CN109978524A - The method of commerce and device of electronic publication - Google Patents
The method of commerce and device of electronic publication Download PDFInfo
- Publication number
- CN109978524A CN109978524A CN201711450848.4A CN201711450848A CN109978524A CN 109978524 A CN109978524 A CN 109978524A CN 201711450848 A CN201711450848 A CN 201711450848A CN 109978524 A CN109978524 A CN 109978524A
- Authority
- CN
- China
- Prior art keywords
- encryption data
- counterparty
- encryption
- electronic publication
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application provides the method for commerce and device of a kind of electronic publication, and method includes: that counterparty determines mutually independent first public key and the first private key, wherein first private key is that counterparty is exclusive;Counterparty sends first public key, so that seller encrypts the electronic publication to obtain the first encryption data by first public key;Counterparty obtains the storage address of first encryption data by transaction, obtains first encryption data by the storage address of first encryption data;Counterparty decrypts first encryption data by first private key, to obtain the electronic publication.The method of commerce and device of a kind of electronic publication provided in this embodiment, the first public key is only propagated in communication process without propagating the first private key, public key is held as a hostage can not electronic publication after breaking encryption, and then ensure that electronic publication safety and copyright.
Description
Technical field
The invention relates to block chain technical field more particularly to the method for commerce and device of electronic publication.
Background technique
With the development of internet technology, people's lives mode gradually changes, present people hand more and more accustomed to using
The electric terminals such as mechanical, electrical brain rely on internet to search or watch e-book, films and television programs.Since there are users for network
Just, the advantages that data volume is big, information transmission speed is fast promotes the propagation of electronic publication.
But on network the propagation of many electronic publications be it is unordered, the electronic publications such as a large amount of novel, film are all
It illegally uploads without approval, the digital publishing rights of electronic publication is caused to be difficult to ensure, to not can guarantee author and publication
The practical interests of quotient, and then impact is generated to entire electronics industry, therefore, how to guarantee that the digital publishing rights of electronic publication become
Technical problem urgently to be resolved.
Summary of the invention
The method of commerce and device for being designed to provide a kind of electronic publication of the embodiment of the present application, at least to solve
The above problem certainly in the prior art.
The embodiment of the present application provides a kind of method of commerce of electronic publication comprising:
Counterparty determines mutually independent first public key and the first private key, wherein first private key is that counterparty is only
Have;
Counterparty sends first public key, so that seller carries out the electronic publication by first public key
Encryption obtains the first encryption data;
Counterparty obtains the storage address of first encryption data by transaction, passes through depositing for first encryption data
It stores up address and obtains first encryption data;
Counterparty decrypts first encryption data by first private key, to obtain the electronic publication.
Optionally, in the embodiment of the present application, the counterparty obtains the storage of first encryption data by transaction
Address includes: counterparty by transaction the second encryption data of acquisition and corresponding second decryption code key, is solved by described second
Close code key decrypts second encryption data, obtains the storage address, is added with obtaining described first according to the storage address
Ciphertext data.
Optionally, in the embodiment of the present application, the counterparty obtains the storage of first encryption data by transaction
Address includes: that counterparty trades in the transaction platform based on block chain technology, obtains the storage of first encryption data
Address, to obtain first encryption data according to the storage address.
Optionally, in the embodiment of the present application, the counterparty is obtained by the storage address of first encryption data
First encryption data includes: counterparty obtains in the peer-to-peer network node based on block chain according to the storage address
Corresponding first encryption data of the electronic publication.
Optionally, in the embodiment of the present application, the Encryption Algorithm packet of first public key and first private key is determined
Include: elliptic curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin Encryption Algorithm, D-H add
Any one of close algorithm.
The embodiment of the present application also provides a kind of method of commerce of electronic publication comprising:
Seller obtain counterparty the first public key, by first public key to the electronic publication encrypted with
Obtain the first encryption data;
Seller trades the storage address of first encryption data as intensive good, so that counterparty passes through institute
The storage address for stating the first encryption data obtains first encryption data, and counterparty is made to pass through first public key pair
The first private key answered decrypts first encryption data and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is the counterparty
It is exclusive.
Optionally, in the embodiment of the present application, the seller is using the storage address of first encryption data as friendship
It includes: that seller encrypts the storage address by the second encryption code key that Yi Pin, which carries out transaction, obtains the second encryption number
According to, and using the encrypted storage address and the corresponding second decryption code key of the second encryption code key as the electronics
The corresponding intensive good of publication is traded.
Optionally, in the embodiment of the present application, the seller is using the storage address of first encryption data as friendship
It includes: seller using the storage address of first encryption data as the corresponding friendship of the electronic publication that Yi Pin, which carries out transaction,
Yi Pin trades in the transaction platform based on block chain technology.
Optionally, in the embodiment of the present application, the electronic publication is stored in the peer-to-peer network node based on block chain
In.
The embodiment of the present application also provides a kind of the transaction device of electronic publication comprising:
Public key obtains module, for making seller obtain the first public key of counterparty, to pass through first public key to institute
Electronic publication is stated to be encrypted to obtain the first encryption data;
Transaction modules, for making seller that the storage address of first encryption data to be traded as intensive good,
So that counterparty obtains first encryption data by the storage address of first encryption data, and make counterparty logical
It crosses the corresponding first private key decryption of first public key first encryption data and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is the counterparty
It is exclusive.
The method of commerce and device of a kind of electronic publication provided in this embodiment, dealer determine the first public key and
First private key, and the first public key is sent to seller, so that seller is encrypted electronic publication by the first public key,
Then using the storage address of encrypted first encryption data as intensive good, so that dealer obtains the first encryption data, it
Dealer can be decrypted by the first private key afterwards, so as to only propagate the first public key in communication process without propagating
First private key, public key is held as a hostage can not electronic publication after breaking encryption, and then ensure that the peace of electronic publication
Full property and copyright.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in inventive embodiments can also obtain according to these attached drawings for those of ordinary skill in the art
Obtain other attached drawings.
Fig. 1 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application one provides;
Fig. 2 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application two provides;
Fig. 3 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application three provides;
Fig. 4 is a kind of the transaction device structural schematic diagram for electronic publication that the embodiment of the present application four provides.
Specific embodiment
Presently filed embodiment is described in detail below in conjunction with schema and embodiment, how the application is applied whereby
Technological means solves technical problem and reaches the realization process of technical effect to fully understand and implement.
Fig. 1 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application one provides, pair of transaction
Side is respectively counterparty and seller, and this method process is directed to the process of seller, and the encrypting and decrypting for use of trading is calculated
Method is rivest, shamir, adelman, and corresponding encryption code key is the first public key, and decryption code key is the first private key.Wherein the first public key with
And first private key it is mutually indepedent, and first private key be the counterparty it is exclusive.
In the present embodiment, the first public key and the first private key refer to the interior of the first public key and the first private key independently of each other
Hold difference, still, the first public key and the first private key are a pair, if needed with the first public key encryption with the first private key solution
It is close, if decrypted with the first private key, need with the first public key decryptions.
In the present embodiment, the first private key is that counterparty is exclusive, it is ensured that the first private key will not be propagated, so that other people obtain
The probability for obtaining the first private key substantially reduces, it is ensured that the safety of decryption guarantees so as to pass through rivest, shamir, adelman
The copyright of electronic publication.
As shown in Figure 1, a kind of method of commerce process of electronic publication provided in this embodiment specifically includes:
S11, seller obtain the first public key of counterparty, are added by first public key to the electronic publication
It is close to obtain the first encryption data;
In the present embodiment, electronic publication includes can be by digitlization and by the product of digital network transmission, such as electricity
Subgraph book, the film and television to spread through the internet etc..
Optionally, in the present embodiment, electronic publication be can store in the peer-to-peer network node based on block chain.Electronics
Publication can first pass through the first public key encryption, then the first encryption data piecemeal that will be obtained after encryption, be then store in and be based on
In the peer-to-peer network of block chain.
In peer-to-peer network based on block chain, all in the status of equity between the multiple stage computers that are connected to each other, each
Computer has identical function, no master-slave, and a computer can not only be used for server, sets shared resource for its in network
He is used computer, and can be used as work station, in general whole network does not depend on dedicated centralized servers, is not also had
Dedicated work station.To broken peer-to-peer network of the meeting based on block chain, need 51% or more the computer as node
It can be it is larger to destroy difficulty.
Therefore, electronic publication is stored in the peer-to-peer network based on block chain, can be further improved electronic publishing
The safety of object.
In the present embodiment, counterparty can be generated the first public key and the first private key, and send the first public key to seller,
Allow seller to obtain the first public key, and then can be encrypted electronic publication by the first public key.
