CN110287254B - Data transaction method and device based on alliance chain and computer equipment - Google Patents

Data transaction method and device based on alliance chain and computer equipment Download PDF

Info

Publication number
CN110287254B
CN110287254B CN201910383586.7A CN201910383586A CN110287254B CN 110287254 B CN110287254 B CN 110287254B CN 201910383586 A CN201910383586 A CN 201910383586A CN 110287254 B CN110287254 B CN 110287254B
Authority
CN
China
Prior art keywords
data
member node
transaction
template
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910383586.7A
Other languages
Chinese (zh)
Other versions
CN110287254A (en
Inventor
武健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Sangular Software Co ltd
Original Assignee
Hangzhou Sangular Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Sangular Software Co ltd filed Critical Hangzhou Sangular Software Co ltd
Priority to CN201910383586.7A priority Critical patent/CN110287254B/en
Publication of CN110287254A publication Critical patent/CN110287254A/en
Application granted granted Critical
Publication of CN110287254B publication Critical patent/CN110287254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a data transaction method, a device and computer equipment based on a alliance chain, wherein the data transaction method based on the alliance chain comprises the steps of generating first member node data according to a user-defined information template, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into the alliance chain; according to the evaluation rule in the data template, carrying out first-time rating on the first member node data and carrying out integral reward on the first member node according to the evaluation result; when a second member node in the alliance chain needs to obtain data of the first member node, the integral which is equivalent to the data and owned by the second member node is exchanged for the data, the integrity of the data is verified according to a Hash algorithm after the data is decrypted, and the data can be graded to realize data transaction. The problems that information can not be exchanged equally among enterprises, authenticity and safety of the exchanged information can not be guaranteed and the like are solved, and complex information exchange logic among the enterprises is simplified.

Description

Data transaction method and device based on alliance chain and computer equipment
Technical Field
The invention relates to the technical field of block chains, in particular to a data transaction method and device based on a alliance chain and computer equipment.
Background
Enterprises in the same industry have some valuable industry information, and in order to enable the enterprises to develop better, many enterprises want to exchange information with the same company, but how to exchange the information safely and reliably becomes a difficult problem for the enterprises. The final purpose of the technical scheme is to get through the information barriers among the enterprises, so that the enterprises can exchange information safely and equally.
At present, information exchange among enterprises is realized through business communication, and information can be obtained only after evaluation, so that timeliness is poor. In addition, the system architecture varies between different enterprises, and there are many limitations on exchanging information via the internet. Even if data are exchanged successfully, because each family manages own data in a centralized manner, the evaluation of the information after the data are obtained cannot be effectively known by the whole network.
Disclosure of Invention
In order to solve the problems that information can not be exchanged equally among enterprises and authenticity and safety of the exchanged information can not be guaranteed in the prior art, the embodiment of the invention simplifies complex data exchange logic among the enterprises by means of the characteristics of non-falsification and fair disclosure of the block chain and limits the range of the exchanged information to members of the alliance chain by virtue of the alliance chain.
An embodiment of the present invention provides a data transaction method based on a federation chain, where the federation chain includes a plurality of member nodes accessing to a federation chain network, and the data transaction method includes:
generating first member node data according to the user-defined data template, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into a alliance chain; the hash value confirms the uniqueness of the node data, and the data summary is a key word extracted from the first member node data by the data template, such as information of data uploading time, place, enterprise name of uploaded data and the like, so that the subsequent retrieval of the data is facilitated;
according to the evaluation rule in the data template, the first member node data is rated for the first time, and the first member node is rewarded with points according to the evaluation result;
when a second member node in the alliance chain needs to obtain data of the first member node, the integral which is equivalent to the data and owned by the second member node is exchanged for the data, and after the data is decrypted, the integrity of the data is verified according to a Hash algorithm, so that data transaction is realized.
Further, in the data transaction method provided in the embodiment of the present invention, before the steps of generating the first member node data according to the custom data template and encrypting the data, the method further includes:
receiving a custom data template uploaded by a third member node;
and after the member nodes with the preset proportion approve the data template, publishing the data template.
Further, in the data transaction method provided in the embodiment of the present invention, when a second member node in a federation chain needs to obtain data of a first member node, an integral equivalent to the data owned by the second member node is exchanged for the data, and after the data is decrypted, the integrity of the data is verified according to a hash algorithm, so that after the step of implementing data transaction, the data transaction method further includes:
and receiving a second member node to evaluate the data again, and calculating the current comprehensive evaluation result of the data in real time so as to provide the value of the member nodes in the alliance chain for referring to the data.
Further, in the data transaction method provided in the embodiment of the present invention, when a second member node in a federation chain needs to obtain data of a first member node, an integral equivalent to the data owned by the second member node is exchanged for the data, and after the data is revealed, the integrity of the data is verified according to a hash algorithm, so that the step of implementing data transaction specifically includes:
receiving a first member node data transaction request sent by a second member node;
after the first member node learns the data transaction request, the data is downloaded and decrypted from the alliance chain, and then the data is sent to the second member node by using an ECDH encryption algorithm.
After the second member node acquires data, the integral which is possessed by the second member node and is equivalent to the data is exchanged for the data, and the integral is given to the first member node;
after the second member node decrypts the data, the integrity of the data can be verified according to the Hash algorithm, so that data transaction is realized.
Further, in the data transaction method provided by the embodiment of the present invention, the evaluation rules in the data template include a data quality rating rule, a data scoring rule, and a point reward rule.
An embodiment of the present invention provides a data transaction apparatus, where a federation chain includes a plurality of member nodes accessing to a network of the federation chain, the apparatus including:
an encryption storage module: the data processing system is used for generating first member node data according to the user-defined data template, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into a alliance chain;
a first evaluation module: the system comprises a data template, an encryption storage module, a first member node and a second member node, wherein the data template is used for storing first member node data of a first member and a second member node;
and the transaction module is used for replacing the integral equivalent to the data owned by the second member node with the data when the second member node in the alliance chain needs to acquire the data of the first member node stored by the encryption storage module, decrypting the data and verifying the integrity of the data according to a Hash algorithm, thereby realizing data transaction.
Further, the data transaction apparatus further includes:
a receiving module: the custom data template is used for receiving the custom data template uploaded by the third member node;
a release module: and the member nodes in the preset proportion are used for publishing the data template after accepting the data template received by the receiving module.
Further, the data transaction apparatus further includes:
and a secondary evaluation module: after the data transaction module realizes data transaction, the receiving second member node evaluates the data again, and calculates the current comprehensive evaluation result of the data in real time, so that the member nodes in the alliance chain can refer to the value of the data.
Further, the data transaction module includes:
a receiving unit: the data transaction system is used for receiving a first member node data transaction request sent by a second member node;
decryption and re-encryption unit: the ECDH encryption algorithm is used for downloading and decrypting the data from the alliance chain after the first member node learns the data transaction request received by the receiving unit, and then sending the data to the second member node by using the ECDH encryption algorithm;
a data transaction unit: and after the second member node acquires the data sent by the encryption and re-encryption unit, the integral which is equivalent to the data and owned by the second member node is exchanged for the data, the integral is given to the first member node, and after the second member node decrypts the data, the integrity of the data is verified according to a Hash algorithm, so that data transaction is realized.
An embodiment of the present invention further provides a computer-readable storage medium storing a computer program, where the computer program is used to make a computer implement any one of the above-mentioned federation chain-based data transaction methods when executed.
According to the data transaction method based on the alliance chain, provided by the embodiment of the invention, the industry data rule is regulated through the self-defined data template, the data is encrypted through the Hash algorithm, the data safety is ensured not to be falsified, the evaluation rule is supervised, and the quality of transaction data is ensured. The problems that in the prior art, enterprises cannot exchange information equally, and authenticity and safety of the information exchange cannot be guaranteed are solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of a data transaction method based on a federation chain according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a data transaction method based on a federation chain according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a data transaction method based on a federation chain according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of a data transaction method based on a federation chain according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a federation chain-based data transaction apparatus according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a federation chain-based data transaction apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the embodiments of the present invention more clearly understood, the present invention is further described in detail below with reference to the accompanying drawings and the embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular internal procedures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical solution of the embodiment of the present invention, the following is a description with specific examples.
An embodiment of the present invention provides a data transaction method based on a federation chain, and fig. 1 is a schematic flow diagram of the data transaction method based on the federation chain according to the embodiment of the present invention. As shown in fig. 1, the method of this embodiment may include:
step 101, generating first member node data according to a user-defined data template, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into a alliance chain;
in this embodiment, the first member node is an enterprise a that needs to upload data, and the enterprise generates a report from part of data in its own system according to a custom data template in a federation chain, where the report is a character string in a standard format specified by the template, and the report generation process is locally generated in the enterprise, and the generation mode is determined by itself, and the final format of the report only needs to be consistent with the data template. The data uploaded and stored to the federation chain comprises reports, hash values and data summaries, wherein the hash values are automatically generated for the data reports by the data templates and are used for ensuring the uniqueness of the reports; the data summary is a keyword of the data report extracted from the data report of the enterprise by the data template, mainly comprises information such as report generation time, place, enterprise name and the like, and is convenient for searching and consulting the report.
102, carrying out primary rating on the data of the first member node according to an evaluation rule in the data template and carrying out integral reward on the first member node according to an evaluation result;
according to the evaluation rules in the data template, the data report uploaded by the enterprise A is evaluated, the perfectness of each project is compared, and according to the rules, an initial result is given: business a is awarded points M while the data is given an initial score N.
And 103, when a second member node in the alliance chain needs to acquire the data of the first member node, exchanging the integral equivalent to the data owned by the second member node for the data, decrypting the data, and verifying the integrity of the data according to a Hash algorithm, thereby realizing data transaction.
In this embodiment, the second member node is an enterprise B that needs to purchase a data report, the enterprise B finds the report issued by the enterprise a through a blockchain browser, judges whether the report is the report that is needed by the enterprise a through a data summary, and after the purchase is determined, initiates purchase information to pay the point set by the enterprise a for the report; after discovering that other enterprises purchase, the enterprise A downloads corresponding encrypted data, and after decryption, the data are transmitted to the enterprise B through encryption algorithms such as ecdh and the like; after the enterprise B obtains the data report, the integrity of the data is verified through a Hash algorithm, and then the data transaction process is completed.
In the embodiment, the enterprise encrypts and stores own data into a alliance chain according to a self-defined data template, and encrypts according to a Hash algorithm; the alliance chain evaluates the data report and gives reward points according to the evaluation rule of the data template; when the members in the alliance chain acquire the data, the authenticity of the data is verified through a Hash algorithm. Through the operation, information transaction among enterprises is realized by means of the alliance chain, the problems that in the prior art, information cannot be exchanged equally among enterprises, the authenticity and the safety of the exchanged information cannot be guaranteed and the like are solved, and equal exchange among the enterprises and the safety of data transaction limit are guaranteed; meanwhile, by means of the characteristics of non-tampering and public fairness of the block chain, the complex data exchange logic between enterprises is simplified, and the range of the exchanged information is limited in the members of the alliance chain by the advantages of the alliance chain.
As shown in fig. 2, in this embodiment, before the step of generating first member node data according to the custom data template and encrypting the data, the method further includes:
step 201, receiving a custom data template uploaded by a third member node;
and step 202, after the member nodes with the preset proportion approve the data template, publicly releasing the data template.
The members in the federation chain belong to the same field, so that one member can make a data template and execution rules and then release the data template and the execution rules to the chain federation, and before the data template is released, the rest members in the federation can evaluate the data template, and after the 2/3 members in the members approve the data template, the data template can be successfully released in the federation chain.
The execution rules mainly comprise data quality rating rules, data scoring rules and point reward rules.
The data quality rating rule is used for ensuring the quality of data, such as setting four levels of excellent, good, medium and poor;
data scoring rules are used to ensure that the rating of data can be changed dynamically, for example:
in the scoring rule, the score is superior in 90-100 points; 80-89 is divided into good; 60-79 into middle parts; the difference is 60 minutes or less.
The member 1 ranks the data as excellent, and the corresponding record is 95 points; member 2 scored it as 80, when the new score for this data in the chain was: (80+95)/2 ═ 87.5 points, so the data in the chain is scored as new: good; data score changes can ensure that good data is rated higher.
The point reward stock is used for promoting the members of the alliance chain to actively upload high-quality data, point reward is given to the data according to the rating, and the obtained points can be used for exchanging the data released by other members.
In the embodiment, the data template is defined firstly, the data template is issued to the alliance chain after being approved by most nodes, and the subsequent nodes upload data according to the predefined data template so as to ensure the uniformity of the data format; the quality of the data is ensured by setting the data quality rating; by setting a clear data grading rule, the advantages and disadvantages of data grading are realized, and nodes are further stimulated to provide more high-quality data.
As shown in fig. 3, when a second member node in the federation chain needs to obtain data of a first member node, the method further includes the steps of exchanging the integral equivalent to the data owned by the second member node for the data, decrypting the data, and verifying the integrity of the data according to a hash algorithm, thereby implementing data transaction:
and step 306, receiving the second member node to evaluate the data again, and calculating the current comprehensive evaluation result of the data in real time to provide the member nodes in the alliance chain with the value of the data for reference.
After the enterprise B purchases the data report, whether the data information in the report is accurate and reliable is judged according to the report content, the position of the report in the chain of the publisher is found, and a new score T is given to the report. After scoring, a new score for the publisher in the federation chain is triggered. The alliance chain summarizes all scores to generate an average score, the reports are ranked according to the average score, the reports with the average score are high in data quality and reliability, and other enterprises can conveniently check the reports to obtain better data information.
In this embodiment, after the second member node views the data report, the reliability of the information is automatically judged, the report is subjected to a predetermined score, a new score is generated between the score and the average score of the previous score, so that a new rank is generated on the data report, and the quality of the report purchased by an enterprise is ensured to be more reliable through the re-evaluation, thereby promoting the equality and the authenticity of information transaction.
As shown in fig. 4, when a second member node in the federation chain needs to acquire data, the integral equivalent to the data owned by the second member node is exchanged for the data, and after the data is decrypted, the integrity of the data is verified according to a hash algorithm, so that the data transaction is realized, which mainly includes:
step 401, receiving a first member node data transaction request sent by a second member node;
and step 402, after the first member node learns the data transaction request, downloading and decrypting the data from the alliance chain, and then sending the data to the second member node by using an ECDH encryption algorithm.
Step 403, after the second member node acquires the data, exchanging the integral which is possessed by the second member node and has the same value as the data for the data, and giving the integral to the first member node;
step 404, after the second member node decrypts the data, the integrity of the data can be verified according to the hash algorithm, so as to implement the data transaction.
When the enterprise B needs to purchase the report, the purchaser provides the public key of the purchaser, exchanges the public key by using the point V (the point V is a value set when the enterprise A uploads the data report), is in a locking state at the moment, and waits for the response of the issuer; after the publisher finds that the enterprise purchases are reported, the publisher inputs a key to confirm the purchase process, and then triggers the following actions on the chain: the publisher decrypts the report using the secret key, encrypts the report using the buyer's public key, stores the re-encrypted report in a federation chain, the buyer finds that the report was successfully purchased, retrieves the data from the chain, and decrypts the data using its own private key; the whole process is a mechanism inside the chain, and data can be ensured not to be tampered.
In the data transaction method based on the alliance chain in the embodiment, all behaviors from the report publisher to the report purchaser are operated in the chain, so that data unreliability caused by centralization is avoided, through a scoring mechanism, when a large number of enterprises or individuals participate, the quality of the reports and the publisher is superior or inferior, and through the decentralization mode, high-quality reports can be finally found in the chain, so that high-quality service is provided for the enterprises. By setting the exchange score number, the transfer of the score is realized, and the fair and reliable exchange of information among enterprises is ensured.
An embodiment of the present invention provides a data transaction apparatus based on federation chain, and fig. 5 is a data transaction apparatus based on federation chain provided in this embodiment, the apparatus in this embodiment may include,
501, encryption storage module: generating first member node data, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into a alliance chain;
502 first assessment module: the system comprises a data template, an encryption storage module, a first member node and a second member node, wherein the data template is used for storing first member node data of a first member and a second member node;
and the 503 transaction module is used for, when a second member node in the alliance chain needs to acquire the data of the first member node stored by the encryption storage module, exchanging the integral equivalent to the data owned by the second member node for the data, decrypting the data, and verifying the integrity of the data according to the hash algorithm, thereby realizing data transaction.
As shown in fig. 6, the method may further include:
the receiving module 601: the custom data template is used for receiving the custom data template uploaded by the third member node;
the publishing module 602: the system comprises a receiving module, a member node and a member node, wherein the receiving module is used for receiving a data template sent by the member node;
the re-assessment module 606: after the data transaction module realizes data transaction, the receiving second member node evaluates the data again, and calculates the current comprehensive evaluation result of the data in real time, so that the member nodes in the alliance chain can refer to the value of the data.
Wherein the transaction module includes:
reception unit 6051: receiving a data request sent by a second member node and converting the data request into an integral equivalent to the data, wherein the data request comprises a public key of the second member node;
decryption re-encryption unit 6052: after the first member node learns the data request received by the receiving unit, the data is decrypted, and the public key of the second member node is used for carrying out re-encryption and storing the re-encryption into the alliance chain;
data exchange unit 6053: when the second member node obtains the data re-encrypted by the decryption re-encryption unit, the integral which is possessed by the second member node and is equivalent to the data is exchanged for the data, and after the data is decrypted, the authenticity of the data is verified according to the Hash algorithm, so that data transaction is realized.
Embodiments of the present invention provide an electronic device, which includes a memory and a processor memory, and is configured to store one or more computer instructions, where the one or more computer instructions are executed by the processor to implement the federation chain-based data transaction method of any of the above embodiments.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed, the data transaction method based on the federation chain in any embodiment of the foregoing embodiments may be implemented. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Illustratively, a computer program may be partitioned into one or more modules/units, which are stored in a memory and executed by a processor to implement the present invention. One or more modules/units may be a series of computer program instruction segments capable of performing certain functions, the instruction segments being used to describe the execution of a computer program in a computer device.
The computer device may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The computer device may include, but is not limited to, a processor, a memory. Those skilled in the art will appreciate that the present embodiments are merely exemplary of a computing device and are not intended to be limiting of computing devices, and may include more or fewer components than those shown, or some of the components may be combined, or different components, e.g., the computing device may also include input output devices, network access devices, buses, etc.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage may be an internal storage unit of the computer device, such as a hard disk or a memory of the computer device. The memory may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the computer device. Further, the memory may also include both internal and external storage units of the computer device. The memory is used for storing computer programs and other programs and data required by the computer device. The memory may also be used to temporarily store data that has been output or is to be output.
An embodiment of the present invention further provides a computer-readable storage medium storing a computer program, where the computer program enables a computer to implement any one of the above-mentioned federation chain-based data transaction methods when executed.
Specific embodiments of the present invention have been described above in detail. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.

Claims (6)

1. A federation chain-based data transaction method, the federation chain including a plurality of member nodes accessing a federation chain network, the method comprising:
generating first member node data according to a user-defined data template, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into a alliance chain;
according to the evaluation rule in the data template, carrying out first-time rating on the first member node data and carrying out integral reward on the first member node according to the evaluation result;
when a second member node in the alliance chain needs to obtain data of the first member node, the integral which is possessed by the second member node and is equivalent to the data is exchanged for the data, and after the data is decrypted, the integrity of the data is verified according to a Hash algorithm, so that data transaction is realized, wherein the method comprises the following steps:
receiving a first member node data transaction request sent by a second member node;
after the first member node acquires the data transaction request, downloading and decrypting the data from the alliance chain, and then sending the data to the second member node by using an ECDH encryption algorithm;
after the second member node acquires the data, replacing the data with the integral which is equivalent to the data and owned by the second member node, and giving the integral to the first member node;
after the data is decrypted in the second member node, the integrity of the data can be verified according to a Hash algorithm, so that data transaction is realized;
and after the data transaction is finished, receiving the second member node to evaluate the data again, and calculating the current comprehensive evaluation result of the data in real time so as to provide the value of the member node in the alliance chain for referring to the data.
2. The data transaction method of claim 1, further comprising, prior to the step of generating and encrypting the first member-node data according to the custom data template:
receiving a custom data template uploaded by a third member node;
and after the member nodes with the preset proportion approve the data template, publicly releasing the data template.
3. A data transaction method according to any one of claims 1 to 2, wherein the assessment rules in the data template include data quality rating rules, data scoring rules and point reward rules.
4. A federation chain-based data transaction apparatus, the federation chain including a plurality of member nodes accessing a network of the federation chain, the apparatus comprising:
an encryption storage module: the data processing system is used for generating first member node data according to a user-defined data template, encrypting the data, generating a hash value and a data summary before data encryption according to a hash algorithm, and then storing the first member node data, the hash value and the data summary into a alliance chain;
a first evaluation module: the system comprises an encryption storage module, a data template and a first member node, wherein the encryption storage module is used for storing first member node data, and the first member node data is used for carrying out first rating according to an evaluation rule in the data template and carrying out integral reward on the first member node according to an evaluation result;
a transaction module, configured to, when a second member node in the federation chain needs to obtain data of a first member node stored in the encryption storage module, replace an integral equivalent to the data owned by the second member node with the data to obtain the data, decrypt the data, and verify integrity of the data according to a hash algorithm, so as to implement data transaction, where the transaction module includes:
a receiving unit: the data transaction system is used for receiving a first member node data transaction request sent by a second member node;
decryption and re-encryption unit: the ECDH encryption algorithm is used for downloading and decrypting the data from the alliance chain after the first member node learns the data transaction request received by the receiving unit, and then sending the data to the second member node by using the ECDH encryption algorithm;
a data transaction unit: the second member node is used for replacing the integral which is owned by the second member node and has the same value with the data to obtain the data after obtaining the data sent by the encryption and re-encryption unit, giving the integral to the first member node, and verifying the integrity of the data according to a Hash algorithm after the second member node decrypts the data, so that data transaction is realized;
and a secondary evaluation module: and the evaluation module is used for receiving the second member node to evaluate the data again after the data transaction module realizes data transaction, and calculating the current comprehensive evaluation result of the data in real time so as to provide the member nodes in the alliance chain with reference to the value of the data.
5. The apparatus of claim 4, further comprising:
a receiving module: the custom data template is used for receiving the custom data template uploaded by the third member node;
a release module: and the system is used for publishing the data template after the member nodes with the preset proportion approve the data template received by the receiving module.
6. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a computer, implements the federation chain-based data transaction method of any one of claims 1 to 3.
CN201910383586.7A 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment Active CN110287254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910383586.7A CN110287254B (en) 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910383586.7A CN110287254B (en) 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment

Publications (2)

Publication Number Publication Date
CN110287254A CN110287254A (en) 2019-09-27
CN110287254B true CN110287254B (en) 2021-08-20

Family

ID=68001654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910383586.7A Active CN110287254B (en) 2019-05-08 2019-05-08 Data transaction method and device based on alliance chain and computer equipment

Country Status (1)

Country Link
CN (1) CN110287254B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111475580B (en) * 2020-04-21 2022-09-06 北京联合永道软件股份有限公司 Data sharing method and system in alliance chain
CN113496762B (en) * 2021-05-20 2022-09-27 山东大学 Biological gene sequence summary data generation method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650270A (en) * 2018-05-16 2018-10-12 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and incentive mechanism and system
CN109472596A (en) * 2018-10-16 2019-03-15 中国传媒大学 Alliance's chain common recognition method and system based on transaction assessment
CN109509092A (en) * 2018-10-16 2019-03-22 中国传媒大学 Data trade motivational techniques and system based on alliance's chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196900B (en) * 2017-03-24 2020-04-24 创新先进技术有限公司 Consensus checking method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650270A (en) * 2018-05-16 2018-10-12 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and incentive mechanism and system
CN109472596A (en) * 2018-10-16 2019-03-15 中国传媒大学 Alliance's chain common recognition method and system based on transaction assessment
CN109509092A (en) * 2018-10-16 2019-03-22 中国传媒大学 Data trade motivational techniques and system based on alliance's chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
樊涛 等." 基于区块链技术的积分通兑平台".《2017电力行业信息化年会论文集 》.2017,第211-214页. *

Also Published As

Publication number Publication date
CN110287254A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
Bamakan et al. Patents and intellectual property assets as non-fungible tokens; key technologies and challenges
CA3058239C (en) Field-programmable gate array based trusted execution environment for use in a blockchain network
CN108197891B (en) Electronic signing device and method based on block chain
CN112491847B (en) Block chain all-in-one machine and automatic chain building method and device thereof
US11341466B2 (en) Transferring digital tickets based on blockchain networks
US20190229919A1 (en) Proof chaining and decomposition
CN110766406B (en) Resource transfer method, resource transfer device, storage medium and electronic equipment
WO2019084908A1 (en) Method and apparatus for trusted computing
EP3593515B1 (en) Managing housing scores using smart contracts in blockchain networks
CN113255005A (en) Block chain-based data asset transfer method, device and equipment
CN109583215A (en) It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN111292041A (en) Electronic contract generating method, device, equipment and storage medium
CN108537047B (en) Method and device for generating information based on block chain
US20230360047A1 (en) Verification system and method
CN111291394B (en) False information management method, false information management device and storage medium
CN116249999A (en) Consensus service for blockchain networks
CN111339201B (en) Evaluation method and system based on block chain
WO2021169767A1 (en) Data processing method and apparatus, device and medium
CN105474575A (en) Multi-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
CN110287254B (en) Data transaction method and device based on alliance chain and computer equipment
CN113498602A (en) Aggregating encrypted network values
CN113472883A (en) Method, device and equipment for storing data based on block chain and storage medium
CN112861102A (en) Block chain-based electronic file processing method and system
CN115203749A (en) Data transaction method and system based on block chain
Li Combination of blockchain and AI for music intellectual property protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant