CN114529283A - Internet of things equipment transaction method based on block chain - Google Patents

Internet of things equipment transaction method based on block chain Download PDF

Info

Publication number
CN114529283A
CN114529283A CN202210048431.XA CN202210048431A CN114529283A CN 114529283 A CN114529283 A CN 114529283A CN 202210048431 A CN202210048431 A CN 202210048431A CN 114529283 A CN114529283 A CN 114529283A
Authority
CN
China
Prior art keywords
equipment
transaction
internet
seller
nft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210048431.XA
Other languages
Chinese (zh)
Inventor
徐明辉
王均平
成秀珍
于东晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Original Assignee
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University filed Critical Shandong University
Priority to CN202210048431.XA priority Critical patent/CN114529283A/en
Publication of CN114529283A publication Critical patent/CN114529283A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain-based transaction method for Internet of things equipment. The method comprises the steps of determining ownership by using an account to which the NFT belongs, determining ownership and use right by using an ownership address field Addr in the NFT, separating the use right from the ownership, and ensuring the uniqueness of the Internet of things device by using the PUF (physical unclonable function), namely ensuring that the device is recovered from factory leaving, binding the unique ID with the NFT in the whole market circulation process, and uniquely binding equipment circulation under a chain with NFT ownership circulation on the chain.

Description

Internet of things equipment transaction method based on block chain
Technical Field
The invention relates to the fields of block chains, intelligent contracts, NFT non-homogeneous tokens, VRF verifiable random functions, zero knowledge proofs and the like, in particular to a block chain-based Internet of things equipment transaction method.
Background
The intelligent contract concept first introduced by Nick Szabo in 1995 is a computer protocol that propagates, validates, or executes contracts in an informational manner. Smart contracts require trusted transactions, which are traceable and irreversible, to be conducted without a third party. The block chain technology can perfectly ensure the credibility environment required by the intelligent contracts and the transaction tracking irreversible characteristic, so that the intelligent contract technology is further developed after the block chain technology is developed, the intelligent contract technology under the current block chain platform can be completely realized, that is to say, the algorithm which can be realized by a general computer can be theoretically completed on the intelligent contracts.
The prior second-hand Internet of things equipment transaction platform has the problems that the equipment transaction process is unclear, the equipment transaction process is likely to be rolled for many times, the equipment is likely to be overhauled and the like, part of the platform goes to the centralization, although an equipment inspector is introduced to inspect the equipment, the credibility of the equipment inspector cannot be guaranteed, and meanwhile, the centralization platform provides a pre-payment deposit mode, but throws away one hand of the buyer and the seller, and the other hand of the buyer and the seller cannot be completely guaranteed to deliver money on the other hand.
Disclosure of Invention
In order to solve the problem that buyers and sellers of the traditional second-hand Internet of things equipment transaction platform are mutually untrusted, the technology such as a block chain intelligent contract and a VRF verifiable random function is combined, traceability of the transaction on the chain is guaranteed by using the block chain, all processes from production to market circulation of the Internet of things equipment can be checked by the buyers, chain uplink and downlink binding is carried out through NFT and the Internet of things equipment, the equipment circulation is guaranteed, the asset circulation, namely joint transfer of ownership and use right, the equipment inspector is randomly selected through the VRF verifiable random function, and the randomness of the equipment inspector is guaranteed. The buyer purchase amount is collected through the intelligent contract, and the device checks the deposit of the party, so that the buyer and the device cannot cheat. The technical proposal is that the method comprises the following steps,
a block chain-based Internet of things equipment transaction method comprises the steps that the Internet of things equipment, a buyer and a seller have unique IDs, the Internet of things equipment is registered as NFT assets in an intelligent contract and is placed in a wallet account, and the transaction process is as follows;
s1, a seller sells own Internet of things equipment, and corresponding NFT assets are hung at the front end of a block chain for selling;
s2, when a buyer buys the equipment, inquiring all transfer processes of the assets of the NFT on a chain to determine the times of the transaction of the equipment, all processes of the equipment from delivery to a seller and use time information, and selecting the acceptable Internet of things equipment by the buyer and storing the prepaid payment into an intelligent contract;
s3, after receiving the buying and selling notice, the seller sets the Addr field of the NFT as the buyer wallet address AddrCThen transferring the NFT assets to a buyer account, and simultaneously carrying out offline delivery;
s4, after receiving the equipment, the buyer sends an unlocking transaction, and the Internet of things equipment is connected to the link verification information;
and S5, after the buyer verifies the private key, the seller sends and acquires income transaction, and the intelligent contract is triggered to transfer the prepayment stored in the intelligent contract by the buyer into the account of the seller.
It is further preferable that the ID of the internet-of-things device is configured by the producer using a PUF physically unclonable function, NFT ═ ID, INFO, Addr }, where ID and INFO are inherent flags of the device, and it is a read-only field that cannot be modified, Addr represents an ownership address used to unlock the device when the physical device is transferred, and Addr is first set as the vendor wallet address AddrAThe seller of the first transaction is the producer.
It is further preferred that, if not the first transaction, the introduction of the equipment validator is as follows,
after the seller deposits the advance payment at the buyer, the VRF verifiable random function is called to generate a random number for selecting one equipment check from the equipment checkers registered on the chain, and the selected equipment checkers send a transaction to deposit the deposit into the intelligenceIn the contract account, after the equipment checking party deposits the deposit, the seller firstly sends the Internet of things equipment to the equipment checking party, and modifies the ownership address Addr in the NFT asset into the wallet address Addr of the equipment checking partyBHaving the equipment verifier check, the seller changes the ownership address Addr in the NFT asset to the buyer wallet address Addr after the equipment verifier sends a validation transactionCAnd transfers the NFT to the buyer account.
Further preferably, the device inspector unlocks the device in a different manner from the buyer, and the device ownership does not belong to the device inspector, i.e. the NFT asset is not in the device inspector wallet, and the private key input to the device inspector when the device inspector unlocks is matched with Addr in the NFT, but the ownership address Addr in the NTF is matched with the address of the wallet (i.e. the address of the seller) AddrANot equal, so the ownership address at this time is degenerated to the usage address.
Preferably, the equipment verifying party verifies whether the performance index of the internet of things equipment meets the promise of the seller, if the performance index meets the promise of the seller, a verification transaction is sent, the equipment is forwarded to the buyer, and meanwhile, the equipment verifying party obtains a corresponding token reward.
If the performance of the Internet of things equipment is verified by the equipment verifying party to be in accordance with the quality promised by the seller, the equipment verifying party sends a failed verification transaction, uploads a verification report and sends the equipment back to the seller, and meanwhile, the equipment verifying party still obtains a corresponding verification token reward; meanwhile, the transaction can trigger the buyer to return the prepayment from the intelligent contract and cancel the transaction.
Further optionally, the unlock transaction includes a proof of zero knowledge to prove that the user does hold the private key; the device can be unlocked by verifying proof on the chain, and meanwhile, the unlocking transaction also verifies whether Addr in NFT corresponding to the device ID is equal to the buyer wallet address AddrCIf equal, it means that ownership and ownership are transferred at the same time, and the wallet address has full control over the device and NFT, and if not equal, it means that only temporary use is allowed.
Further, the ownership address Addr is calculated through a private key of any one of the equipment inspector, the buyer, the seller and the producer, that is, the private key is matched with the ownership address Addr, the ownership address Addr adopts an elliptic curve digital signature algorithm to map the private key into a public key, and then the public key is hashed to calculate the hash value of the public key.
The ownership address Addr is divided into two cases according to the auction process of the internet of things equipment, wherein the first case is that the ownership address Addr is set as the address of a wallet of a producer when the internet of things equipment is produced and sold for the first timeAAfter receiving the purchase and sale notice, the seller sets the Addr field of the NFT as the buyer wallet address AddrCFor the buyer to unlock the transaction;
the second case is a second-hand transaction, where the seller's party wallet address Addr is setAThe seller sends the Internet of things equipment to the equipment inspector after the equipment inspector deposits the deposit, and modifies the ownership address Addr in the NFT asset into the wallet address Addr of the equipment inspectorBThe equipment verifier checks to send a verification pass transaction to change the ownership address Addr in the NFT asset to the buyer wallet address AddrCAnd transfers the NFT to the buyer account.
Interpretation of terms
NFT (non-homogeneous token) is a concept compared with homogeneous tokens, which are tokens such as BTC and ETH tokens that can be substituted and divided infinitely, and can represent real money, stocks, points, etc., and the transactions require the property of being separable. Non-homogeneous tokens mean non-replaceable and indivisible, in reality most of the transactions of value are practically non-separable, e.g. a good, a share, etc. NFT assets are now available to uniquely define a commodity under a chain on the chain, and NFT is used to certify and trace the commodity under the chain.
The VRF verifiable random function is a random function generation mode which combines a random oracle machine and zero knowledge proof. The random prediction machine can ensure any input and can obtain a random number output. The random function is verified to be more than the random oracle by a non-interactive zero-knowledge proof, which is used for the correctness of the random number output to indicate that the random number is generated by the user of the corresponding private key node.
A physically unclonable function (i.e. PUF) is a "digital fingerprint" that is used as the unique identity of a semiconductor device, such as a microprocessor. PUFs are based on physical changes that occur naturally in semiconductor devices during wafer fabrication and make it possible to distinguish between other identical semiconductors. The circuit generates a unique output value that can remain constant over different time, temperature and operating voltage conditions. Any attempt to probe or observe the PUF operation will change the underlying circuit characteristics, which may guard against an intrusive physical attack detecting the unique value used by the chip cryptographic function. PUFs are commonly used in cryptography. A physical unclonable function is a physical entity embodied in a physical structure.
Zero Knowledge Proof (Zero Knowledge Proof): abbreviated ZKP, which in effect means that the prover trusts a certain argument to be correct without providing any useful information. The prover wants to make a way for the verifier to believe that the prover has some knowledge, but at the same time, wants to make a way to ensure that no knowledge is revealed in the whole process.
Advantageous effects
1. According to the invention, by using a block chain technology, the traditional centralized third-party platform is decentralized, so that platform arbitrage is reduced; the possibility of cheating by buyers and sellers and equipment inspectors is prevented through intelligent contract technology.
2. The data are recorded on the block chain, so that the data cannot be tampered, and the real validity of the data is ensured, and a buyer can trace the whole process from factory delivery to market circulation of the Internet of things equipment on the chain.
3. Random number verifiable by VRF technology, equipment inspector is randomly drawn out, thereby preventing the possibility of joint cheating of equipment inspector and seller
4. According to the scheme, the Internet of things equipment is unlocked by matching whether the address of the NFT asset is in a pair with a private key held by a user of the Internet of things equipment, the public key is public, but the user cannot expose the private key of the user for matching, so that a zero-knowledge proof method is introduced in the scheme, the private key is used as the private key input to be input into a circuit, and the private key is verified to be effectively matched with the corresponding public key under the condition that the private key is not exposed.
5. The NFT mode is introduced, uplink and downlink transfer information of a chain is unified, and the transfer of NFT on the chain is also meant while the physical transfer of the chain is carried out. The ownership is determined by using the account to which the NFT belongs, the ownership and usage rights are determined by using the ownership address field Addr in the NFT, and the usage rights are separated from the ownership rights.
6. The PUF is used for guaranteeing the uniqueness of the internet of things equipment, namely the equipment is guaranteed to be recycled from factory leaving, the unique ID is bound with the NFT in the whole market circulation process, and equipment circulation under the chain is uniquely bound with NFT ownership circulation on the chain.
Drawings
FIG. 1 is a schematic diagram of a transaction process;
FIG. 2 is a schematic diagram of a second-hand transaction process;
wherein
A seller: a party selling Internet of things equipment;
the buyer: a party purchasing an internet of things device;
the manufacturer: the Internet of things equipment producer refers to a first seller in the system;
equipment checking: and verifying the quality of the equipment of the Internet of things.
Detailed Description
The following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application.
A block chain-based Internet of things equipment transaction method comprises the following steps of performing a one-hand transaction process, wherein the process is described in figure 1,
the method comprises the steps that firstly, a producer produces the Internet of things equipment, configures a unique ID for the Internet of things equipment through a PUF physical unclonable function and writes the unique ID into Internet of things equipment firmware, wherein the ID has uniqueness, and the IDs of all the Internet of things equipment are different.
The ID of the device of the Internet of things is configured by a production party by using a PUF physical unclonable function and has uniqueness, NFT is { ID, INFO, Addr }, wherein the ID and the INFO are inherent marks of the device, a read-only field cannot be modified, Addr represents an ownership address used for unlocking the device during physical device transfer and is set as a seller wallet address Addr for the first timeAThe seller of the first transaction is the producer.
Step two, a producer sells the internet of things equipment, the equipment is uniformly registered as NFT assets in an intelligent contract and placed in a wallet account, the equipment ID + the producer wallet address Addr + the equipment information INFO (such as equipment pictures, factory information and the like) are required to be used for registration, the NFT is { ID, INFO and Addr }, wherein the ID and the INFO are inherent marks of one piece of equipment, a read-only field cannot be modified, the Addr represents an ownership address and is used when the equipment is unlocked during physical equipment transfer, and the ownership address is set as a manufacturer wallet address at the moment. The producer sales device only needs to hang the NFT asset to the front end for sale, that is, the internet of things device is in a sale state.
Step three, when a buyer (represented by a user in the figure 1) buys the Internet of things equipment, transferring the prepayment into an intelligent contract account;
step four, after the producer receives the buying and selling notice, setting the Addr field of the NFT as the buyer wallet address AddrCThe NFT assets are then transferred to the buyer's account while being shipped offline.
And step five, after receiving the equipment, the buyer sends an unlocking transaction, and the equipment bottom layer firmware is connected to the chain verification information.
A block chain-based Internet of things equipment transaction method is characterized in that a seller in first transaction is a producer, and a buyer is a seller in next transaction. The second-hand transaction process is as follows,
step one, when a seller wants to sell own Internet of things equipment, the seller only needs to hang the corresponding NFT asset to the front end to sell the equipment, and the equipment is in a selling state.
Step two, when the buyer (indicated by user in fig. 2) buys the device, it can query all the transfer processes of the NFT assets in the chain to determine the information such as the number of times the device is transacted, all the flows of the device from the factory to the seller and the time of use, from which the buyer can select the acceptable device and store the prepaid fee in the intelligent contract.
Step three, after the buyer deposits the advance payment, the seller calls a VRF verifiable random function to generate a random number for selecting one bit from the equipment inspection registered on the chain for equipment inspection.
And step four, the selected equipment checking party sends a transaction to deposit the deposit into the intelligent contract account.
Step five, after the equipment checking party deposits deposit, the seller sends the Internet of things equipment to the equipment checking party, and the ownership address Addr in the NFT asset is modified into the wallet address Addr of the equipment checking partyBThe equipment inspection side is convenient to inspect.
At this point, the device verifier unlocks the device differently than the buyer because the device ownership does not belong to the device verifier at this point, i.e., the NFT asset is not in the device verifier wallet. Therefore, the device verifier inputs its private key and Addr in NFT when unlockingAA match is made, but at this point in time the ownership address Addr in the NTF and the seller wallet address AddrAInequality (inequality can be unlocked, but ownership of the equipment is not changed, and an owner cancels the unlocking authority of the equipment inspector at any time, namely the use authority of the equipment inspector is controlled by the owner), so that the wallet address Addr of the equipment inspector at the momentBIs the use right address.
The equipment verifying party performs function verification, wear verification and the like on the equipment to determine whether the equipment meets the promise of the seller, if so, a verification transaction is sent, the equipment is forwarded to the buyer, and meanwhile, the equipment verifying party obtains a corresponding token reward.
If the equipment verifying party verifies that the equipment does not meet the quality promised by the seller, the equipment verifying party sends a failed verification transaction, uploads a verification report and sends the equipment back to the seller, and meanwhile, the equipment verifying party still obtains a corresponding verification token reward. Meanwhile, the transaction can trigger the return of the advance payment of the buyer from the intelligent contract and cancel the transaction.
Step six, the seller changes the ownership address Addr in the NFT asset into the buyer wallet address Addr after the equipment verifier sends verification passing transactionCAnd transfers the NFT to the buyer account. Each modification of the NFT needs to be satisfied, namely, the NFT exists in an account of a modifier; ② only Addr field can be modified
And step seven, after receiving the equipment, the buyer sends an unlocking transaction, and the equipment bottom layer firmware is connected to the on-chain verification information.
The unlock transaction includes a proof of zero knowledge proof to prove that the user does hold the private key. The device can be unlocked by verifying proof on the chain. The unlock transaction also verifies that Addr in the NFT corresponding to the device ID is equal to the modified wallet address (buyer or verifier or seller), and if so, it represents that ownership and ownership are transferred at the same time, and the wallet address has full control over the device and NFT. If not, it represents that only temporary use right exists.
proof is zk-SNARK proof, which proves the following:
the generation of the address Addr can be calculated by checking the private key of the party, i.e. the private key matches the address Addr.
Proof circuit design scheme is as follows:
taking an etherhouse as an example, the etherhouse account address Addr adopts an elliptic curve digital signature algorithm ECDSA-secp256k1 to map a private key into a public key, and then the public key (non-compressed public key) hash is used to calculate the Keccak-256 hash value of the public key. And taking 20bytes after the hash result, namely the Etherhouse address.
Therefore, the verification scheme is designed as follows: the proof of design circuit is the Addr generation process above, where the private key is used as private access and the address is used as public input, i.e. only the correct private key can generate the address. I.e. the address is treated as a commit which guarantees uniqueness.
Step eight, after the buyer verifies the private key, the seller can send income acquisition transaction and trigger the intelligent contract to transfer the prepayment stored in the intelligent contract by the buyer into the account of the seller.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (8)

1. The block chain-based Internet of things equipment transaction method is characterized by comprising Internet of things equipment, a buyer and a seller, wherein the Internet of things equipment has a unique ID and is registered as an NFT asset in an intelligent contract and is placed in a wallet account, and the transaction process is as follows;
s1, a seller sells own Internet of things equipment, and corresponding NFT assets are hung at the front end of a block chain for selling;
s2, when a buyer buys the equipment, inquiring all transfer processes of the assets of the NFT on a chain to determine the times of the transaction of the equipment, all processes of the equipment from delivery to a seller and use time information, and selecting the acceptable Internet of things equipment by the buyer and storing the prepaid payment into an intelligent contract;
s3, after receiving the buying and selling notice, the seller sets the Addr field of the NFT as the buyer wallet address AddrCThen transferring the NFT assets to a buyer account, and simultaneously carrying out offline delivery;
s4, after receiving the equipment, the buyer sends an unlocking transaction, and the Internet of things equipment is connected to the link verification information;
and S5, after the buyer verifies the private key, the seller sends an income acquisition transaction and triggers the intelligent contract to transfer the prepayment stored in the intelligent contract by the buyer into the account of the seller.
2. The method as claimed in claim 1, wherein the ID of the device in the internet of things is configured by the producer using PUF physical unclonable function, NFT ═ ID, INFO, Addr }, where ID and INFO are intrinsic flags of the device, read-only field is not modifiable, Addr represents ownership address for setting the physical configurationFor use in unlocking the device for transfer, the first setting being the seller's wallet address AddrAThe seller of the first transaction is the producer.
3. The transaction method of the Internet of things equipment based on the blockchain as claimed in claim 1, wherein if the transaction is not the first transaction, the equipment checking party is introduced, and the process is as follows,
after the seller deposits the advance payment at the buyer, calling VRF verifiable random function to generate random number for selecting one of the equipment verifiers registered on the chain to check the equipment, the selected equipment verifier sends a transaction to deposit into the intelligent contract account, the seller sends the Internet of things equipment to the equipment verifier after the equipment verifier deposits the deposit, and the ownership address Addr in the NFT asset is modified to the equipment verifier wallet address AddrBHaving the equipment verifier check, the seller changes the ownership address Addr in the NFT asset to the buyer's wallet address Addr after the equipment verifier sends a validation pass transactionCAnd transfers the NFT to the buyer account.
4. The device transaction method for internet of things based on blockchain as claimed in claim 3, wherein the device verifier unlocks the device in a different manner from the buyer, and the ownership of the device does not belong to the device verifier, i.e. the NFT asset is not in the device verifier wallet, and the device verifier inputs its private key to match with Addr in the NFT when unlocking the device, but the ownership address Addr in the NTF matches with the seller wallet address AddrANot equal, so the device verifier wallet address Addr at this pointBIs the use right address.
5. The device transaction method of the internet of things based on the blockchain as claimed in claim 3, wherein the device verifying party verifies whether the performance index of the device of the internet of things meets the promise of the seller, and if the performance index meets the promise of the seller, the device verifying party sends a verification transaction and forwards the device to the buyer, and meanwhile, the device verifying party obtains a corresponding token reward.
6. The transaction method of the internet of things equipment based on the blockchain as claimed in claim 3, wherein if the equipment verifying party verifies that the performance of the internet of things equipment does not meet the quality promised by the seller, the equipment verifying party sends a failure verification transaction, uploads a verification report and sends the equipment back to the seller, and meanwhile, the equipment verifying party still obtains a corresponding verification token reward; meanwhile, the transaction can trigger the buyer to return the prepayment from the intelligent contract and cancel the transaction.
7. The method as claimed in claim 1, wherein the unlock transaction includes a proof of zero knowledge to prove that the user actually holds the private key; the device can be unlocked by verifying proof on the chain, and meanwhile, the unlocking transaction also verifies whether Addr in NFT corresponding to the device ID is equal to the buyer wallet address AddrCIf equal, it means that ownership and ownership are transferred at the same time, and the wallet address has full control over the device and NFT, and if not equal, it means that only temporary use is allowed.
8. The device transaction method of the internet of things based on the blockchain as claimed in claim 7, wherein the ownership address Addr is calculated by a private key of any one of the device inspector, the buyer, the seller and the producer, that is, the private key is matched with the ownership address Addr, the ownership address Addr adopts an elliptic curve digital signature algorithm to map the private key into the public key, and then the public key is hashed to calculate the hash value of the public key.
CN202210048431.XA 2022-01-17 2022-01-17 Internet of things equipment transaction method based on block chain Pending CN114529283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210048431.XA CN114529283A (en) 2022-01-17 2022-01-17 Internet of things equipment transaction method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210048431.XA CN114529283A (en) 2022-01-17 2022-01-17 Internet of things equipment transaction method based on block chain

Publications (1)

Publication Number Publication Date
CN114529283A true CN114529283A (en) 2022-05-24

Family

ID=81620701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210048431.XA Pending CN114529283A (en) 2022-01-17 2022-01-17 Internet of things equipment transaction method based on block chain

Country Status (1)

Country Link
CN (1) CN114529283A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115049378A (en) * 2022-06-08 2022-09-13 支付宝(杭州)信息技术有限公司 Service execution method, device, equipment and computer readable medium
CN116383875A (en) * 2023-03-22 2023-07-04 深圳市明源云科技有限公司 Data processing method, device and equipment for property right transaction and storage medium thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115049378A (en) * 2022-06-08 2022-09-13 支付宝(杭州)信息技术有限公司 Service execution method, device, equipment and computer readable medium
CN116383875A (en) * 2023-03-22 2023-07-04 深圳市明源云科技有限公司 Data processing method, device and equipment for property right transaction and storage medium thereof

Similar Documents

Publication Publication Date Title
US20200272619A1 (en) Method and system for audit and payment clearing of electronic trading systems using blockchain database
Asgaonkar et al. Solving the buyer and seller’s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator
US11568415B2 (en) Decentralized safeguard against fraud
US11562451B1 (en) Apparatus for proportional calculation regarding non-fungible tokens
US20200193432A1 (en) Method and system for settling a blockchain transaction
JP2020035436A (en) Traceability system for pet food
US6119229A (en) Virtual property system
EP3824423A1 (en) Blockchain transaction safety using smart contracts
JP2018173692A (en) Article information management apparatus, system, method and program
CN111899107B (en) Scientific and technological service transaction method based on block chain intelligent contract
CN114529283A (en) Internet of things equipment transaction method based on block chain
CN113283957B (en) Entity product transaction method based on blockchain
US11356258B2 (en) Methods and systems for distributed cryptographically secured data validation
CN110263092A (en) Rent method and device based on block chain
Hasan et al. Incorporating registration, reputation, and incentivization into the NFT ecosystem
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
CN114155095A (en) Digital artwork authentication and transaction system and authentication and transaction method
Harshavardhan et al. Blockchain technology in cloud computing to overcome security vulnerabilities
Li et al. A Blockchain‐Based Sealed‐Bid e‐Auction Scheme with Smart Contract and Zero‐Knowledge Proof
CN110471982A (en) Data processing method and device based on block chain
Hossain et al. Thwarting counterfeit electronics by blockchain
CN112801785A (en) Fair data transaction method and device based on block chain intelligent contract
CN115210736A (en) System and method for secure peer-to-peer transfer of content in a distributed ledger network
Doğan et al. A blockchain-based e-commerce reputation system built with verifiable credentials
CN114726535B (en) Privacy protection anti-fake automobile supply chain method based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination