BLOCKCHAIN-BASED TRUSTED TRANSACTION METHOD FOR DATA PRODUCT
20220309501 · 2022-09-29
Inventors
- Jun Guo (Fuzhou, Fujian, CN)
- Li Fu (Fuzhou, Fujian, CN)
- Zhou Zheng (Fuzhou, Fujian, CN)
- Minglong Zhang (Fuzhou, Fujian, CN)
- Yuyou Weng (Fuzhou, Fujian, CN)
- Wei Xie (Fuzhou, Fujian, CN)
- Chenxiang Lin (Fuzhou, Fujian, CN)
- Guoqing Lin (Fuzhou, Fujian, CN)
- Teng Ma (Fuzhou, Fujian, CN)
- Jianye Huang (Fuzhou, Fujian, CN)
- Bingqian Liu (Fuzhou, Fujian, CN)
- Shuang Lin (Fuzhou, Fujian, CN)
Cpc classification
Y04S10/50
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
G06Q20/02
PHYSICS
International classification
G06Q20/40
PHYSICS
H04L9/00
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
The present disclosure relates to a blockchain-based trusted transaction method for a data product, including identity authentication based on a blockchain, creation of an identity code for a data asset, transaction of data, uploading of an enterprise authorization letter to the blockchain, and generation of a data right-confirmation letter. The present disclosure can build a trusted power-system data-transaction platform, help data confirm rights, promote circulation, transaction, and sharing of data, improve data authenticity, and realize efficient, stable, safe and reliable data assetization.
Claims
1. A blockchain-based trusted transaction method for a data product, comprising: identity authentication based on a blockchain: generating a pair of a public key and a private key when an enterprise is registered as a user of an operation platform, and uploading enterprise identity information and the public key to the blockchain, wherein the public key is used to identify an identity of a user in a system, and the private key is used for digital signing; creation of an identity code for a data asset: broadcasting, when a data provider releases a product, abstract information of the data asset to determine an ownership of the data asset, creating the identity code for the data asset, and uploading the abstract information and the identity code of the data asset to the blockchain; transaction of data: completing, by a data buyer, a settlement process in which data is purchased through a payment channel, reaching, by the data buyer and the data provider, a transaction contract, uploading data transaction information to the blockchain, and obtaining, by the data buyer, data call authority; uploading of an enterprise authorization letter to the blockchain: uploading, by the data buyer, the enterprise authorization letter on the operation platform, and uploading a hash value of the enterprise authorization letter to the blockchain for proof after a data operator approves the enterprise authorization letter; and generation of a data right-confirmation letter: submitting, by the data buyer, an access request, digitally signing access request information, calling, by the operation platform, the blockchain to verify data access authority, downloading a report or querying a page after the verification is successful, uploading data query result information to the blockchain for proof, and generating the data right-confirmation letter.
2. The blockchain-based trusted transaction method for a data product according to claim 1, wherein the transaction of data further comprises offline transaction, which specifically comprises: processing, by the data buyer, order information on the platform after the data buyer and the data provider reach an offline transaction contract and complete payment, uploading the order information to the blockchain, and obtaining, by the data buyer, the data call authority.
3. The blockchain-based trusted transaction method for a data product according to claim 1, further comprising transaction tracing query: querying, by the data provider, transaction information of the data asset by inputting the identity code of the data asset; and querying, by the data buyer, tracing information of the data asset by inputting the identity code of the data asset.
4. The blockchain-based trusted transaction method for a data product according to claim 1, wherein the abstract information of the data asset comprises a summary of the product, a service manner, and a digital signature of the data provider.
5. The blockchain-based trusted transaction method for a data product according to claim 1, wherein the data transaction information comprises the identity code of the data asset, data product description, a product delivery mode, a number of times, an amount, the data provider, the data buyer, and a transaction time.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0019]
DETAILED DESCRIPTION
[0020] The present disclosure is further described in detail with reference to the accompanying drawings and examples.
[0021] It should be noted that the following detailed description is exemplary and is intended to provide further description of the present disclosure. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skilled in the art to which the present disclosure pertains.
[0022] It should be noted that the terms used herein are merely used for describing the specific implementations, but are not intended to limit exemplary implementations of the present application. As used herein, the singular forms are intended to include the plural forms as well, unless the context clearly indicates otherwise, and also, it should be understood that when the terms “include” and/or “including” are used in this specification, they indicate that there are features, steps, operations, devices, elements, and/or combinations thereof.
[0023] As shown in
[0024] identity authentication based on a blockchain: generating a pair of a public key and a private key when an enterprise is registered as a user of an operation platform, and uploading enterprise identity information and the public key to the blockchain, where the public key is used to identify an identity of a user in a system, and the private key is used for digital signing, so that the authenticity of the user's identity can be ensured, and a recipient of the data can confirm the source of the data and prevent it from being forged;
[0025] creation of an identity code for a data asset: broadcasting, when a data provider releases a product (financial credit or environmental protection), abstract information of the data asset to determine an ownership of the data asset, creating the identity code for the data asset, and uploading the abstract information and the identity code of the data asset to the blockchain, to ensure that the identity of the data can be checked and traced;
[0026] transaction of data: completing, by a data buyer, a settlement process in which data is purchased through a payment channel, reaching, by the data buyer and a data provider, a transaction contract, uploading data transaction information to the blockchain, and obtaining, by the data buyer, data call authority;
[0027] uploading of an enterprise authorization letter to the blockchain: uploading, by the data buyer, the enterprise authorization letter on the operation platform, and uploading a hash value of the enterprise authorization letter to the blockchain for proof after a data operator approves the enterprise authorization letter; and
[0028] generation of a data right-confirmation letter: submitting, by the data buyer, an access request, digitally signing access request information, calling, by the operation platform, the blockchain to verify data access authority after the request received by the operation platform is verified valid, downloading a report or querying a page after the verification is successful, uploading data query result information (a data report of hash values, the data provider, the data buyer, a query time, and the like) to the blockchain for proof, and generating the data right-confirmation letter.
[0029] In this embodiment, the transaction of data further includes an offline transaction mode that is specifically: maintaining information such as a delivery manner, an effective number of times, and a validity period after the data buyer and the data provider reach an offline transaction contract and complete payment, processing, by the data buyer, order information on the platform, uploading the order information to the blockchain, and obtaining, by the data buyer, the data call authority.
[0030] In this embodiment, the blockchain-based trusted transaction method for a data product further includes transaction tracing query. Record information, full-process transaction information, user information of the data asset are acquired. The acquired data is correlated, analyzed, and presented. The source of the data asset is traced and queried, and the transaction information of the data asset is also queried, including the data provider and the data buyer. The transaction tracing query specifically include:
[0031] querying, by the data provider, transaction information of the data asset by inputting the identity code of the data asset; and
[0032] querying, by the data buyer, tracing information of the data asset by inputting the identity code of the data asset.
[0033] In this embodiment, the abstract information of the data asset includes a summary of the product, a service manner, and a digital signature of the data provider.
[0034] In this embodiment, the data transaction information includes the identity code of the data asset, data product description, a product delivery mode, a number of times, an amount, the data provider, the data buyer, and a transaction time.
[0035] According to the method in this embodiment, considering application objects and functions, the external network data operation platforms are combined with the blockchain technology, to build a trusted data-transaction platform, help data confirm rights, promote circulation, transaction, and sharing of data, improve data authenticity, and realize efficient, stable, safe and reliable data assetization.
[0036] The above described are merely preferred embodiments of the present disclosure, which are not intended to limit the present disclosure in other forms. Any person skilled in the art may change or modify the technical content disclosed above into an equivalent. Any simple amendment or equivalent change and modification of the above embodiment made according to the technical essence of the present disclosure without departing from the content of the technical solution of the present disclosure shall fall within the protection scope of the technical solution of the present disclosure.