S12, seller trade the storage address of first encryption data as intensive good, so that counterparty is logical
The storage address for crossing first encryption data obtains first encryption data, and makes counterparty public by described first
Corresponding first private key of key decrypts first encryption data and obtains the electronic publication.
Optionally, the one of the present embodiment is in the specific implementation, the storage address can be carried out by the second encryption code key
Encryption obtains the second encryption data, and the encrypted storage address and described second is encrypted code key corresponding second
Decryption code key is traded as the corresponding intensive good of the electronic publication.
Specifically, storage address can be encrypted only by symmetric encipherment algorithm, i.e., the second encryption code key and second
It is identical to decrypt code key.
Optionally, the present embodiment is another in the specific implementation, using the storage address of first encryption data as described in
The corresponding intensive good of electronic publication is traded in the transaction platform based on block chain technology.
Specifically, in the present embodiment, by the transaction platform using storage address as intensive good based on block chain technology into
Row transaction can guarantee again to encrypt intensive good, thus with ensure that the storage as intensive good by transaction platform
The safety of location, and then guarantee the safety of the corresponding electronic publication of storage address.
Certainly, in other realizations of the application, above two implementation can be used in combination, it can first pass through
One encryption code key is encrypted storage address to obtain the second encryption data, then that the second encryption data and the second decryption is secret
Key is put into the transaction platform based on block chain and trades as intensive good, so that the safety of electronic publication obtains more preferably
Guarantee, to guarantee the copyright of electronic publication.
A kind of method of commerce of electronic publication provided in this embodiment, is encrypted by the first public key, then will be added
The storage address of the first encryption data after close is as intensive good, so that dealer obtains the first encryption data, dealer later
It can be decrypted by the first private key, so as to which asymmetric decipherment algorithm to be applied to the transaction of electronic publication, passed
The first public key is only propagated during broadcasting without propagating the first private key, it can not electronics after breaking encryption public key is held as a hostage
Publication, so ensure that electronic publication safety and copyright.
It is further to note that the Encryption Algorithm for determining first public key and first private key includes: ellipse
Curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin Encryption Algorithm, in D-H Encryption Algorithm
It is any.
Fig. 2 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application two provides, pair of transaction
Side is respectively counterparty and seller, and this method process is directed to the process of counterparty, as shown, comprising:
S21, counterparty determine mutually independent first public key and the first private key, wherein first private key is transaction
Fang Duyou.
In the present embodiment, the first public key and the first private key refer to the interior of the first public key and the first private key independently of each other
Hold difference, still, the first public key and the first private key are a pair, if needed with the first public key encryption with the first private key solution
It is close, if decrypted with the first private key, need with the first public key decryptions.
In the present embodiment, the first private key is that counterparty is exclusive, it is ensured that the first private key will not be propagated, so that other people obtain
The probability for obtaining the first private key substantially reduces, it is ensured that the safety of decryption guarantees so as to pass through rivest, shamir, adelman
The copyright of electronic publication.
S22, counterparty send first public key, so that seller is by first public key to the electronic publication
It is encrypted to obtain the first encryption data.
In the present embodiment, the first public key can be sent to seller by dealer, so that seller can execute above-mentioned step
Rapid S11.
S23, counterparty obtain the storage address of first encryption data by transaction, pass through first encryption data
Storage address obtain first encryption data.
Optionally, the present embodiment one in the specific implementation, counterparty can the transaction platform based on block chain technology into
Row transaction, obtains the storage address of first encryption data, to obtain first encryption data according to the storage address.
Specifically, the transaction platform based on block chain technology can be DECNT platform, and dealer can utilize DTC generation in DECNT platform
Coin purchase-transaction product, and then it is further ensured that by DECNT platform the safety of transaction, while DECNT platform can also pass through
DTC token replaces bank account payment etc., to protect the privacy of dealer.
Optionally, the present embodiment another is in the specific implementation, counterparty obtains the second encryption data and right by transaction
The the second decryption code key answered decrypts second encryption data by the second decryption code key, obtains the storage address, with
The first encryption data is obtained according to the storage address.
Optionally, the present embodiment is another in the specific implementation, when electronic publication is stored in the peer-to-peer network based on block chain
When in network, the electronic publication pair can be obtained in the peer-to-peer network node based on block chain according to the storage address
The first encryption data answered.
Certainly, in other realizations of the application, above-mentioned three kinds of implementations can be used in combination, such as can be first in base
It trades in the transaction platform of block chain technology, the second encryption data and the second decryption code key is obtained by transaction, then
The second encryption data is decrypted by the second decryption code key, storage address is obtained, further according to storage address from pair based on block chain
Corresponding first encryption data of electronic publication is determined in equal networks.
S24, counterparty decrypt first encryption data by first private key, to obtain the electronic publication.
In the present embodiment, after obtaining the first encryption data, it can be decrypted by the first private key, obtain electronic publishing
Object, specific decryption method can refer to the prior art, and details are not described herein in the present embodiment.
It is further to note that the Encryption Algorithm for determining first public key and first private key includes: ellipse
Curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin Encryption Algorithm, in D-H Encryption Algorithm
It is any.
A kind of method of commerce of electronic publication provided in this embodiment determines mutually independent first public key and first
Private key, wherein first private key is that counterparty is exclusive;First public key is sent, to pass through first public key to described
Electronic publication is encrypted to obtain the first encryption data;The storage address of first encryption data is obtained by transaction, with
Obtain first encryption data;First encryption data is decrypted by first private key, to obtain the electronic publishing
Object.The method of commerce of electronic publication provided in this embodiment only propagates the first public key without propagating the in communication process
One private key, public key is held as a hostage can not electronic publication after breaking encryption, and then ensure that the safety of electronic publication
Property and copyright.
Fig. 3 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application three provides, pair of transaction
Side is respectively counterparty and seller, and this method process is directed to counterparty and seller both sides.
As shown in figure 3, a kind of method of commerce of electronic publication provided in this embodiment includes:
S31, counterparty determine the first private key and the first public key;And the first public key is sent to seller.
First public key and the first private key are similar to the above embodiments, and details are not described herein.
In the present embodiment, counterparty can carry out preceding negotiation of trading with seller, determine the first public affairs according to negotiation result
Key and the first private key, such as negotiating the specific method of asymmetric encryption is elliptic curve encryption algorithm (abbreviation ECC), then basis
Elliptic curve encryption algorithm determines the first public key and the first private key.
S32, seller encrypt electronic publication according to the first public key, obtain the first encryption data, and by first
It is stored in after encryption data fragmentation in the peer-to-peer network based on block chain.
S33, seller are encrypted the storage address of the first encryption data to obtain the second encryption data, and second is added
Ciphertext data and the second decryption code key are traded as intensive good by the transaction platform based on block chain.
S34, counterparty determine the second encryption data and the second decryption code key by trading, and pass through the second decryption code key
The second encryption data is decrypted, to obtain the store path of the first encryption data.
S35, counterparty obtain the first encryption data according to the store path of the first encryption data.
S36, counterparty decrypt the first encryption data according to the first private key, to obtain data product.
By method of commerce provided by the embodiments of the present application, it can effectively guarantee that the copyright of electronic publication is not invaded
Evil.
Asymmetric decipherment algorithm can be applied to electronic publishing by the method for commerce of electronic publication provided in this embodiment
The transaction of object is only propagated the first public key without propagating the first private key in communication process, can not be broken public key is held as a hostage
Translate encrypted electronic publication, so ensure that electronic publication safety and copyright;And by electronic publication
It is stored in the peer-to-peer network based on block chain and trades using storage address after encryption as intensive good, further ensure
The safety of electronic publication and the copyright of electronic publication.
Fig. 4 is a kind of the transaction device structural schematic diagram for electronic publication that the embodiment of the present application four provides, as shown,
Comprising:
Public key obtains module 41, and seller obtains the first public key that module obtains counterparty by the public key, to pass through
First public key encrypts the electronic publication to obtain the first encryption data.
Transaction modules 42, seller is by the transaction modules using the storage address of first encryption data as transaction
Product are traded, so that counterparty obtains first encryption data by the storage address of first encryption data, and
So that counterparty, which decrypts first encryption data by corresponding first private key of first public key, obtains the electronic publishing
Object.
Wherein, first public key and first private key are mutually indepedent, and first private key is the counterparty
It is exclusive.
Optionally, in the present embodiment, transaction modules 42 include:
The storage address is passed through the second encryption by storage address encrypting module by storage address encrypting module, seller
Code key is encrypted, and obtains the second encryption data, and the encrypted storage address and described second are encrypted secret key pair
The the second decryption code key answered is traded as the corresponding intensive good of the electronic publication.
Optionally, in the present embodiment, transaction modules 42 include:
Transaction submodule, seller is by transaction submodule using the storage address of first encryption data as the electricity
The corresponding intensive good of sub- publication, trades in the transaction platform based on block chain technology.
A kind of the transaction device of electronic publication provided in this embodiment, is encrypted by the first public key, then will be added
The storage address of the first encryption data after close is as intensive good, so that dealer obtains the first encryption data, dealer later
It can be decrypted by the first private key, to only propagate the first public key in communication process without propagating the first private key, i.e.,
Make public key be held as a hostage also can not electronic publication after breaking encryption, and then ensure that electronic publication safety and version
Power.
Device provided by embodiments herein can be realized by a computer program.Those skilled in the art should be able to
Understand, above-mentioned unit and module division mode are only one of numerous division modes, if be divided into other units or
Module or non-divided block all should be within the scope of protection of this application as long as information object has above-mentioned function.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computer
Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, it wherein includes the meter of computer usable program code that the application, which can be used in one or more,
The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present application
And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to
Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate
One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing
The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.Obviously, those skilled in the art can be to the application
Various modification and variations are carried out without departing from spirit and scope.If in this way, these modifications and variations of the application
Belong within the scope of the claim of this application and its equivalent technologies, then the application is also intended to encompass these modification and variations and exists
It is interior.
Claims (10)
1. a kind of method of commerce of electronic publication characterized by comprising
Counterparty determines mutually independent first public key and the first private key, wherein first private key is that counterparty is exclusive;
Counterparty sends first public key, so that seller encrypts the electronic publication by first public key
Obtain the first encryption data;
Counterparty obtains the storage address of first encryption data by transaction, by the storage of first encryption data
Location obtains first encryption data;
Counterparty decrypts first encryption data by first private key, to obtain the electronic publication.
2. the method according to claim 1, wherein the counterparty obtains the first encryption number by transaction
According to storage address to include: counterparty obtain the second encryption data and corresponding second decryption code key by transaction, pass through institute
It states the second decryption code key and decrypts second encryption data, obtain the storage address, to obtain institute according to the storage address
State the first encryption data.
3. the method according to claim 1, wherein the counterparty obtains the first encryption number by transaction
According to storage address include:
Counterparty trades in the transaction platform based on block chain technology, obtains the storage address of first encryption data,
To obtain first encryption data according to the storage address.
4. the method according to claim 1, wherein storage of the counterparty by first encryption data
Address obtains first encryption data: counterparty is according to the storage address, in the peer-to-peer network section based on block chain
Corresponding first encryption data of the electronic publication is obtained in point.
5. the method according to claim 1, wherein determine first public key and first private key plus
Close algorithm includes: elliptic curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin encryption calculation
Any one of method, D-H Encryption Algorithm.
6. a kind of method of commerce of electronic publication characterized by comprising
Seller obtains the first public key of counterparty, is encrypted the electronic publication to obtain by first public key
First encryption data;
Seller trades the storage address of first encryption data as intensive good, so that counterparty passes through described the
The storage address of one encryption data obtains first encryption data, and makes counterparty corresponding by first public key
First private key decrypts first encryption data and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is that the counterparty is exclusive.
7. according to the method described in claim 6, it is characterized in that, the seller by the storage of first encryption data
Location carries out transaction as intensive good
Seller encrypts the storage address by the second encryption code key, obtains the second encryption data, and will be after encryption
The storage address and it is described second encryption code key it is corresponding second decryption code key it is corresponding as the electronic publication
Intensive good is traded.
8. according to the method described in claim 6, it is characterized in that, the seller by the storage of first encryption data
Location carries out transaction as intensive good
Seller is being based on area using the storage address of first encryption data as the corresponding intensive good of the electronic publication
The transaction platform of block chain technology is traded.
9. according to the method described in claim 6, it is characterized in that, the electronic publication is stored in the equity based on block chain
In network node.
10. a kind of the transaction device of electronic publication characterized by comprising
Public key obtains module, and seller obtains the first public key that module obtains counterparty by the public key, to pass through described the
One public key encrypts the electronic publication to obtain the first encryption data;
Transaction modules, seller are carried out by the transaction modules using the storage address of first encryption data as intensive good
Transaction so that counterparty obtains first encryption data by the storage address of first encryption data, and to hand over
Yi Fang decrypts first encryption data by corresponding first private key of first public key and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is that the counterparty is exclusive.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711450848.4A CN109978524A (en) | 2017-12-27 | 2017-12-27 | The method of commerce and device of electronic publication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711450848.4A CN109978524A (en) | 2017-12-27 | 2017-12-27 | The method of commerce and device of electronic publication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109978524A true CN109978524A (en) | 2019-07-05 |
Family
ID=67071921
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711450848.4A Pending CN109978524A (en) | 2017-12-27 | 2017-12-27 | The method of commerce and device of electronic publication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109978524A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140324704A1 (en) * | 2008-10-11 | 2014-10-30 | Divan Industries, Llc | Secure content distribution system |
CN101785012B (en) * | 2007-08-24 | 2016-05-04 | 本尼多尔公司 | Transaction security on network |
CN106971302A (en) * | 2017-04-17 | 2017-07-21 | 北京工商大学 | A kind of threedimensional model based on block chain technology is really weighed and method of commerce |
CN104298896B (en) * | 2014-09-30 | 2017-09-26 | 广州星汇文化发展有限公司 | Digital copyright protecting and distribution method and system |
WO2017184160A1 (en) * | 2016-04-22 | 2017-10-26 | Entit Software Llc | Authorization of use of cryptographic keys |
CN107391298A (en) * | 2017-07-06 | 2017-11-24 | 上海策链信息科技有限公司 | State data memory detection method, device and computer-readable recording medium |
-
2017
- 2017-12-27 CN CN201711450848.4A patent/CN109978524A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101785012B (en) * | 2007-08-24 | 2016-05-04 | 本尼多尔公司 | Transaction security on network |
US20140324704A1 (en) * | 2008-10-11 | 2014-10-30 | Divan Industries, Llc | Secure content distribution system |
CN104298896B (en) * | 2014-09-30 | 2017-09-26 | 广州星汇文化发展有限公司 | Digital copyright protecting and distribution method and system |
WO2017184160A1 (en) * | 2016-04-22 | 2017-10-26 | Entit Software Llc | Authorization of use of cryptographic keys |
CN106971302A (en) * | 2017-04-17 | 2017-07-21 | 北京工商大学 | A kind of threedimensional model based on block chain technology is really weighed and method of commerce |
CN107391298A (en) * | 2017-07-06 | 2017-11-24 | 上海策链信息科技有限公司 | State data memory detection method, device and computer-readable recording medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7586616B2 (en) | TLS integration of post-quantum cryptography algorithms | |
TWI760149B (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
TW201947909A (en) | Block chain data processing method and device, processing equipment and system | |
US8687812B2 (en) | Method and apparatus for public key cryptography | |
EP3860041A1 (en) | Efficient methods for authenticated communication | |
CN109274503A (en) | Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system | |
US20130028419A1 (en) | System and a method for use in a symmetric key cryptographic communications | |
CN110390212B (en) | Supply monitoring method based on block chain and node device | |
CN108432205A (en) | Use the system and method for the multi-party communication of the safety of agency | |
CN107005413A (en) | Secure connection and the efficient startup of related service | |
CN114580029A (en) | Block chain digital asset privacy protection method, device, equipment and storage medium | |
CN109891423A (en) | It is controlled using the data encryption of multiple control mechanisms | |
CN108366057A (en) | A kind of data processing method, client and electronic equipment | |
CN112737783B (en) | Decryption method and device based on SM2 elliptic curve | |
CN105471918A (en) | Agent re-assignment verifier signature method | |
WO2025043919A1 (en) | Method for implementing distributed digital certificate, computer device, and storage medium | |
Klimushyn et al. | Hardware support procedures for asymmetric authentication of the internet of things | |
WO2022024182A1 (en) | Knowledge proof method, knowledge proof program, and information processing apparatus | |
CN114301677B (en) | Key negotiation method, device, electronic equipment and storage medium | |
CN108965278A (en) | Transaction request processing method and processing device | |
Kahanda et al. | The future era of quantum computing | |
CN116132185B (en) | Data calling method, system, device, equipment and medium | |
Zhao et al. | A regulatable mechanism for transacting data assets | |
Siva et al. | Hybrid cryptography security in public cloud using TwoFish and ECC algorithm | |
CN109905232A (en) | A signature decryption method, system, device and computer-readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |