 成都质数斯达克科技有限公司 | Charging method, device and equipment based on block chain and readable storage medium |
CN114596092B (en) * | 2022-02-24 | 2024-05-28 | 成都质数斯达克科技有限公司 | Charging method, device and equipment based on blockchain and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110224817A (en) | A kind of software popularization intelligent service system and method based on block chain technology | |
Wang et al. | Blockchain-based data privacy management with nudge theory in open banking | |
Yang et al. | Federated machine learning: Concept and applications | |
van Rest et al. | Designing privacy-by-design | |
Jaeger et al. | Cloud computing and information policy: Computing in a policy cloud? | |
CN106204287A (en) | Mutual insurance based on block chain and help each other guarantee operation method and system | |
CN112465627B (en) | Financial loan auditing method and system based on block chain and machine learning | |
Yadav | Blockchain security | |
Kshetri et al. | Big data and cloud computing for development: Lessons from key industries and economies in the global south | |
Kreso et al. | Data mining privacy preserving: Research agenda | |
US20230068770A1 (en) | Federated model training method and apparatus, electronic device, computer program product, and computer-readable storage medium | |
Transaction et al. | Blockchain: Opportunities for health care | |
Venkatesh | An assessment of security vulnerabilities comprehension of cloud computing environments: A quantitative study using the unified theory of acceptance and use | |
Shen et al. | Multifeature‐Based Behavior of Privilege Escalation Attack Detection Method for Android Applications | |
Jia et al. | Privacy‐Preserving Blockchain‐Based Nonlinear SVM Classifier Training for Social Networks | |
Liu et al. | Privacy-based adaptive context-aware authentication system for personal mobile devices | |
Ntsama et al. | Determinants of cybercrime victimization: experiences and multi-stage recommendations from a survey in Cameroon | |
Chiang et al. | Understanding interface design and mobile money perceptions in Latin America | |
Goldston et al. | Digital inheritance in Web3: a case study of soulbound tokens and the social recovery pallet within the Polkadot and Kusama ecosystems | |
Chuqiao et al. | Data security and privacy-preserving framework using machine learning and blockchain in big-data to data middle platform in the era of IR 4.0 | |
Aljareh et al. | A task-based security model to facilitate collaboration in trusted multi-agency networks | |
Fantaye | An Introduction and Overview of Privacy-Enhancing Technologies for Data Processing and Analysis | |
Worthalter | Fintech's need for holistic security | |
Bertran | Free and open source software in the new digital public policies in Russia | |
Prasetio et al. | On developing the conceptual model for measuring user acceptance of islamic financial technology service based on the unified theory of acceptance and use of technology (UTAUT) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190910 |
|
RJ01 | Rejection of invention patent application after publication |