CN113836239A - Transaction data supervision method, storage medium and computer equipment - Google Patents

Transaction data supervision method, storage medium and computer equipment Download PDF

Info

Publication number
CN113836239A
CN113836239A CN202111173603.8A CN202111173603A CN113836239A CN 113836239 A CN113836239 A CN 113836239A CN 202111173603 A CN202111173603 A CN 202111173603A CN 113836239 A CN113836239 A CN 113836239A
Authority
CN
China
Prior art keywords
transaction
transaction data
initiator
receiver
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111173603.8A
Other languages
Chinese (zh)
Inventor
奚海峰
曹恒
黄耀东
程文席
胡智威
张业龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bianjie Intelligent Technology Co ltd
Original Assignee
Shanghai Bianjie Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bianjie Intelligent Technology Co ltd filed Critical Shanghai Bianjie Intelligent Technology Co ltd
Priority to CN202111173603.8A priority Critical patent/CN113836239A/en
Publication of CN113836239A publication Critical patent/CN113836239A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a transaction data supervision method, a storage medium and computer equipment. The method is used for supervising the transaction data between user nodes according to transaction contracts signed by a plurality of users, and is characterized in that the transaction data supervising method comprises the following steps: acquiring a transaction request initiated from a user node serving as an initiator to a user node serving as a receiver; verifying whether the transaction credibility weight of the initiator is higher than a predetermined threshold; when the transaction credibility weight is higher than a preset threshold value, generating a corresponding transaction contract according to the transaction request after the receiver agrees, carrying out multi-party encryption based on the keys of the initiator, the receiver and the supervisor, and then storing the encrypted transaction contract on the block chain; when transaction data submitted by an initiator or a receiver is received, verifying the transaction data according to a transaction contract; and when the transaction data is verified to be legal, adding a transaction completion identifier for the corresponding transaction contract, wherein the supervisor can decrypt and access the transaction contract based on the secret key under a trusted execution environment.

Description

Transaction data supervision method, storage medium and computer equipment
Technical Field
The invention belongs to the field of block chains, and particularly relates to a transaction data supervision method.
Background
With the development of informatization and digital currency, more and more businesses and individuals make purchases of goods and delivery of orders through online transactions. When a transaction is generated, private data such as bank account information, identity information and the like of two transaction parties are inevitably acquired by a transaction platform, the information is lost, falsified, leaked and the like, and the private data of a user is easy to be an attack target of a hacker after the scale of the transaction platform becomes large.
The block chain has the technical characteristics of decentralization, openness, anonymity, safety, non-falsification and the like, can ensure the privacy of both users when applied to a transaction platform, can reduce the trust cost among different participants, and improves the working efficiency.
For these trading platforms, it is also necessary for government regulatory authorities to monitor the trading content, and to perform processes such as responsibility tracing and recall in the first time when the quality problem or related disputes occur in the commodities. However, the contradiction between the requirement of high information disclosure by government regulation and the requirement of privacy protection by enterprises is very severe, and how to ensure that the government can not only ensure that transactions are normal, but also protect the privacy of the enterprises is a great problem.
Disclosure of Invention
In order to solve the problems, the invention provides a cross-chain sharing method capable of sharing medical information in various medical institutions, which adopts the following technical scheme:
the invention provides a transaction data supervision method, which is used for supervising transaction data among user nodes according to transaction contracts signed by a plurality of users, and is characterized by comprising the following steps: acquiring a transaction request initiated from a user node serving as an initiator to a user node serving as a receiver; verifying whether the transaction credibility weight of the initiator is higher than a predetermined threshold; when the transaction credibility weight is higher than a preset threshold value, generating a corresponding transaction contract according to the transaction request after the receiver agrees, carrying out multi-party encryption based on the keys of the initiator, the receiver and the supervisor, and then storing the encrypted transaction contract on the block chain; when transaction data submitted by an initiator or a receiver is received, verifying the transaction data according to a transaction contract; and when the transaction data is verified to be legal, adding a transaction completion identifier for the corresponding transaction contract, wherein the supervisor can decrypt and access the transaction contract based on the secret key under a trusted execution environment.
The transaction data supervision method provided by the invention can also have the technical characteristics that the method comprises the following steps: when the transaction data are verified to be illegal, the transaction data are sent to the monitoring party for secondary verification; when the supervisor verifies that the transaction data is illegal, a transaction failure identifier is added to the corresponding transaction contract, and the transaction credibility weight of the initiator or the receiver initiating the transaction data is reduced.
The transaction data supervision method provided by the invention can also have the technical characteristics that the method comprises the following steps: and when the transaction credibility weight is not higher than a preset threshold value, generating corresponding warning information to the receiving party based on the historical transaction contract of the initiator and the corresponding transaction failure identification so as to remind the receiving party that the transaction request has credible risk.
The transaction data supervision method provided by the invention can also have the technical characteristics that the transaction data is stored in the database under the chain and can only be accessed by the initiator and the receiver.
The invention also provides a computer-readable storage medium, which stores a computer program, wherein the computer program, when executed by a processor, implements the transaction data monitoring method as described above.
The present invention also provides a computer device comprising: a memory and a processor; the memory has stored thereon a computer program executable by the processor; when the processor runs the computer program, the transaction data supervision method is executed.
Action and Effect of the invention
According to the medical information transaction data supervision method, the readable medium and the computer equipment, when a transaction request is obtained, the initiator can be verified according to the transaction credibility weight of the initiator, a corresponding transaction contract is generated when the initiator is verified to be credible and the two parties agree, and the transaction contract is further subjected to multi-party encryption through the keys of the initiator, the receiver and the supervisor. Meanwhile, when the transaction is carried out between the receiver and the initiator and the transaction data is generated, whether the transaction data is legal or not can be automatically judged according to the transaction contract, and further, when the transaction data is judged to be legal, the transaction data is directly stored into a linked database, so that the transaction data actually generated by the two parties of the transaction can not be leaked, and the privacy of the two parties can be protected.
Drawings
FIG. 1 is a flow chart of a transaction data monitoring method in an embodiment of the invention.
Detailed Description
In order to make the technical means, the creation features, the achievement purposes and the effects of the invention easy to understand, the transaction data supervision method, the storage medium and the computer equipment of the invention are specifically described below with reference to the embodiments and the drawings.
< example >
FIG. 1 is a flow chart of a transaction data monitoring method in an embodiment of the invention.
As shown in fig. 1, the transaction data monitoring method specifically includes the following steps S1 to S4.
Step S1, a transaction request initiated by the user node as the initiator to the user node as the receiver is obtained.
In this embodiment, the holders of the user nodes may be various enterprises, organizations, or individuals.
And step S2, verifying whether the transaction credibility weight of the initiator is higher than a preset threshold, and entering step S3 when the transaction credibility weight is higher than the preset threshold, and entering step S4 when the transaction credibility weight is not higher than the preset threshold.
Each user node has a corresponding transaction confidence weight, and the transaction confidence weight is adjusted to be reduced when the user loses confidence (namely, the agreed contract is not finished). In this embodiment, the transaction confidence weight has a value range of 0 to 1, and the predetermined threshold value is 0.7.
Step S3, generating corresponding trade contract according to the trade request after the receiver agrees, and storing the contract on the block chain after multi-party encryption based on the key of the initiator, the receiver and the supervisor, and then entering step S5.
In step S3 of this embodiment, the keys of the initiator, the receiver, and the administrator are calculated to obtain an encryption key through multi-party security calculation, and the transaction contract is encrypted based on the encryption key.
Step S4, based on the historical transaction contract of the initiator and the corresponding transaction failure identification, generating corresponding warning information to the receiver so as to remind the receiver that the transaction request has credible risk, and then entering step S3.
In this embodiment, the warning information includes the transaction confidence weight of the initiator and the bad transaction record, so that the receiver determines whether to receive the transaction request lifted by the initiator according to the information, and if the initiator receives the transaction request, the process proceeds to step S3 to generate the contract.
In addition, in this embodiment, the monitoring party can obtain the corresponding encryption key through the multiparty security calculation again according to the key in the trusted execution environment, and further decrypt and access the transaction contract, thereby implementing the monitoring of the transaction contract.
And step S5, when the transaction data submitted by the initiator or the receiver is received, verifying the transaction data according to the transaction contract, and when the transaction data is verified to be legal, entering step S6, and when the transaction data is verified to be illegal, entering step S7.
And step S6, adding a trade completion identifier for the corresponding trade contract.
In this embodiment, the supervisor may also screen the transaction contract according to the transaction completion identifier and the transaction failure identifier.
In addition, after adding the transaction completion identifier to the transaction contract, the corresponding transaction data may be stored in the linked database, and these transaction data can only be accessed by the initiator and the receiver.
And step S7, sending the transaction data to the supervisor for secondary verification, and entering step S8 when the supervisor verifies that the transaction data is illegal, and entering step S6 when the verification is legal.
And step S8, adding a transaction failure identifier for the corresponding transaction contract, and reducing the transaction credibility weight of the initiator or the receiver initiating the transaction data.
The above explains the specific content of the transaction data supervision method provided by the embodiment. In other aspects of the invention, the above-described method may also be configured as a corresponding computer program and stored in a memory of a computer device. When the processor of the computer device runs the computer program, the transaction data monitoring method of the embodiment can be executed.
In addition, the embodiment also provides a computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions are used to enable a computer to execute the transaction data supervision method provided by the embodiment of the invention.
Examples effects and effects
According to the medical information transaction data supervision method, the readable medium and the computer device provided by the embodiment, when a transaction request is obtained, the initiator can be verified according to the transaction credibility weight of the initiator, a corresponding transaction contract is generated when the initiator is verified to be credible and the two parties agree, and the transaction contract is further subjected to multi-party encryption through the keys of the initiator, the receiver and the supervisor. Meanwhile, when the transaction is carried out between the receiver and the initiator and the transaction data is generated, whether the transaction data is legal or not can be automatically judged according to the transaction contract, and further, when the transaction data is judged to be legal, the transaction data is directly stored into a linked database, so that the transaction data actually generated by the two parties of the transaction can not be leaked, and the privacy of the two parties can be protected.
The above-described embodiments are merely illustrative of specific embodiments of the present invention, and the present invention is not limited to the description of the above-described embodiments.

Claims (6)

1. A transaction data supervision method for supervising transaction data between user nodes according to transaction contracts signed by a plurality of users, characterized by comprising the steps of:
acquiring a transaction request initiated by the user node as an initiator to the user node as a receiver;
verifying whether the transaction trustworthiness weight of the initiator is above a predetermined threshold;
when the transaction credibility weight is higher than the preset threshold value, generating a corresponding transaction contract according to the transaction request after the receiver agrees, performing multi-party encryption based on the keys of the initiator, the receiver and the supervisor, and storing the encrypted key in the block chain;
when transaction data submitted by the initiator or the receiver is received, verifying the transaction data according to the transaction contract;
when the transaction data is verified to be legal, adding a transaction completion identifier for the corresponding transaction contract,
wherein the supervisor is capable of decrypting and accessing the transaction contract based on the key in a trusted execution environment.
2. The transaction data curation method according to claim 1, further comprising the steps of:
when the transaction data are verified to be illegal, the transaction data are sent to the monitoring party for secondary verification;
and when the supervisor verifies that the transaction data are illegal, adding a transaction failure identifier for the corresponding transaction contract, and reducing the transaction credibility weight of the initiator or the receiver initiating the transaction data.
3. The transaction data curation method according to claim 2, further comprising the steps of:
and when the transaction credibility weight is not higher than the preset threshold, generating corresponding warning information to the receiving party based on the historical transaction contracts of the initiator and the corresponding transaction failure identifications so as to remind the receiving party that the transaction request has credible risk.
4. The transaction data policing method of claim 1, wherein:
wherein the transaction data is stored in a database under the chain and is accessible only by the initiator and the recipient.
5. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out a method of supervising transaction data according to any one of claims 1 to 4.
6. A computer device, comprising: a memory and a processor; the memory having stored thereon a computer program executable by the processor; the processor, when executing the computer program, performs the method of transaction data administration of any of claims 1-4.
CN202111173603.8A 2021-10-09 2021-10-09 Transaction data supervision method, storage medium and computer equipment Pending CN113836239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111173603.8A CN113836239A (en) 2021-10-09 2021-10-09 Transaction data supervision method, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111173603.8A CN113836239A (en) 2021-10-09 2021-10-09 Transaction data supervision method, storage medium and computer equipment

Publications (1)

Publication Number Publication Date
CN113836239A true CN113836239A (en) 2021-12-24

Family

ID=78968418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111173603.8A Pending CN113836239A (en) 2021-10-09 2021-10-09 Transaction data supervision method, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN113836239A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114881781A (en) * 2022-05-11 2022-08-09 孙继东 Safe transaction system and method based on block chain technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114881781A (en) * 2022-05-11 2022-08-09 孙继东 Safe transaction system and method based on block chain technology

Similar Documents

Publication Publication Date Title
CN111049825B (en) Secure multi-party computing method and system based on trusted execution environment
WO2019007396A1 (en) Method and device for conducting encrypted transaction based on smart contract, and blockchain
CN111563261A (en) Privacy protection multi-party computing method and system based on trusted execution environment
CN105745661A (en) Policy-based trusted inspection of rights managed content
US11379616B2 (en) System and method for providing anonymous validation of a query among a plurality of nodes in a network
US20180241560A1 (en) Device attestation
CN111294203B (en) Information transmission method
JP4740253B2 (en) A secure delegation method for computing bilinear applications
CN113626852A (en) Safe and efficient method, system and application for anonymizing chain elements of unlicensed blocks
CN112632574A (en) Multi-mechanism data processing method and device based on alliance chain and related equipment
CN115001775B (en) Data processing method, device, electronic equipment and computer readable storage medium
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN114363013B (en) Supervision-friendly blockchain content privacy protection system, message sending and query method
CN104935608A (en) Identity authentication method in cloud computing network
CN113836239A (en) Transaction data supervision method, storage medium and computer equipment
CN110363528B (en) Collaborative address generation method, collaborative address generation device, transaction signature method, transaction signature device and storage medium
CN111932261A (en) Asset data management method and device based on verifiable statement
CN104935606A (en) Terminal login method in cloud computing network
CN114117471A (en) Confidential data management method, electronic device, storage medium, and program product
CN113159774A (en) Monitorable zero-knowledge proof verification method and system in block chain
CN112925535A (en) Method and device for installing embedded application of password chip
CN104935607A (en) Login certification method in cloud computing network
CN111555857A (en) Edge network and network transmission method
TWI790745B (en) Data backup carrier and backup system having the same
CN114826653B (en) Credential verification method, system, device, equipment and storage medium based on blockchain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination