[go: up one dir, main page]

CN109978524A - The method of commerce and device of electronic publication - Google Patents

The method of commerce and device of electronic publication Download PDF

Info

Publication number
CN109978524A
CN109978524A CN201711450848.4A CN201711450848A CN109978524A CN 109978524 A CN109978524 A CN 109978524A CN 201711450848 A CN201711450848 A CN 201711450848A CN 109978524 A CN109978524 A CN 109978524A
Authority
CN
China
Prior art keywords
encryption data
counterparty
encryption
electronic publication
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711450848.4A
Other languages
Chinese (zh)
Inventor
李骁
刘海法
王申
张庆胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201711450848.4A priority Critical patent/CN109978524A/en
Publication of CN109978524A publication Critical patent/CN109978524A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides the method for commerce and device of a kind of electronic publication, and method includes: that counterparty determines mutually independent first public key and the first private key, wherein first private key is that counterparty is exclusive;Counterparty sends first public key, so that seller encrypts the electronic publication to obtain the first encryption data by first public key;Counterparty obtains the storage address of first encryption data by transaction, obtains first encryption data by the storage address of first encryption data;Counterparty decrypts first encryption data by first private key, to obtain the electronic publication.The method of commerce and device of a kind of electronic publication provided in this embodiment, the first public key is only propagated in communication process without propagating the first private key, public key is held as a hostage can not electronic publication after breaking encryption, and then ensure that electronic publication safety and copyright.

Description

The method of commerce and device of electronic publication
Technical field
The invention relates to block chain technical field more particularly to the method for commerce and device of electronic publication.
Background technique
With the development of internet technology, people's lives mode gradually changes, present people hand more and more accustomed to using The electric terminals such as mechanical, electrical brain rely on internet to search or watch e-book, films and television programs.Since there are users for network Just, the advantages that data volume is big, information transmission speed is fast promotes the propagation of electronic publication.
But on network the propagation of many electronic publications be it is unordered, the electronic publications such as a large amount of novel, film are all It illegally uploads without approval, the digital publishing rights of electronic publication is caused to be difficult to ensure, to not can guarantee author and publication The practical interests of quotient, and then impact is generated to entire electronics industry, therefore, how to guarantee that the digital publishing rights of electronic publication become Technical problem urgently to be resolved.
Summary of the invention
The method of commerce and device for being designed to provide a kind of electronic publication of the embodiment of the present application, at least to solve The above problem certainly in the prior art.
The embodiment of the present application provides a kind of method of commerce of electronic publication comprising:
Counterparty determines mutually independent first public key and the first private key, wherein first private key is that counterparty is only Have;
Counterparty sends first public key, so that seller carries out the electronic publication by first public key Encryption obtains the first encryption data;
Counterparty obtains the storage address of first encryption data by transaction, passes through depositing for first encryption data It stores up address and obtains first encryption data;
Counterparty decrypts first encryption data by first private key, to obtain the electronic publication.
Optionally, in the embodiment of the present application, the counterparty obtains the storage of first encryption data by transaction Address includes: counterparty by transaction the second encryption data of acquisition and corresponding second decryption code key, is solved by described second Close code key decrypts second encryption data, obtains the storage address, is added with obtaining described first according to the storage address Ciphertext data.
Optionally, in the embodiment of the present application, the counterparty obtains the storage of first encryption data by transaction Address includes: that counterparty trades in the transaction platform based on block chain technology, obtains the storage of first encryption data Address, to obtain first encryption data according to the storage address.
Optionally, in the embodiment of the present application, the counterparty is obtained by the storage address of first encryption data First encryption data includes: counterparty obtains in the peer-to-peer network node based on block chain according to the storage address Corresponding first encryption data of the electronic publication.
Optionally, in the embodiment of the present application, the Encryption Algorithm packet of first public key and first private key is determined Include: elliptic curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin Encryption Algorithm, D-H add Any one of close algorithm.
The embodiment of the present application also provides a kind of method of commerce of electronic publication comprising:
Seller obtain counterparty the first public key, by first public key to the electronic publication encrypted with Obtain the first encryption data;
Seller trades the storage address of first encryption data as intensive good, so that counterparty passes through institute The storage address for stating the first encryption data obtains first encryption data, and counterparty is made to pass through first public key pair The first private key answered decrypts first encryption data and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is the counterparty It is exclusive.
Optionally, in the embodiment of the present application, the seller is using the storage address of first encryption data as friendship It includes: that seller encrypts the storage address by the second encryption code key that Yi Pin, which carries out transaction, obtains the second encryption number According to, and using the encrypted storage address and the corresponding second decryption code key of the second encryption code key as the electronics The corresponding intensive good of publication is traded.
Optionally, in the embodiment of the present application, the seller is using the storage address of first encryption data as friendship It includes: seller using the storage address of first encryption data as the corresponding friendship of the electronic publication that Yi Pin, which carries out transaction, Yi Pin trades in the transaction platform based on block chain technology.
Optionally, in the embodiment of the present application, the electronic publication is stored in the peer-to-peer network node based on block chain In.
The embodiment of the present application also provides a kind of the transaction device of electronic publication comprising:
Public key obtains module, for making seller obtain the first public key of counterparty, to pass through first public key to institute Electronic publication is stated to be encrypted to obtain the first encryption data;
Transaction modules, for making seller that the storage address of first encryption data to be traded as intensive good, So that counterparty obtains first encryption data by the storage address of first encryption data, and make counterparty logical It crosses the corresponding first private key decryption of first public key first encryption data and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is the counterparty It is exclusive.
The method of commerce and device of a kind of electronic publication provided in this embodiment, dealer determine the first public key and First private key, and the first public key is sent to seller, so that seller is encrypted electronic publication by the first public key, Then using the storage address of encrypted first encryption data as intensive good, so that dealer obtains the first encryption data, it Dealer can be decrypted by the first private key afterwards, so as to only propagate the first public key in communication process without propagating First private key, public key is held as a hostage can not electronic publication after breaking encryption, and then ensure that the peace of electronic publication Full property and copyright.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in inventive embodiments can also obtain according to these attached drawings for those of ordinary skill in the art Obtain other attached drawings.
Fig. 1 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application one provides;
Fig. 2 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application two provides;
Fig. 3 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application three provides;
Fig. 4 is a kind of the transaction device structural schematic diagram for electronic publication that the embodiment of the present application four provides.
Specific embodiment
Presently filed embodiment is described in detail below in conjunction with schema and embodiment, how the application is applied whereby Technological means solves technical problem and reaches the realization process of technical effect to fully understand and implement.
Fig. 1 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application one provides, pair of transaction Side is respectively counterparty and seller, and this method process is directed to the process of seller, and the encrypting and decrypting for use of trading is calculated Method is rivest, shamir, adelman, and corresponding encryption code key is the first public key, and decryption code key is the first private key.Wherein the first public key with And first private key it is mutually indepedent, and first private key be the counterparty it is exclusive.
In the present embodiment, the first public key and the first private key refer to the interior of the first public key and the first private key independently of each other Hold difference, still, the first public key and the first private key are a pair, if needed with the first public key encryption with the first private key solution It is close, if decrypted with the first private key, need with the first public key decryptions.
In the present embodiment, the first private key is that counterparty is exclusive, it is ensured that the first private key will not be propagated, so that other people obtain The probability for obtaining the first private key substantially reduces, it is ensured that the safety of decryption guarantees so as to pass through rivest, shamir, adelman The copyright of electronic publication.
As shown in Figure 1, a kind of method of commerce process of electronic publication provided in this embodiment specifically includes:
S11, seller obtain the first public key of counterparty, are added by first public key to the electronic publication It is close to obtain the first encryption data;
In the present embodiment, electronic publication includes can be by digitlization and by the product of digital network transmission, such as electricity Subgraph book, the film and television to spread through the internet etc..
Optionally, in the present embodiment, electronic publication be can store in the peer-to-peer network node based on block chain.Electronics Publication can first pass through the first public key encryption, then the first encryption data piecemeal that will be obtained after encryption, be then store in and be based on In the peer-to-peer network of block chain.
In peer-to-peer network based on block chain, all in the status of equity between the multiple stage computers that are connected to each other, each Computer has identical function, no master-slave, and a computer can not only be used for server, sets shared resource for its in network He is used computer, and can be used as work station, in general whole network does not depend on dedicated centralized servers, is not also had Dedicated work station.To broken peer-to-peer network of the meeting based on block chain, need 51% or more the computer as node It can be it is larger to destroy difficulty.
Therefore, electronic publication is stored in the peer-to-peer network based on block chain, can be further improved electronic publishing The safety of object.
In the present embodiment, counterparty can be generated the first public key and the first private key, and send the first public key to seller, Allow seller to obtain the first public key, and then can be encrypted electronic publication by the first public key.
S12, seller trade the storage address of first encryption data as intensive good, so that counterparty is logical The storage address for crossing first encryption data obtains first encryption data, and makes counterparty public by described first Corresponding first private key of key decrypts first encryption data and obtains the electronic publication.
Optionally, the one of the present embodiment is in the specific implementation, the storage address can be carried out by the second encryption code key Encryption obtains the second encryption data, and the encrypted storage address and described second is encrypted code key corresponding second Decryption code key is traded as the corresponding intensive good of the electronic publication.
Specifically, storage address can be encrypted only by symmetric encipherment algorithm, i.e., the second encryption code key and second It is identical to decrypt code key.
Optionally, the present embodiment is another in the specific implementation, using the storage address of first encryption data as described in The corresponding intensive good of electronic publication is traded in the transaction platform based on block chain technology.
Specifically, in the present embodiment, by the transaction platform using storage address as intensive good based on block chain technology into Row transaction can guarantee again to encrypt intensive good, thus with ensure that the storage as intensive good by transaction platform The safety of location, and then guarantee the safety of the corresponding electronic publication of storage address.
Certainly, in other realizations of the application, above two implementation can be used in combination, it can first pass through One encryption code key is encrypted storage address to obtain the second encryption data, then that the second encryption data and the second decryption is secret Key is put into the transaction platform based on block chain and trades as intensive good, so that the safety of electronic publication obtains more preferably Guarantee, to guarantee the copyright of electronic publication.
A kind of method of commerce of electronic publication provided in this embodiment, is encrypted by the first public key, then will be added The storage address of the first encryption data after close is as intensive good, so that dealer obtains the first encryption data, dealer later It can be decrypted by the first private key, so as to which asymmetric decipherment algorithm to be applied to the transaction of electronic publication, passed The first public key is only propagated during broadcasting without propagating the first private key, it can not electronics after breaking encryption public key is held as a hostage Publication, so ensure that electronic publication safety and copyright.
It is further to note that the Encryption Algorithm for determining first public key and first private key includes: ellipse Curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin Encryption Algorithm, in D-H Encryption Algorithm It is any.
Fig. 2 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application two provides, pair of transaction Side is respectively counterparty and seller, and this method process is directed to the process of counterparty, as shown, comprising:
S21, counterparty determine mutually independent first public key and the first private key, wherein first private key is transaction Fang Duyou.
In the present embodiment, the first public key and the first private key refer to the interior of the first public key and the first private key independently of each other Hold difference, still, the first public key and the first private key are a pair, if needed with the first public key encryption with the first private key solution It is close, if decrypted with the first private key, need with the first public key decryptions.
In the present embodiment, the first private key is that counterparty is exclusive, it is ensured that the first private key will not be propagated, so that other people obtain The probability for obtaining the first private key substantially reduces, it is ensured that the safety of decryption guarantees so as to pass through rivest, shamir, adelman The copyright of electronic publication.
S22, counterparty send first public key, so that seller is by first public key to the electronic publication It is encrypted to obtain the first encryption data.
In the present embodiment, the first public key can be sent to seller by dealer, so that seller can execute above-mentioned step Rapid S11.
S23, counterparty obtain the storage address of first encryption data by transaction, pass through first encryption data Storage address obtain first encryption data.
Optionally, the present embodiment one in the specific implementation, counterparty can the transaction platform based on block chain technology into Row transaction, obtains the storage address of first encryption data, to obtain first encryption data according to the storage address. Specifically, the transaction platform based on block chain technology can be DECNT platform, and dealer can utilize DTC generation in DECNT platform Coin purchase-transaction product, and then it is further ensured that by DECNT platform the safety of transaction, while DECNT platform can also pass through DTC token replaces bank account payment etc., to protect the privacy of dealer.
Optionally, the present embodiment another is in the specific implementation, counterparty obtains the second encryption data and right by transaction The the second decryption code key answered decrypts second encryption data by the second decryption code key, obtains the storage address, with The first encryption data is obtained according to the storage address.
Optionally, the present embodiment is another in the specific implementation, when electronic publication is stored in the peer-to-peer network based on block chain When in network, the electronic publication pair can be obtained in the peer-to-peer network node based on block chain according to the storage address The first encryption data answered.
Certainly, in other realizations of the application, above-mentioned three kinds of implementations can be used in combination, such as can be first in base It trades in the transaction platform of block chain technology, the second encryption data and the second decryption code key is obtained by transaction, then The second encryption data is decrypted by the second decryption code key, storage address is obtained, further according to storage address from pair based on block chain Corresponding first encryption data of electronic publication is determined in equal networks.
S24, counterparty decrypt first encryption data by first private key, to obtain the electronic publication.
In the present embodiment, after obtaining the first encryption data, it can be decrypted by the first private key, obtain electronic publishing Object, specific decryption method can refer to the prior art, and details are not described herein in the present embodiment.
It is further to note that the Encryption Algorithm for determining first public key and first private key includes: ellipse Curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin Encryption Algorithm, in D-H Encryption Algorithm It is any.
A kind of method of commerce of electronic publication provided in this embodiment determines mutually independent first public key and first Private key, wherein first private key is that counterparty is exclusive;First public key is sent, to pass through first public key to described Electronic publication is encrypted to obtain the first encryption data;The storage address of first encryption data is obtained by transaction, with Obtain first encryption data;First encryption data is decrypted by first private key, to obtain the electronic publishing Object.The method of commerce of electronic publication provided in this embodiment only propagates the first public key without propagating the in communication process One private key, public key is held as a hostage can not electronic publication after breaking encryption, and then ensure that the safety of electronic publication Property and copyright.
Fig. 3 is a kind of method of commerce flow diagram for electronic publication that the embodiment of the present application three provides, pair of transaction Side is respectively counterparty and seller, and this method process is directed to counterparty and seller both sides.
As shown in figure 3, a kind of method of commerce of electronic publication provided in this embodiment includes:
S31, counterparty determine the first private key and the first public key;And the first public key is sent to seller.
First public key and the first private key are similar to the above embodiments, and details are not described herein.
In the present embodiment, counterparty can carry out preceding negotiation of trading with seller, determine the first public affairs according to negotiation result Key and the first private key, such as negotiating the specific method of asymmetric encryption is elliptic curve encryption algorithm (abbreviation ECC), then basis Elliptic curve encryption algorithm determines the first public key and the first private key.
S32, seller encrypt electronic publication according to the first public key, obtain the first encryption data, and by first It is stored in after encryption data fragmentation in the peer-to-peer network based on block chain.
S33, seller are encrypted the storage address of the first encryption data to obtain the second encryption data, and second is added Ciphertext data and the second decryption code key are traded as intensive good by the transaction platform based on block chain.
S34, counterparty determine the second encryption data and the second decryption code key by trading, and pass through the second decryption code key The second encryption data is decrypted, to obtain the store path of the first encryption data.
S35, counterparty obtain the first encryption data according to the store path of the first encryption data.
S36, counterparty decrypt the first encryption data according to the first private key, to obtain data product.
By method of commerce provided by the embodiments of the present application, it can effectively guarantee that the copyright of electronic publication is not invaded Evil.
Asymmetric decipherment algorithm can be applied to electronic publishing by the method for commerce of electronic publication provided in this embodiment The transaction of object is only propagated the first public key without propagating the first private key in communication process, can not be broken public key is held as a hostage Translate encrypted electronic publication, so ensure that electronic publication safety and copyright;And by electronic publication It is stored in the peer-to-peer network based on block chain and trades using storage address after encryption as intensive good, further ensure The safety of electronic publication and the copyright of electronic publication.
Fig. 4 is a kind of the transaction device structural schematic diagram for electronic publication that the embodiment of the present application four provides, as shown, Comprising:
Public key obtains module 41, and seller obtains the first public key that module obtains counterparty by the public key, to pass through First public key encrypts the electronic publication to obtain the first encryption data.
Transaction modules 42, seller is by the transaction modules using the storage address of first encryption data as transaction Product are traded, so that counterparty obtains first encryption data by the storage address of first encryption data, and So that counterparty, which decrypts first encryption data by corresponding first private key of first public key, obtains the electronic publishing Object.
Wherein, first public key and first private key are mutually indepedent, and first private key is the counterparty It is exclusive.
Optionally, in the present embodiment, transaction modules 42 include:
The storage address is passed through the second encryption by storage address encrypting module by storage address encrypting module, seller Code key is encrypted, and obtains the second encryption data, and the encrypted storage address and described second are encrypted secret key pair The the second decryption code key answered is traded as the corresponding intensive good of the electronic publication.
Optionally, in the present embodiment, transaction modules 42 include:
Transaction submodule, seller is by transaction submodule using the storage address of first encryption data as the electricity The corresponding intensive good of sub- publication, trades in the transaction platform based on block chain technology.
A kind of the transaction device of electronic publication provided in this embodiment, is encrypted by the first public key, then will be added The storage address of the first encryption data after close is as intensive good, so that dealer obtains the first encryption data, dealer later It can be decrypted by the first private key, to only propagate the first public key in communication process without propagating the first private key, i.e., Make public key be held as a hostage also can not electronic publication after breaking encryption, and then ensure that electronic publication safety and version Power.
Device provided by embodiments herein can be realized by a computer program.Those skilled in the art should be able to Understand, above-mentioned unit and module division mode are only one of numerous division modes, if be divided into other units or Module or non-divided block all should be within the scope of protection of this application as long as information object has above-mentioned function.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computer Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes the meter of computer usable program code that the application, which can be used in one or more, The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present application And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.Obviously, those skilled in the art can be to the application Various modification and variations are carried out without departing from spirit and scope.If in this way, these modifications and variations of the application Belong within the scope of the claim of this application and its equivalent technologies, then the application is also intended to encompass these modification and variations and exists It is interior.

Claims (10)

1. a kind of method of commerce of electronic publication characterized by comprising
Counterparty determines mutually independent first public key and the first private key, wherein first private key is that counterparty is exclusive;
Counterparty sends first public key, so that seller encrypts the electronic publication by first public key Obtain the first encryption data;
Counterparty obtains the storage address of first encryption data by transaction, by the storage of first encryption data Location obtains first encryption data;
Counterparty decrypts first encryption data by first private key, to obtain the electronic publication.
2. the method according to claim 1, wherein the counterparty obtains the first encryption number by transaction According to storage address to include: counterparty obtain the second encryption data and corresponding second decryption code key by transaction, pass through institute It states the second decryption code key and decrypts second encryption data, obtain the storage address, to obtain institute according to the storage address State the first encryption data.
3. the method according to claim 1, wherein the counterparty obtains the first encryption number by transaction According to storage address include:
Counterparty trades in the transaction platform based on block chain technology, obtains the storage address of first encryption data, To obtain first encryption data according to the storage address.
4. the method according to claim 1, wherein storage of the counterparty by first encryption data Address obtains first encryption data: counterparty is according to the storage address, in the peer-to-peer network section based on block chain Corresponding first encryption data of the electronic publication is obtained in point.
5. the method according to claim 1, wherein determine first public key and first private key plus Close algorithm includes: elliptic curve encryption algorithm, RSA cryptographic algorithms, Elgamal Encryption Algorithm, knapsack algorithm, Rabin encryption calculation Any one of method, D-H Encryption Algorithm.
6. a kind of method of commerce of electronic publication characterized by comprising
Seller obtains the first public key of counterparty, is encrypted the electronic publication to obtain by first public key First encryption data;
Seller trades the storage address of first encryption data as intensive good, so that counterparty passes through described the The storage address of one encryption data obtains first encryption data, and makes counterparty corresponding by first public key First private key decrypts first encryption data and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is that the counterparty is exclusive.
7. according to the method described in claim 6, it is characterized in that, the seller by the storage of first encryption data Location carries out transaction as intensive good
Seller encrypts the storage address by the second encryption code key, obtains the second encryption data, and will be after encryption The storage address and it is described second encryption code key it is corresponding second decryption code key it is corresponding as the electronic publication Intensive good is traded.
8. according to the method described in claim 6, it is characterized in that, the seller by the storage of first encryption data Location carries out transaction as intensive good
Seller is being based on area using the storage address of first encryption data as the corresponding intensive good of the electronic publication The transaction platform of block chain technology is traded.
9. according to the method described in claim 6, it is characterized in that, the electronic publication is stored in the equity based on block chain In network node.
10. a kind of the transaction device of electronic publication characterized by comprising
Public key obtains module, and seller obtains the first public key that module obtains counterparty by the public key, to pass through described the One public key encrypts the electronic publication to obtain the first encryption data;
Transaction modules, seller are carried out by the transaction modules using the storage address of first encryption data as intensive good Transaction so that counterparty obtains first encryption data by the storage address of first encryption data, and to hand over Yi Fang decrypts first encryption data by corresponding first private key of first public key and obtains the electronic publication;
Wherein, first public key and first private key are mutually indepedent, and first private key is that the counterparty is exclusive.
CN201711450848.4A 2017-12-27 2017-12-27 The method of commerce and device of electronic publication Pending CN109978524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711450848.4A CN109978524A (en) 2017-12-27 2017-12-27 The method of commerce and device of electronic publication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711450848.4A CN109978524A (en) 2017-12-27 2017-12-27 The method of commerce and device of electronic publication

Publications (1)

Publication Number Publication Date
CN109978524A true CN109978524A (en) 2019-07-05

Family

ID=67071921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711450848.4A Pending CN109978524A (en) 2017-12-27 2017-12-27 The method of commerce and device of electronic publication

Country Status (1)

Country Link
CN (1) CN109978524A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140324704A1 (en) * 2008-10-11 2014-10-30 Divan Industries, Llc Secure content distribution system
CN101785012B (en) * 2007-08-24 2016-05-04 本尼多尔公司 Transaction security on network
CN106971302A (en) * 2017-04-17 2017-07-21 北京工商大学 A kind of threedimensional model based on block chain technology is really weighed and method of commerce
CN104298896B (en) * 2014-09-30 2017-09-26 广州星汇文化发展有限公司 Digital copyright protecting and distribution method and system
WO2017184160A1 (en) * 2016-04-22 2017-10-26 Entit Software Llc Authorization of use of cryptographic keys
CN107391298A (en) * 2017-07-06 2017-11-24 上海策链信息科技有限公司 State data memory detection method, device and computer-readable recording medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101785012B (en) * 2007-08-24 2016-05-04 本尼多尔公司 Transaction security on network
US20140324704A1 (en) * 2008-10-11 2014-10-30 Divan Industries, Llc Secure content distribution system
CN104298896B (en) * 2014-09-30 2017-09-26 广州星汇文化发展有限公司 Digital copyright protecting and distribution method and system
WO2017184160A1 (en) * 2016-04-22 2017-10-26 Entit Software Llc Authorization of use of cryptographic keys
CN106971302A (en) * 2017-04-17 2017-07-21 北京工商大学 A kind of threedimensional model based on block chain technology is really weighed and method of commerce
CN107391298A (en) * 2017-07-06 2017-11-24 上海策链信息科技有限公司 State data memory detection method, device and computer-readable recording medium

Similar Documents

Publication Publication Date Title
JP7586616B2 (en) TLS integration of post-quantum cryptography algorithms
TWI760149B (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
TW201947909A (en) Block chain data processing method and device, processing equipment and system
US8687812B2 (en) Method and apparatus for public key cryptography
EP3860041A1 (en) Efficient methods for authenticated communication
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
CN110390212B (en) Supply monitoring method based on block chain and node device
CN108432205A (en) Use the system and method for the multi-party communication of the safety of agency
CN107005413A (en) Secure connection and the efficient startup of related service
CN114580029A (en) Block chain digital asset privacy protection method, device, equipment and storage medium
CN109891423A (en) It is controlled using the data encryption of multiple control mechanisms
CN108366057A (en) A kind of data processing method, client and electronic equipment
CN112737783B (en) Decryption method and device based on SM2 elliptic curve
CN105471918A (en) Agent re-assignment verifier signature method
WO2025043919A1 (en) Method for implementing distributed digital certificate, computer device, and storage medium
Klimushyn et al. Hardware support procedures for asymmetric authentication of the internet of things
WO2022024182A1 (en) Knowledge proof method, knowledge proof program, and information processing apparatus
CN114301677B (en) Key negotiation method, device, electronic equipment and storage medium
CN108965278A (en) Transaction request processing method and processing device
Kahanda et al. The future era of quantum computing
CN116132185B (en) Data calling method, system, device, equipment and medium
Zhao et al. A regulatable mechanism for transacting data assets
Siva et al. Hybrid cryptography security in public cloud using TwoFish and ECC algorithm
CN109905232A (en) A signature decryption method, system, device and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705