Sensitive data transaction system and method based on block chain
A technology of sensitive data and transaction system, applied in the field of blockchain technology and e-commerce, it can solve problems such as tampering, digital information leakage, and the inability of participants to prove their innocence.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] Embodiment 1: a blockchain-based sensitive data transaction system, including a blockchain layer module, an electronic contract layer module, and a SaaS layer module;
[0080] The blockchain layer module provides the technical support of the underlying blockchain, including a virtual machine that supports the operation of electronic contracts, a consensus algorithm, a transaction verification mechanism and an accounting mechanism;
[0081] The electronic contract layer module provides distributed application services, endorsed by blockchain technology, and at the electronic contract layer, runs the code of the system sensitive data transaction and the code of the digital generation algorithm;
[0082] The SaaS layer module provides cloud platform services, allowing all participants to easily participate in business collaboration through the web platform and the client.
[0083] Preferably, each of the blockchain layer module, electronic contract layer module and SaaS la...
Embodiment 2
[0101] Embodiment 2: The present invention also proposes a method for a blockchain-based sensitive data transaction system, including the following steps:
[0102] In the first step, the first participant obtains a random number A_1 through the hash algorithm according to the order information, which is stored in the electronic contract and is invisible to the outside world;
[0103] In the second step, the second participant obtains a random number A_2 through the Hash algorithm according to the order information, and stores it in the electronic contract for the subsequent generation of the code, which is invisible to the outside world;
[0104] The third step is the step of uploading the seed code by the third party. If the third party has the seed code, he / she can choose to upload the seed code to the blockchain electronic contract, and the seed code is generated by the third party; If the third party does not have the seed code, the seed code will actually be automatically...
Embodiment 3
[0106] Embodiment 3: The present invention also proposes a method for applying a blockchain-based sensitive data transaction system, including the following steps:
[0107] S1, the steps for industry customers to place anti-counterfeiting label orders to agents or directly to system integrators and printing factories;
[0108] Industry customers log in to the industry user sub-module, place anti-counterfeiting label orders to agents, and call the electronic contract interface through the SaaS layer. The hash algorithm obtains a random number A_1, which is stored in the electronic contract and is invisible to the outside world;
[0109] S2, the steps that the agent obtains the anti-counterfeiting label order from the industry customer and outsources it to the system integrator and the printing factory;
[0110] The agent logs into the agent user sub-module, and the anti-counterfeiting label order is transferred to the agent's account at this time. The agent confirms the anti-c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


