Digital product secure transaction system and method based on blockchain technology

A digital product and secure transaction technology, applied in the field of computer security, can solve problems such as reselling, leakage, transaction process control and data security and privacy protection cannot be guaranteed, to solve security problems, improve security, and improve auditability sexual effect

Pending Publication Date: 2021-04-23
NANJING UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve a series of problems such as the risk of leakage and reselling in the transaction process of enterprise data products, transaction process control and data security and privacy protection cannot be guaranteed, this invention proposes a digital product security transaction method based on blockchain technology And the system that implements this method, based on the data transaction method of the block chain, through the establishment of a private chain and an alliance chain, can effectively combine digital watermarking, security auditing and other technical methods to realize the whole process management and control of data transactions, and ensure that digital products Quick and effective implementation of rights confirmation, rights use and rights protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital product secure transaction system and method based on blockchain technology
  • Digital product secure transaction system and method based on blockchain technology
  • Digital product secure transaction system and method based on blockchain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Such as figure 1 As shown, the digital product security transaction system based on blockchain technology of the present invention includes: a contract module, an operation module, an encryption module, a database module, a digital watermark module, and a blockchain module.

[0049] Specifically, the contract module is used to send commodity demander information and commodity demand information to the commodity database module in the database module.

[0050] The operation module is used to perform hash operation on the watermarked digital commodity to form a first hash value, and transmit the first hash value to the asymmetric encryption sub-module and the transaction database module.

[0051] The encryption module includes a symmetric encryption sub-module and the asymmetric encryption sub-module, the symmetric encryption sub-module is used to use the generated symmetric encryption key to encrypt the digital commodity containing the watermark to form a first ciphertex...

Embodiment 2

[0061] Such as Figure 3-4 As shown, this embodiment discloses a digital product security transaction method based on blockchain technology, including the following steps:

[0062] Step 1, after payment is completed, commodity demander B sends a data request message to the system and calls the contract module;

[0063] Step 2, the contract module sends the commodity demander information and commodity demand information to the commodity database module in the database module;

[0064] Step 3, the commodity database module sends the digital commodity, commodity provider information and usage range information to the digital watermark module according to commodity demand information;

[0065] Step 4, the digital watermark module marks the product provider information and product use range information in the digital product in the form of data watermark; the digital watermark module transmits the watermarked digital product P to the symmetric encryption sub-module;

[0066] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a digital product secure transaction method based on a block chain technology and a system for realizing the method, solves the problem of right and interest guarantee in a digital commodity transaction process, and confirms ownership of a commodity through a digital watermarking technology and one-time asymmetric encryption from the perspective of a commodity provider; from the perspective of a commodity demander, malicious attacks can be effectively prevented in the transmission process of commodities through symmetric encryption, authenticity and effectiveness of the commodities are guaranteed, and it is guaranteed that the commodities can only be effectively accessed by a commodity demander through secondary asymmetric encryption; once transaction is completed, whole transaction information is uploaded to a block chain and cannot be tampered manually, transaction records can be checked, and the method can be used for responsibility investigation after events. According to the invention, the data security is guaranteed from three aspects of right confirmation, right use and right protection by utilizing a block chain technology and combining digital watermarks, so that the security in the digital commodity transaction process can be improved, the ownership of digital commodities is guaranteed, and legal disputes possibly generated by buyers and sellers after transaction are effectively avoided.

Description

technical field [0001] The invention belongs to the technical field of computer security, relates to block chain technology, in particular to a digital product security transaction method based on block chain technology and a system for realizing the method. Background technique [0002] With the increasing development of network technology, the network transaction volume of digital products has been greatly increased year by year. During the online transaction and transmission of digital products, digital information is easily tampered with, copied and distributed; therefore, how to protect it is an important issue. The data transaction method in the prior art only uses the traditional digital watermarking technology to contribute from the perspective of data rights protection, and lacks all-round and multi-angle control of digital products and their transaction process. After analysis, we found that the existing implementation method only simply completes the delivery of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32G06Q40/04
CPCH04L9/0819H04L9/3236G06Q40/04
Inventor 李迁王德军严浩苏森森
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products