CN108537047B - Method and device for generating information based on block chain - Google Patents
Method and device for generating information based on block chain Download PDFInfo
- Publication number
- CN108537047B CN108537047B CN201810136192.7A CN201810136192A CN108537047B CN 108537047 B CN108537047 B CN 108537047B CN 201810136192 A CN201810136192 A CN 201810136192A CN 108537047 B CN108537047 B CN 108537047B
- Authority
- CN
- China
- Prior art keywords
- information
- identity information
- blockchain
- user
- commodity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Automation & Control Theory (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a method and a device for generating information based on a block chain. The method relates to the field of computer information processing, and comprises the following steps: acquiring first identity information of a first user; and generating second identity information of the first user according to the first identity information and the encryption algorithm. According to the method and the device for generating the information based on the blockchain, disclosed by the application, the true identity of the user can be confirmed through a technical means, so that the user can quickly and accurately acquire the trusted authentication.
Description
Technical Field
The application relates to the field of computer information processing, in particular to a method and a device for generating information based on a block chain.
Background
As networks evolve, more and more users or merchants choose to process transactions in life through services provided by the networks. More and more users may, for example, choose to purchase goods through a network merchant. But the anonymity, the virtuality, the information asymmetry and the like of the online transaction make trust an indispensable part. Trust is the basis for all transactions and can encourage transaction actions to occur. The merchant account numbers of the traditional electronic commerce platform are all logged in by using a user name and a password. The merchant operates on the e-commerce platform, only the e-commerce platform can know, and for purchasing users, only the e-commerce platform performs credit guarantee. However, various information about the merchant is stored in the server of the merchant in the current e-commerce platform, so that the merchant data is easy to tamper, and the e-commerce platform cannot completely guarantee the trusted degree of the data provided by the merchant.
Thus, there is a need for a new method and apparatus for generating information based on blockchain.
The above information disclosed in the background section is only for enhancement of understanding of the background of the application and therefore it may contain information that does not form the prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of the above, the application provides a method and a device for generating information based on blockchain, which can confirm the true identity of a merchant through technical means, so that the commodity sold by the merchant is more true and reliable, and the user experience is improved.
Other features and advantages of the application will be apparent from the following detailed description, or may be learned by the practice of the application.
According to an aspect of the present application, there is provided a method of generating information based on a blockchain, the method including: the block link point receives first identity information of a first user; generating second identity information of the first user according to the first identity information encryption key and the encryption algorithm; the first identity information is stored in a blockchain node.
In an exemplary embodiment of the present disclosure, further comprising: correlating the first identity information with the second identity information to obtain correlation information; the second identity information is stored in a blockchain.
In an exemplary embodiment of the present disclosure, further comprising: and sending the second identity information.
In an exemplary embodiment of the present disclosure, further comprising: receiving a query request from a second user, wherein the query request comprises the second identity information; searching the first identity information corresponding to the blockchain node in the blockchain node according to the second identity information; and transmitting the first identity information.
According to an aspect of the present application, there is provided an apparatus for generating information based on a blockchain, the apparatus comprising: the receiving module is used for receiving first identity information of the first user by the block chain link point; the encryption module is used for generating second identity information of the first user according to the first identity information encryption key and the encryption algorithm; and the storage module is used for storing the first identity information in the blockchain node.
In an exemplary embodiment of the present disclosure, further comprising: the association module is used for associating the first identity information with the second identity information to obtain association information; the second identity information is stored in a blockchain.
In an exemplary embodiment of the present disclosure, further comprising: and the first sending module is used for sending the second identity information.
In an exemplary embodiment of the present disclosure, further comprising: the query module is used for receiving a query request from a user, wherein the query request comprises the second identity information; searching the first identity information corresponding to the blockchain node in the blockchain node according to the second identity information; and the second sending module is used for sending the first identity information.
According to an aspect of the present application, there is provided an electronic device including: one or more processors; a storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the methods as described above.
According to an aspect of the application, a computer-readable medium is proposed, on which a computer program is stored, which program, when being executed by a processor, implements a method as described above.
According to the method and the device for generating the information based on the blockchain, disclosed by the application, the true identity of the merchant can be confirmed through a technical means, so that the commodity sold by the merchant is more true and reliable, and the user experience is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application as claimed.
Drawings
The above and other objects, features and advantages of the present application will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings. The drawings described below are only some embodiments of the present application and other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a system block diagram illustrating a method, apparatus, and computer program product for generating information based on blockchain in accordance with an exemplary embodiment.
FIG. 2 is a flowchart illustrating a method of generating information based on a blockchain, according to an exemplary embodiment.
FIG. 3 is a flowchart illustrating a method of generating information based on a blockchain, according to another exemplary embodiment.
FIG. 4 is a flowchart illustrating a method of generating information based on a blockchain, according to another exemplary embodiment.
FIG. 5 is a block diagram illustrating an apparatus for generating information based on a blockchain in accordance with an exemplary embodiment.
FIG. 6 is a block diagram illustrating an apparatus for generating information based on a blockchain in accordance with another exemplary embodiment.
Fig. 7 is a block diagram of an electronic device, according to an example embodiment.
FIG. 8 is a schematic diagram illustrating a computer-readable storage medium according to an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the application may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the application.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another element. Accordingly, a first component discussed below could be termed a second component without departing from the teachings of the concepts of the present disclosure. As used herein, the term "and/or" includes any one of the associated listed items and all combinations of one or more.
Those skilled in the art will appreciate that the drawings are schematic representations of example embodiments and that the modules or flows in the drawings are not necessarily required to practice the application and therefore should not be taken to limit the scope of the application.
FIG. 1 is a system block diagram illustrating a method, apparatus, and computer program product for generating information based on blockchain in accordance with an exemplary embodiment.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may, for example, obtain first identity information of the first user; the server 105 may generate the second identity information of the first user, for example, based on the first identity information and an encryption algorithm.
In one embodiment, when the first user is a merchant and the first identity information of the first user is information such as a corporate qualification, the server 105 may generate the corporate information, for example, from merchandise sales merchant data; server 105 may also store the enterprise information into a block of the blockchain, such as by a blockchain protocol, and generate second identity information.
The server 105 may also be a server providing various services, such as a server providing support for shopping-type websites browsed by the user using the terminal devices 101, 102, 103. The server 105 may, for example, receive a query request from a user, the query request including the second identity information; determining a block in the blockchain according to the second identity information; and pushing the first identity in the block to a user.
It should be noted that, the method for generating information based on the blockchain is generally performed by the server 105, and accordingly, the device for generating information based on the blockchain is generally configured to be executed by the server 105. The web page end for browsing the goods and the request end for inquiring the merchant are generally located in the terminal devices 101, 102 and 103.
FIG. 2 is a flowchart illustrating a method of generating information based on a blockchain, according to an exemplary embodiment.
As shown in fig. 2, in S202, the block link point receives first identity information of a first user.
In one embodiment, the first user may be, for example, a merchant user who may, for example, submit his first identity information in order to qualify itself for a higher degree of trust, as described above in the context. The first identity information may, for example, include information of the merchant may, for example, include: enterprise profile: such as nature of the enterprise, operating scope, time of establishment, registered funds, number of staff, location, floor space, etc. The first information may also include important information such as official seal of an enterprise. In the application, for safety, the enterprise information can also comprise key data for encrypting the enterprise information, for example, the enterprise can generate a private key by itself, and the public key, the enterprise information and certificates issued by other platforms or trusted qualification auditors can be used as first identity information.
In one embodiment, the first user may be, for example, an individual user, and the method of the present application is also applicable in situations where trusted confirmation of individual user information is required. For example, in a related industry such as finance, an individual user may, for example, use certificate information as the first identity information. The individual user submits the credential information for subsequent processing.
In one embodiment, the first user may be, for example, information of employee users in an enterprise, and the method of the present application is also applicable to a scenario in which trusted confirmation of employee user information is required. The staff user may, for example, use the relevant material such as the personal work certificate as the first identity information, and the staff user submits the relevant material such as the personal work certificate for subsequent processing.
In some embodiments, the first user may also be, for example, a user in other application scenarios, where the first user is not limited to being a person, and may also be, for example, some independent individuals, businesses, and public facilities, all objects for which trust authentication is required, as the first user in the present application.
In S204, second identity information of the first user is generated according to the first identity information encryption key and the encryption algorithm. The basic process of data encryption is to process the original file or data in plaintext according to a certain algorithm to form an unreadable code, usually called as ciphertext, so that the original content can be displayed only after the corresponding secret key is input, and the purpose of protecting the data from being stolen and read by illegal persons is achieved by the way. The reverse of this process is decryption, i.e., the process of converting the encoded information into its original data.
In one embodiment, the encryption algorithm comprises an encryption algorithm in a blockchain, which is a generic term of several technical solutions in nature, including peer-to-peer network transmission protocols, cryptographic encryption algorithms, distributed consensus mechanisms, and Nash balanced gaming designs. Based on the combination of the technologies, a reliable database with decentralization and trust removal can be realized, and an algorithm proving mechanism is used for guaranteeing traceable traceability, non-falsification and non-falsification of information recorded on a chain. The alliance blockchain refers to a blockchain of which the consensus process is controlled by a preselected node; for example, a community of 15 financial institutions, each running a node, and 10 institutions (2/3 confirmations) need to be obtained in order to validate each block. Blockchains may allow everyone to read or be limited to participants only, or walk a hybrid route, such as the root hash of the block and its API (application programming interface) to be exposed, which may allow the outside world to be used for a limited number of queries and to obtain blockchain state information. These blockchains may be considered "partially decentralised". The alliance chain adopts a multi-center mode, and the participant nodes are also preset and confirmed through a consensus mechanism. In the alliance chain, different from the public chain, authority setting and control can be performed, and the method has higher applicability and expandability. The encryption algorithm in the present application may be implemented, for example, by an encryption algorithm in a federated blockchain.
Corresponding to the various embodiments above, in one embodiment, when the first user is a merchant user, the merchant user generates a private key and takes the public key as first identity information along with the enterprise information and certificates issued by other platforms or trusted qualification auditors. And encrypting the first identity information through a preset encryption algorithm to generate second identity information of the user, wherein when the user purchases the commodity of the merchant user through the e-commerce platform, the second identity information can be read in an e-commerce website, and trusted authentication is carried out on the merchant user through the second identity information.
In one embodiment, the first user is an individual user who submits credential information for subsequent processing. And encrypting the first identity information through a preset encryption algorithm to generate second identity information of the user. When an individual user needs to prove his own credentials to other units or users, trusted authentication may be obtained in a particular platform, for example, by means of second identity information.
In one embodiment, the first user may be, for example, information about staff users in an enterprise, who may, for example, submit relevant material such as personal work certificates for subsequent processing. And encrypting the first identity information through a preset encryption algorithm to generate second identity information of the user. Where an employee user needs to prove his own work track to other units or corporate leaders, a trusted guarantee may be obtained, for example, through the second identity information.
In some embodiments, the first user may also be, for example, a user in other application scenarios, where the first user is not limited to being a person, and may also be, for example, some independent individuals, businesses, and public facilities, all objects for which trust authentication is required, as the first user in the present application. And encrypting the first identity information by a user in other application scenes through a preset encryption algorithm to generate second identity information of the user.
In S206, the first identity information is stored in a blockchain node.
In some embodiments, the first identity information and the second identity information are associated to obtain associated information; the second identity information is stored in a blockchain. After the first identity information is processed through blockchain related encryption, the generated second identity information can be associated with the first identity information through the blockchain.
In some embodiments, after the first identity information is associated with the second identity information, the second identity information is sent, for example, to a blockchain platform, or may be published, for example, to another qualification-capable platform.
According to the method for generating information based on the blockchain, disclosed by the application, the true identity of the user can be confirmed through a technical means, so that the user can quickly and accurately acquire the trusted authentication.
FIG. 3 is a flowchart illustrating a method of generating information based on a blockchain, according to an exemplary embodiment.
As shown in fig. 3, in S302, a query request from a second user is received, where the query request includes the second identity information.
Corresponding to the above embodiment, the second user may for example be a user who wants to purchase goods browse the goods and want to learn more about the merchant's information, may make a query request through the second information, the query request may for example be received through an e-commerce platform, may for example be received through a blockchain platform, the query request may for example be received through other mutually trusted platforms.
In one embodiment, the query request may be received, for example, by an e-commerce platform that forwards the query request to the blockchain system for querying.
In S304, according to the second identity information, the first identity information corresponding to the second identity information is searched in the blockchain node. And determining a block corresponding to the second identity information in the block chain through the second identity information. It should be noted that, when the content in the block is not the original file but the updated file, the content in all the related blocks under the block may be obtained, for example. So that the user can trace the various information of the merchant.
In S306, first identity information is transmitted. The first identity information is sent to the second user, which may also be sent, for example, to a trusted e-commerce platform.
In one embodiment, for business information that has been booted, merchants may revoke online by way of certificate signatures themselves, or manually by way of real names. After revocation, the merchant's certificate lifecycle ends.
In one embodiment, the blockchain certificate B (business information) issued by the e-commerce platform is a uniform identification of the identity of the merchant. The merchant needs to use the certificate both when doing the necessary operations in the e-commerce platform and when writing normal transaction data to the blockchain. The enterprise includes a private key signature S corresponding to the a certificate. The function of signature S is to prove the behaviour of the merchant in actively registering. (signature S may prevent merchants from becoming registered and merchant repudiation issues).
In one embodiment, merchants may also apply for multi-level blockchain certificates, building their own hierarchical blockchain certificates for further management of enterprise information.
FIG. 4 is a flowchart illustrating a method of generating information based on a blockchain, according to an exemplary embodiment. FIG. 4 is an illustration of the context in which the method of generating information based on blockchain in the present application should be used when the first user is a merchant user and the second user is a user purchasing merchandise. The method of the present application may also be applied to other scenarios where the first user is a personal user or an employee user, and the specific application process is similar to the process in fig. 4, and the present application is not repeated.
As shown in fig. 4, in S402, commodity information is generated from commodity self data. Commodity information refers to a generic term for messages, intelligence, data, or knowledge about a commodity and its production, circulation, or consumption that can be received by a recipient and meet certain specific needs. The commodity information may include, for example, the appearance, color, usage, selling price, commodity notice, etc. of the commodity, and any information that helps the merchant introduce the commodity to the user to know the commodity may be used as the commodity information in the present application.
In S404, the business information (second information) is generated from the commodity vending merchant data (first information). The enterprise information may include, for example: enterprise profile: such as nature of the enterprise, operating scope, time of establishment, registered funds, number of staff, location, floor space, etc. For safety, the enterprise information can also comprise key data for encrypting the enterprise information, for example, the enterprise can generate a private key by itself and submit the public key and the enterprise information and certificates issued by other platforms or trusted qualification auditing institutions to the e-commerce platform as application materials. After the manual verification is passed, the e-commerce platform can issue certificates to enterprises.
In one embodiment, the enterprise has a certificate A issued by a trusted auditing organization, has a certificate B issued by a blockchain system, and the enterprise information comprises two certificates A and B, and can also comprise a private key signature S corresponding to the certificate A. The function of signature S is to prove the behaviour of the merchant in actively registering. (signature S may prevent merchants from becoming registered and merchant repudiation issues).
In S406, the enterprise information is stored into a block of a blockchain by a blockchain protocol, and signature information is generated. The e-commerce platform in the above step may, for example, store content such as certificates issued to businesses onto blockchains.
In one embodiment, storing the enterprise information into a block of a blockchain via a blockchain protocol and generating signature information includes: encrypting the enterprise information through a block chain protocol; and storing the enterprise information after encryption processing into the block. The enterprise information may be encrypted and stored in the block for security purposes, for example, and the key in the encryption process may be a public key provided by the enterprise, or may be a contracted encrypted and decrypted file by other means, for example.
In one embodiment, further comprising: acquiring signature information and update information of the commodity; determining a block in a block chain through the signature information; and storing the update information to the block by a blockchain process. When the enterprise information is changed, the block chain is applied for updating through the changed enterprise information. The updated enterprise information is linked to the updated enterprise information, and the updated enterprise information process can also be tracked and checked by a user in a blockchain mode.
In S408, commodity distribution information is generated from the commodity information and the signature information. Commodity release information is generated through commodity information and signature information, and can be released in the electronic commerce platform or other platforms with trusted cooperation with the electronic commerce platform. The user can obtain the data and signature information of the commodity by browsing the commodity information at the webpage end.
In one embodiment, a user may query enterprise information at the user's end through signature information. Multiple trusted e-commerce platforms or qualification verification platforms may also build trusted blockchain sites using respective certificates, for example. The user can consult from multiple parties to obtain the trusted and consistent information.
In one embodiment, further comprising: generating traceability information after the commodity is purchased; and sending the tracing information to a user terminal along with the commodity. For example, after the commodity is purchased, the traceability information is generated by commodity information, the signature information and purchaser information. The traceability information may be attached to the outer package of the minimum unit, or may be sent to the user along with an electronic bill or a paper bill of the commodity, or may be stored in a shopping record of the user, for example, but the application is not limited thereto.
In one embodiment, as in the enterprise information described above, there is a certificate a issued by a trusted audit authority, a certificate B issued by a blockchain system, and used in subsequent traceability, the user can find the merchant certificate a in the blockchain through the certificate B, and a signature S.
It should be clearly understood that the present application describes how to make and use specific examples, but the principles of the present application are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
According to the method for generating information based on the blockchain, when the blockchain system issues the certificate, the related information of the merchant can be extracted from various certificates uploaded by the merchant, so that the trouble that the merchant provides various information again is avoided, only the enterprise certificate A and the corresponding private key signature are provided during registration, and a large amount of labor cost is saved.
According to the method for generating information based on the blockchain, disclosed by the application, the true identity of the merchant can be confirmed through a technical means, so that the commodity sold by the merchant is more true and reliable, and the user experience is improved.
According to the method for generating information based on the blockchain, the registration process of merchants in the blockchain can avoid the problems of manual auditing business license, enterprise qualification and the like, and is suitable for business systems with less strict auditing requirements.
According to the blockchain-based information generation method, the blockchain system helps to verify the identity of the enterprise certificate holder, and after success, the blockchain self-applies for issuing the blockchain certificate of the manufacturer.
According to the method for generating information based on the blockchain, after a user buys goods, the user can look up the certificate of the merchant in the blockchain by checking the signature of the merchant, and then can trace back the real information of the merchant and the original certificate. The user verifies that the commodity is a user verification commodity signature and confirms the certificate B; the user verifies the merchant identity using certificate B, and the user can then find certificate a and signature S in the blockchain. Thereby confirming the merchant identity.
Those skilled in the art will appreciate that all or part of the steps implementing the above described embodiments are implemented as a computer program executed by a CPU. When executed by a CPU, performs the functions defined by the above-described method provided by the present application. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic disk or an optical disk, etc.
Furthermore, it should be noted that the above-described figures are merely illustrative of the processes involved in the method according to the exemplary embodiment of the present application, and are not intended to be limiting. It will be readily appreciated that the processes shown in the above figures do not indicate or limit the temporal order of these processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, for example, among a plurality of modules.
The following are examples of the apparatus of the present application that may be used to perform the method embodiments of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method of the present application.
Fig. 5 is a block diagram illustrating an apparatus for generating information based on a blockchain according to another exemplary embodiment. The commodity tracing device 50 includes: a receiving module 502, an encrypting module 504, and a storing module 506.
The receiving module 502 is configured to receive first identity information of a first user at a block link point.
The encryption module 504 is configured to generate second identity information of the first user according to the first identity information encryption key and the encryption algorithm.
The storage module 506 is configured to store the first identity information in a blockchain node.
Fig. 6 is a block diagram illustrating an identity information generating apparatus according to another exemplary embodiment. The commodity tracing device 60 further includes, in addition to the modules in the commodity tracing device 50: the system comprises an association module 602, a first sending module 604, a query module 606, a push module and a second sending module 608.
The association module 602 is configured to associate the first identity information with the second identity information to obtain association information; the second identity information is stored in a blockchain.
The first sending module 604 is configured to send the second identity information.
The query module 606 is configured to receive a query request from a user, where the query request includes the second identity information; searching the first identity information corresponding to the blockchain node in the blockchain node according to the second identity information; and
The second transmitting module 608 is configured to transmit the first identity information.
Fig. 7 is a block diagram of an electronic device, according to an example embodiment.
An electronic device 200 according to this embodiment of the application is described below with reference to fig. 7. The electronic device 200 shown in fig. 7 is only an example and should not be construed as limiting the functionality and scope of use of embodiments of the present application.
As shown in fig. 7, the electronic device 200 is in the form of a general purpose computing device. The components of the electronic device 200 may include, but are not limited to: at least one processing unit 210, at least one memory unit 220, a bus 230 connecting the different system components (including the memory unit 220 and the processing unit 210), a display unit 240, and the like.
Wherein the storage unit stores program code that is executable by the processing unit 210 such that the processing unit 210 performs the steps according to various exemplary embodiments of the present application described in the electronic prescription stream processing method section above in this specification. For example, the processing unit 210 may perform the steps as shown in fig. 2, 3, and 4.
The memory unit 220 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 2201 and/or cache memory 2202, and may further include Read Only Memory (ROM) 2203.
The storage unit 220 may also include a program/utility 2204 having a set (at least one) of program modules 2205, such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 230 may be a bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 200, and/or any device (e.g., router, modem, etc.) that enables the electronic device 200 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 250. Also, the electronic device 200 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through a network adapter 260. Network adapter 260 may communicate with other modules of electronic device 200 via bus 230. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 200, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the embodiments of the present disclosure.
Fig. 8 schematically illustrates a computer-readable storage medium in an exemplary embodiment of the present disclosure.
Referring to fig. 8, a program product 400 for implementing the above-described method according to an embodiment of the present application is described, which may employ a portable compact disc read-only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The computer-readable medium carries one or more programs, which when executed by one of the devices, cause the computer-readable medium to perform the functions of: acquiring first identity information of a first user; and generating second identity information of the first user according to the first identity information and the encryption algorithm.
Those skilled in the art will appreciate that the modules may be distributed throughout several devices as described in the embodiments, and that corresponding variations may be implemented in one or more devices that are unique to the embodiments. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
The exemplary embodiments of the present application have been particularly shown and described above. It is to be understood that this application is not limited to the precise arrangements, instrumentalities and instrumentalities described herein; on the contrary, the application is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
In addition, the structures, proportions, sizes, etc. shown in the drawings in the specification are used for the understanding and reading of the disclosure, and are not intended to limit the applicable limitations of the disclosure, so that any structural modification, change in proportion, or adjustment of size is not technically significant, and yet falls within the scope of the disclosure without affecting the technical effects and the objects that can be achieved by the disclosure. Also, the terms "upper", "first", "second", and "a" and the like recited in the present specification are also for descriptive purposes only and are not intended to limit the scope of the disclosure in which the application may be practiced, but rather the relative relationship of the terms may be altered or modified without materially altering the technical context to the extent that the application may be practiced.
Claims (6)
1. A method of generating information based on a blockchain, comprising:
The block link point receives first identity information of a first user; the first user comprises an object which needs to be subjected to trust authentication, and specifically comprises a merchant user, and the first identity information comprises merchant information;
Generating second identity information of the first user according to the first identity information encryption key and the encryption algorithm; the encryption algorithm comprises an encryption algorithm in a alliance blockchain, the second identity information is associated with the first identity information through the blockchain, the second identity information comprises enterprise information, and specifically comprises a certificate issued by a blockchain system, another certificate issued by an auditing mechanism and a private key signature corresponding to the other certificate, and the certificate is obtained through extraction;
storing enterprise information corresponding to commodity information into a block of a block chain through the block chain protocol, and generating signature information;
Acquiring the signature information and the updating information of the commodity information, determining a block in a block chain through the signature information, and storing the updating information to the block through block chain processing;
generating commodity release information through the commodity information and the signature information, wherein the commodity release information is released in an electronic commerce platform or other platforms with trusted cooperation with the electronic commerce platform;
Storing the first identity information in a blockchain node and transmitting the second identity information, including transmitting the second identity information to a blockchain platform or a platform for qualification verification;
receiving a query request from a second user, wherein the query request comprises the second identity information;
searching the first identity information corresponding to the blockchain node in the blockchain node according to the second identity information;
A plurality of trusted e-commerce platforms or qualification auditing platforms build a trusted blockchain site using respective certificates for querying from multiple parties;
Sending first identity information to the second user or a trusted e-commerce platform;
generating traceability information after the commodity is purchased;
and sending the tracing information to a user terminal along with the commodity.
2. The method as recited in claim 1, further comprising:
correlating the first identity information with the second identity information to obtain correlation information;
the second identity information is stored in a blockchain.
3. An apparatus for generating information based on a blockchain, comprising:
The receiving module is used for receiving first identity information of the first user by the block chain link point; the first user comprises an object which needs to be subjected to trust authentication, and specifically comprises a merchant user, and the first identity information comprises merchant information; and
The encryption module is used for generating second identity information of the first user according to the first identity information encryption key and the encryption algorithm; the encryption algorithm comprises an encryption algorithm in a alliance blockchain, the second identity information is associated with the first identity information through the blockchain, the second identity information comprises enterprise information, and specifically comprises a certificate issued by a blockchain system, another certificate issued by an auditing mechanism and a private key signature corresponding to the other certificate, and the certificate is obtained through extraction;
storing enterprise information corresponding to commodity information into a block of a block chain through the block chain protocol, and generating signature information;
Acquiring the signature information and the updating information of the commodity information, determining a block in a block chain through the signature information, and storing the updating information to the block through block chain processing;
generating commodity release information through the commodity information and the signature information, wherein the commodity release information is released in an electronic commerce platform or other platforms with trusted cooperation with the electronic commerce platform;
a storage module for storing the first identity information in a blockchain node;
the first sending module is used for sending the second identity information and comprises a step of sending the second identity information to a blockchain platform or a platform for qualification verification;
the query module is used for receiving a query request from a second user, wherein the query request comprises the second identity information;
searching the first identity information corresponding to the blockchain node in the blockchain node according to the second identity information;
A plurality of trusted e-commerce platforms or qualification auditing platforms build a trusted blockchain site using respective certificates for querying from multiple parties;
the second sending module is used for sending the first identity information to the second user or the trusted e-commerce platform;
generating traceability information after the commodity is purchased;
and sending the tracing information to a user terminal along with the commodity.
4. The apparatus as recited in claim 3, further comprising:
The association module is used for associating the first identity information with the second identity information to obtain association information; the second identity information is stored in a blockchain.
5. An electronic device, comprising:
One or more processors;
a storage means for storing one or more programs;
When executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-2.
6. A computer readable medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810136192.7A CN108537047B (en) | 2018-02-09 | 2018-02-09 | Method and device for generating information based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810136192.7A CN108537047B (en) | 2018-02-09 | 2018-02-09 | Method and device for generating information based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108537047A CN108537047A (en) | 2018-09-14 |
CN108537047B true CN108537047B (en) | 2024-06-18 |
Family
ID=63485957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810136192.7A Active CN108537047B (en) | 2018-02-09 | 2018-02-09 | Method and device for generating information based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537047B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109086459B (en) * | 2018-09-17 | 2020-01-14 | 中国科学院重庆绿色智能技术研究院 | News collecting, editing and releasing method based on block chain |
CN109241362B (en) * | 2018-09-18 | 2020-12-01 | 百度在线网络技术(北京)有限公司 | Block generation method, device, equipment and storage medium |
CN109492424B (en) * | 2018-09-29 | 2023-05-26 | 平安科技(深圳)有限公司 | Data asset management method, data asset management device, and computer-readable medium |
WO2020107223A1 (en) * | 2018-11-27 | 2020-06-04 | 深圳链报科技有限公司 | Multi-chain information management method and apparatus, storage medium, and blockchain identity parser |
CN113283923B (en) * | 2020-02-20 | 2024-07-19 | 北京沃东天骏信息技术有限公司 | Resource processing method and device based on block chain |
CN113971576A (en) * | 2021-10-27 | 2022-01-25 | 中国银行股份有限公司 | Commodity verification method and device |
CN116775757A (en) * | 2023-05-29 | 2023-09-19 | 北京东方通网信科技有限公司 | Commodity trusted method, commodity trusted device, electronic equipment and computer readable medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN107292629A (en) * | 2017-05-12 | 2017-10-24 | 深圳蜂链科技有限公司 | Anti-counterfeit tracking verification method based on block chain and the device using this method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005204134A (en) * | 2004-01-16 | 2005-07-28 | Mitsubishi Electric Corp | Tamper resistant encryption system, memory device, authentication terminal, and program |
CN106357640B (en) * | 2016-09-18 | 2019-11-08 | 江苏通付盾科技有限公司 | Identity authentication method, system and server based on block chain network |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
CN106789047B (en) * | 2017-03-03 | 2019-09-10 | 上海唯链信息科技有限公司 | A kind of block chain identification system |
CN107579827B (en) * | 2017-06-06 | 2020-12-22 | 江苏慧世联网络科技有限公司 | Electronic document signing method based on trusted third party and face recognition technology |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
CN107657463A (en) * | 2017-09-29 | 2018-02-02 | 北京京东尚科信息技术有限公司 | Article is traced to the source platform and method and device |
-
2018
- 2018-02-09 CN CN201810136192.7A patent/CN108537047B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN107292629A (en) * | 2017-05-12 | 2017-10-24 | 深圳蜂链科技有限公司 | Anti-counterfeit tracking verification method based on block chain and the device using this method |
Also Published As
Publication number | Publication date |
---|---|
CN108537047A (en) | 2018-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112967160B (en) | Block chain-based service processing system and method | |
CN108537047B (en) | Method and device for generating information based on block chain | |
CN113243094B (en) | Zero knowledge proof payment using blockchain | |
US20200058023A1 (en) | Decentralized Data Marketplace | |
US12166908B2 (en) | Systems and methods for facilitating blockchain operations involving on chain and off chain interactions | |
CN111989663A (en) | Intelligent contract pool based on block chain | |
CN111815308A (en) | Blockchain-based trade data processing method and related equipment | |
CN111989707A (en) | Managing user permissions for customs clearance services based on blockchains | |
CN111868725A (en) | Processing import customs clearance data based on block chain | |
TWI629658B (en) | Know your customer (kyc) data sharing system based on smart contract on blockchain and method thereof | |
US12401510B2 (en) | Systems and methods for user control and exclusion of cryptographic tokenized data | |
CN111902838B (en) | Internet Data Usage Control System | |
CN108965228B (en) | Dispute relief system and method for KYC data tokenization with multiple keys | |
CN111936994A (en) | Block chain based document registration for customs clearance | |
CN111079190A (en) | Block chain supply chain transaction hiding dynamic supervision system and method | |
CN110263003A (en) | Item file deposits card method and terminal device | |
CN110992034A (en) | Supply chain transaction privacy protection system and method based on block chain and related equipment | |
US7451308B2 (en) | Method and system to automatically evaluate a participant in a trust management infrastructure | |
Chen et al. | A novel cloud computing algorithm of security and privacy | |
Patel et al. | A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems | |
US11087401B1 (en) | Method and apparatus to crowd bootstrap startups | |
US20060080256A1 (en) | Method and system for establishing a trustworthy supplier | |
US20210326942A1 (en) | Method of Securing Online Merchant Reviews Using Block Chains | |
Gupta et al. | Revolutionizing E-Commerce Security: A Secured Infrastructure Utilizing BlockChain | |
Shaabany et al. | Secure Concept for Online Trading of Technology Data in Global Manufacturing Market |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |