Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ciphertext analysis method and system for data transaction

An analysis method and transaction key technology, applied in data processing applications, payment systems, payment system structures, etc., can solve problems such as variable information exposure, and achieve the effect of reducing the risk of exposure

Inactive Publication Date: 2021-09-17
立信(重庆)数据科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a ciphertext analysis method and system for data transactions, which solves the technical problems that may lead to the exposure of changeable information in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext analysis method and system for data transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The embodiment is basically as attached figure 1 shown, including:

[0037] The data encryption module is used to register and encrypt data assets at the same time, and the registered data asset information forms a registration block chain;

[0038] The data preservation module is used for data preservation of data assets, and the preserved data asset information forms a preservation block chain;

[0039] The data evaluation module is used to use the AHP analysis method to evaluate the price of data assets, and the evaluated data asset information forms an evaluation block chain;

[0040] The platform building module is used to connect the registration block chain, security block chain and evaluation block chain through the block chain and CA algorithm to form a block chain rope network, and establish a data transaction platform based on the block chain rope network;

[0041] The ciphertext analysis module is used to obtain blocks containing variable information from ...

Embodiment 2

[0053] The only difference from Embodiment 1 is that the ciphertext analysis module generates a random number as the transaction key of the plaintext message, and performs symmetric encryption on the plaintext message according to the transaction key to obtain the ciphertext message corresponding to the variable information. The random number is randomly generated as the transaction key of the plaintext message to avoid the regularity of the transaction key of the plaintext message; the symmetrical encryption of the randomly generated transaction key can improve the encryption effect.

Embodiment 3

[0055] The only difference from Embodiment 2 is that, at each transaction, the variable information in the transaction process is related to the transaction rules, that is to say, the variable information is rule-sensitive. Therefore, the same transaction information, which was not judged as variable information in the last transaction, may be judged as variable information in this transaction due to the change of rules; similarly, the same transaction information is judged as variable information in this transaction It is not judged as variable information, but it may be judged as variable information in the next transaction due to the change of rules. In this embodiment, after the plaintext message of the variable information is obtained, the variable information is divided into variable information sensitive to rule quality and variable information sensitive to rule quantity.

[0056] In this embodiment, the changeable information includes three types, which are Type A tran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data transaction, in particular to a ciphertext analysis method and system for data transaction, and the system comprises: a data encryption module which is used for carrying out the registration encryption of data assets, and forming a registration block chain; the data preservation module that is used for performing data preservation on the data assets to form a preservation block chain; the data evaluation module that is used for performing price evaluation on the data assets to form an evaluation block chain; the platform establishment module that is used for connecting the registration block chain, the security block chain and the evaluation block chain to form a block chain rope network, and establishing a data transaction platform based on the block chain rope network; and the ciphertext analysis module that is used for obtaining the block containing the variable information from the data transaction platform, analyzing the block containing the variable information, obtaining a ciphertext message and a ciphertext list of the variable information, and obtaining a plaintext message of the variable information according to the ciphertext list and the ciphertext message. The technical problem that variable information is possibly exposed is solved.

Description

technical field [0001] The invention relates to the technical field of data transactions, in particular to a ciphertext analysis method and system for data transactions. Background technique [0002] With the rapid development of information technology, big data has become a new element of social development, a new engine of industrial development, and a new driving force of governance modernization. Reasonable use of big data can obtain various business opportunities. Therefore, data as a new asset has become inevitable. development trend. Due to different data types, real-time, reliability, quantity, quality, format, availability, and cross-border degree, data pricing is very complicated and lacks standard specifications. Establishing a unified and standardized pricing model and strategy will help form reasonable data. Price range, forming a relatively reasonable data price system. [0003] In this regard, the Chinese patent discloses a blockchain-based data asset transa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829
Inventor 周羽惠存荣贾睿石宏涛
Owner 立信(重庆)数据科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products