CN113641759A - Data privacy protection method in supply chain finance based on block chain technology - Google Patents

Data privacy protection method in supply chain finance based on block chain technology Download PDF

Info

Publication number
CN113641759A
CN113641759A CN202110932257.0A CN202110932257A CN113641759A CN 113641759 A CN113641759 A CN 113641759A CN 202110932257 A CN202110932257 A CN 202110932257A CN 113641759 A CN113641759 A CN 113641759A
Authority
CN
China
Prior art keywords
bill
channel
state
transaction
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110932257.0A
Other languages
Chinese (zh)
Inventor
王尚平
刘静毅
张亚玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Technology
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN202110932257.0A priority Critical patent/CN113641759A/en
Publication of CN113641759A publication Critical patent/CN113641759A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a block chain technology-based data privacy protection method in supply chain finance, which comprises the steps of firstly, building a Hyperhedger fabric permission chain network environment, and then deploying corresponding multiple channels according to multiple service processes existing in a supply chain finance actual scene; adding corresponding Organization to represent core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel; then designing a prepayment financing model, and deploying a chain code of a prepayment financing model applied by small and medium-sized enterprises and an access control chain code based on attributes in each channel; and finally, adding a private database into each channel, wherein only authorized organizations can see private data values, and unauthorized organizations can only see corresponding hashes. The method solves the problems that data cannot be isolated, sensitive data in an enterprise are easy to leak, and the authority of different departments in the enterprise to access information cannot be subdivided in the prior art.

Description

Data privacy protection method in supply chain finance based on block chain technology
Technical Field
The invention belongs to the technical field of block chain and supply chain finance, and particularly relates to a block chain technology-based data privacy protection method in supply chain finance.
Background
In recent years, with the continuous change of the demands, production modes and social division of the whole society, the mode of producing commodities is also changed from the integral production of a single enterprise into the cooperative production of a plurality of enterprises, so that a supply chain is formed, capital parties such as financial institutions and the like manage the fund flow of small and medium enterprises around a core enterprise, and the mode of changing the uncontrollable risk of the single enterprise into the controllable risk of the whole supply chain enterprise is called supply chain finance. Supply chain finance is mainly participated in by financial institutions, core enterprises, small and medium-sized enterprise suppliers and the like, and the problems of difficult financing and expensive financing of small and medium-sized enterprises and the defects of isolated information islands, narrow use scenes of commercial drafts and the like exist in the traditional supply chain finance at the present stage.
Since a smart group first introduces a blockchain in 2008, the application based on the blockchain technology deepens into various industries, at present, the combination of supply chain finance and the blockchain technology becomes a new development direction, the supply chain finance based on the blockchain technology mainly can solve the information island problem, and intelligent contracts are utilized to realize automatic settlement and establish a alliance chain to ensure the authenticity of participants and the like; the supply chain financial platform based on the block chain technology enables transaction data to have reliability and sharability, all information is disclosed transparently, but at the same time, the risk of disclosing business privacy of enterprises is increased, and sensitive data such as financing situations of enterprises of which the enterprises do not want to share to the enterprises with competitive relations.
In view of the above problems, it is necessary to establish a privacy protection scheme for a supply chain financial alliance chain based on block chain technology. The single-chain mode is single in the existing supply chain financial privacy protection scheme based on the block chain technology, and the single-chain mode cannot realize complete data isolation; the real scene in the supply chain is complex, and data among suppliers with competitive relations is also transparent, so that sensitive data inside an enterprise is easy to leak; and the authority of different departments in the enterprise to access the information cannot be subdivided, and the like.
Disclosure of Invention
The invention aims to provide a block chain technology-based data privacy protection method in supply chain finance, which solves the problems that data cannot be isolated, sensitive data inside an enterprise is easy to leak, and the authority of different departments in the enterprise for information access cannot be subdivided in the prior art.
The technical scheme adopted by the invention is that the block chain technology-based data privacy protection method in supply chain finance is implemented according to the following steps:
step 1, selecting a HyperLegger fabric license block chain as a bottom platform, and deploying a HyperLegger fabric license chain network on a virtual machine;
step 2, deploying corresponding multiple channels according to multiple service processes existing in the finance of an actual supply chain;
step 3, adding corresponding Organization representative core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel;
step 4, designing a prepayment financing model, and deploying intelligent contracts of the prepayment financing model for small and medium-sized enterprises in each channel;
step 5, deploying an access control intelligent contract based on the attribute on each channel to realize authority differentiation based on the attribute;
and 6, adding a function of a private database into each channel, so that only authorized organizations can see private data values, unauthorized organizations can only see corresponding hashes, and the transactions comprise two different types of transactions, namely ordinary transactions and private data transactions.
The present invention is also characterized in that,
in the step 1, a HyperLegendr Fabric license chain is selected as a building platform, a bottom environment of the HyperLegendr Fabric license chain is built on a Golang language, and a built HyperLegendr Fabric license chain network is deployed on a virtual machine Ubuntu 16.04.
The step 2 is as follows:
the method comprises the steps of analyzing a real supply chain scene, setting that a plurality of multistage suppliers exist on the supply chain, a plurality of primary suppliers of core enterprises exist, a plurality of secondary suppliers also exist in the primary suppliers, and related business processes are different for different goods channels of different suppliers, so that different channels are divided for different business processes, enterprises or organizations belonging to the same business process are divided into the same channel, and data isolation among different business processes is realized.
The step 3 is as follows:
the channel is created by constructing an initial configuration of the channel, the channel configuration is stored in a configuration block in the book, the channel configuration specifies which organizations are channel members, a new block of sort nodes is added to the channel, and a policy for managing channel updates, the most important information contained in the channel configuration file configx.yaml is the organization that is a channel member, each organization is identified by a member service provider MSP ID and a channel MSP, the channel MSP identification is stored in the channel configuration and contains certificates for identifying the organization's nodes, applications and administrators, and for an organization joining a channel, configuration is initially performed in the channel configuration file configx.yaml.
The step 4 is as follows:
step 4.1, selecting a prepayment financing scene at the upstream in a financial scene of a supply chain, a supplier initiating a financing application, a commercial bill issued on a blockchain after being confirmed by a core enterprise is taken as a certificate, the core enterprise issues the commercial bill, firstly, the transaction content, an issuer, a commercial bill number, an owner, issuing time and value are specified to create a corresponding commercial bill, the state of the commercial bill is marked as issued, then the owner of the commercial bill is recorded, the commercial bill is added into a list of all similar commercial bills in the state of an account book world, and the result returns a unique identifier of the commercial bill, wherein the unique identifier of the commercial bill is the issuer and the commercial bill number;
step 4.2, the core enterprise transfers the commercial bill to the supplier applying for financing, the process of transferring the commercial bill is that whether the owner of the current commercial bill accords with the caller of the current transaction is firstly verified, if not, the program is quitted and prompted; if the business bill is in accordance with the issued state, continuously verifying whether the business bill is in accordance with the issued state, if the business bill is in accordance with the issued state, exiting the program and prompting that the business bill is not issued, if the business bill is in accordance with the issued state, marking the state of the business bill as a tradable state, checking that the business bill is in the tradable state and is not redeemed, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
4.3, the financial institution purchases the commercial bill to put money on the supplier applying for financing, and the financial institution firstly verifies whether the current commercial bill owner accords with the caller of the current transaction through the process of purchasing the commercial bill from the bill owner, and quits the program and prompts if not; if the business bill is in accordance with the redeemable state, continuously verifying whether the business bill is in accordance with the transactable state, if the business bill is in accordance with the redeemable state, quitting the program and prompting that the business bill is in incorrect state, if the business bill is in accordance with the redeemable state, marking the state of the business bill as the redeemable state, checking that the business bill is in the redeemable state again and is not redeemable, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
and 4.4, after the core enterprise receives goods and sells acquired funds, through the process of redeeming the commercial bill to the financial institution, firstly verifying whether the commercial bill accords with the redeemed state, if so, quitting the program and prompting, if not, continuously verifying whether the core enterprise redeeming the commercial bill is set as a new owner by the holder, if so, setting the bill owner as an issuer thereof, marking the state of the commercial bill as the redeemed state, recording the transaction time, updating the commercial bill in the world state account book, and finally, returning the commercial bill.
The step 5 is as follows:
step 5.1, in the attribute-based access control, for each body, the body ID, i.e., SID, and its attribute are stored together, SA: represents a body attribute, namely, SubjectAttribute, and the body attribute includes three types: status, level at supply chain finance, channel, SnA corresponds to objectnAn associated set of attributes;
step 5.2, in the attribute-based access control, for each object, the attribute is represented as OA, OnA corresponds to objectnAssociated setCollecting attributes;
step 5.3 in Attribute-based Access control, Pn: storage policy, policyID or PnID is a necessary field to store attributes, for each policy, the attribute (P)nSA,PnOA) are stored together;
step 5.4, subject Attribute S from steps 5.1, 5.2, 5.3nA. Object attribute OnA. The policy Pn makes a decision whether to allow access.
The step 6 is as follows:
step 6.1, the common transaction flow is that the client sends a transaction proposal to an endorsement node, the endorsement node returns to the client after simulation verification, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, then broadcasts the transaction to other nodes, and finally writes the transaction into an account book;
and 6.2, the private data transaction process is that the client sends a transaction proposal to an endorsement node, wherein private data is sent in a temporary domain of the proposal, the endorsement node stores the private data in a temporary storage library, sends the private data transaction to an authorization node through a network protocol gossip according to a private transaction set strategy, and sends a response executed by public data through the transaction proposal back to the client, wherein the response also comprises a private data key and hash of a value, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, broadcasts the transaction to other nodes, and finally writes the transaction into the world state of an account book.
The block chain technology-based data privacy protection method in supply chain finance has the advantages that electronic commercial bills are used as the certificates for financing on the block chain, the problems that second-level and third-level enterprises in traditional supply chain finance are difficult to finance and expensive to finance are solved, the issuing, purchasing, transferring and redeeming transactions of the electronic bills are achieved through intelligent contracts, the transactions are recorded on the block chain, information transparency is achieved, wind control cost can be reduced for management of supply chain finance to a great extent, and convenience is provided. A privacy protection scheme of data in supply chain finance based on Hyperridge fabric is designed on the basis of the model, a plurality of business processes exist in a real supply chain finance scene, and data isolation is realized by using the characteristic of multiple channels. Secondly, a private data set is established, for some sensitive private data, only authorized enterprises can record and access the private data in the own account book, and an access control rule based on attributes is used, so that the data access permissions of multi-level suppliers are different.
Drawings
FIG. 1 is a flow chart of a prepayment financing service based on Hyperridge fabric according to the present invention;
FIG. 2 is a diagram of a supply chain financial scenario for a Hyperridge fabric-based multi-service process as simulated in accordance with the present invention;
FIG. 3 is a view of a scenario simulated in FIG. 2, and the present invention is directed to a data privacy protection architecture diagram in Hyperridge fabric-based supply chain finance.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention relates to a block chain technology-based data privacy protection method in supply chain finance, which is implemented according to the following steps, wherein a flow chart is shown in figure 1:
step 1, selecting a HyperLegger fabric license block chain as a bottom platform, and deploying a HyperLegger fabric license chain network on a virtual machine;
the HyperLegendric license chain is selected as the building platform in step 1, because it is the first open source item of the federation chain, and it uses pluggable components to solve enterprise-level problems. The HyperLegendric license chain underlying environment is constructed on the Golang language, and the constructed HyperLegendric license chain network is deployed on the virtual machine Ubuntu 16.04.
Step 2, deploying corresponding multiple channels according to multiple business processes existing in the finance of an actual supply chain so as to realize data isolation among different business processes;
the step 2 is as follows:
the method comprises the steps of analyzing a real supply chain scene, setting that a plurality of multistage suppliers exist on the supply chain, a plurality of primary suppliers of core enterprises exist, a plurality of secondary suppliers also exist in the primary suppliers, and related business processes are different for different goods channels of different suppliers, so that different channels are divided for different business processes, enterprises or organizations belonging to the same business process are divided into the same channel, and data isolation among different business processes is realized.
Step 3, adding corresponding Organization representative core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel;
the step 3 is as follows:
the channel is created by constructing an initial configuration of the channel, the channel configuration is stored in a configuration block in the book, the channel configuration specifies which organizations are channel members, a new block of sort nodes is added to the channel, and a policy for managing channel updates, the most important information contained in the channel configuration file configx.yaml is the organization that is a channel member, each organization is identified by a member service provider MSP ID and a channel MSP, the channel MSP identification is stored in the channel configuration and contains certificates for identifying the organization's nodes, applications and administrators, and for an organization joining a channel, configuration is initially performed in the channel configuration file configx.yaml.
Step 4, designing a prepayment financing model, and deploying intelligent contracts of the prepayment financing model for small and medium-sized enterprises in each channel;
the step 4 is as follows:
step 4.1, selecting the upstream pre-payment financing scene in the financial scene of the supply chain, the supplier initiates the financing application, the business bill issued on the blockchain after being confirmed by the core enterprise is used as a voucher, the core enterprise issues the business bill, firstly, the transaction content, the issuer, the number of the business bill, the owner, the issuing time and the value are specified to create the corresponding business bill, for the purpose of distinguishing and successfully executing subsequent transactions, the status of the commercial bill is marked as issued, the owner of the business ticket is then recorded, the business ticket is added to a list of all similar business tickets in the ledger world state (world state is a database that stores a set of current values of ledger state through which programs can directly access a current value of ledger state), the result returns the unique identification of the commercial bill, and the unique identification of the commercial bill is the serial number of the issuer and the commercial bill;
step 4.2, the core enterprise transfers the commercial bill to the supplier applying for financing, the process of transferring the commercial bill is that whether the owner of the current commercial bill accords with the caller of the current transaction is firstly verified, if not, the program is quitted and prompted; if the business bill is in accordance with the issued state, continuously verifying whether the business bill is in accordance with the issued state, if the business bill is in accordance with the issued state, exiting the program and prompting that the business bill is not issued, if the business bill is in accordance with the issued state, marking the state of the business bill as a tradable state, checking that the business bill is in the tradable state and is not redeemed, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
step 4.3, the financial institution purchases the commercial bill to pay for the supplier applying for financing, and the financial institution firstly verifies whether the current commercial bill owner accords with the caller of the current transaction through the process of purchasing the commercial bill from the bill owner (the money transfer mode is not considered in the text), and if not, quits the program and prompts; if the business bill is in accordance with the redeemable state, continuously verifying whether the business bill is in accordance with the transactable state, if the business bill is in accordance with the redeemable state, quitting the program and prompting that the business bill is in incorrect state, if the business bill is in accordance with the redeemable state, marking the state of the business bill as the redeemable state, checking that the business bill is in the redeemable state again and is not redeemable, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
and 4.4, after the core enterprise receives goods and sells the obtained funds, through a process of redeeming the commercial bill to the financial institution (the mode of money transfer is not considered in the text), firstly verifying whether the commercial bill conforms to the redeemed state, if so, quitting the program and prompting, if not, continuously verifying whether the holder is the core enterprise which redeems the commercial bill to be set as a new holder, if so, setting the bill owner as the issuer of the holder, marking the state of the commercial bill as the redeemed state, recording the transaction time, updating the commercial bill in the world state account book, and finally, returning the commercial bill.
Step 5, deploying an access control intelligent contract based on the attribute on each channel to realize authority differentiation based on the attribute;
the step 5 is as follows:
step 5.1, in the attribute-based access control, for each body, the body ID, i.e., SID, and its attribute are stored together, SA: represents a body attribute, namely, SubjectAttribute, and the body attribute includes three types: status, level at supply chain finance, channel, SnA corresponds to subjectnAn associated set of attributes;
step 5.2, in the attribute-based access control, for each object (resource), the attribute is represented as OA (ObjectAttribute), OnA corresponds to objectnAn associated set of attribute sets;
step 5.3 in Attribute-based Access control, Pn(Policy): storage policy, policyID or PnID is a necessary field to store attributes, for each policy, the attribute (P)nSA,PnOA) are stored together;
step 5.4, subject Attribute S from steps 5.1, 5.2, 5.3nA. Object attribute OnA. Policy PnA decision is made whether to allow access.
And 6, adding a function of a private database into each channel, so that only authorized organizations can see private data values, unauthorized organizations can only see corresponding hashes, and the transactions comprise two different types of transactions, namely ordinary transactions and private data transactions.
The step 6 is as follows:
step 6.1, the common transaction flow is that the client sends a transaction proposal to an endorsement node, the endorsement node returns to the client after simulation verification, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, then broadcasts the transaction to other nodes, and finally writes the transaction into an account book;
and 6.2, the private data transaction process is that the client sends a transaction proposal to an endorsement node, wherein private data is sent in a temporary domain of the proposal, the endorsement node stores the private data in a temporary storage library, sends the private data transaction to an authorization node through a network protocol gossip according to a private transaction set strategy, and sends a response executed by public data through the transaction proposal back to the client, wherein the response also comprises a private data key and hash of a value, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, broadcasts the transaction to other nodes, and finally writes the transaction into the world state of an account book.
Private data mentioned in step 6.2 is the deployment of a private data collector on the channel, and the collector defines which nodes can hold data, to which nodes the data is distributed, how many nodes can propagate the private data and how long the private data is stored in the private database.
A data privacy protection method in supply chain finance based on a block chain technology is characterized in that a pre-payment financing model combined with a block chain is designed by referring to a commercial bill under the scene of pre-payment financing in the supply chain finance, the data privacy protection method is provided on the basis of the model, and data isolation is realized by means of the multi-channel characteristic in a HyperLegendr fabric licensing chain. In addition, private data characteristics are set to support privacy protection of transaction granularity, an authorized party of the transaction is appointed when the transaction is sent, the details of the transaction are only stored in the authorized party, and the Hash of the private data is stored after the private data is identified in the whole network, so that the effective isolation of the private data is guaranteed, and the authenticity of the private data can be verified. Besides, ABAC (attribute-based access control) technology is utilized to provide finer-grained data protection, and privacy protection of data in supply chain finance can be effectively achieved through the method.
Examples
Step 1, simulating an actual scene in the financial reality of a supply chain, as shown in fig. 2, there may be 3 business processes in the financial scene of the actual supply chain, different dashed solid lines represent different processes, and the business process 1 includes a core enterprise (O1, Organization1), a primary provider a (O2, Organization2), a secondary provider a (O4, Organization4), a tertiary provider a (O6, Organization6), and a financial institution (O9, Organization 9); business process 2 includes core enterprise (O1, Organization1), primary supplier a (O2, Organization2), secondary supplier B (O5, Organization5), tertiary supplier B (O7, Organization7), financial institution (O9, Organization 9); business process 3 includes core enterprise (O1, Organization1), primary supplier B (O3, Organization3), secondary supplier a (O4, Organization4), secondary supplier B (O5, Organization5), tertiary supplier C (O8, Organization8), financial institution (O9, Organization 9); building a corresponding network on the Hyperridge fabric according to different service flows;
step 2, building corresponding multiple channels according to multiple service flows stored in the actual supply chain finance to realize data isolation among different service flows, and aiming at the supply chain finance scene of 3 service flows simulated in fig. 1, the corresponding 3 channels are deployed as shown in fig. 2 and are respectively represented by different dotted and solid lines, wherein the service flow 1 corresponds to a Channel C1(Channel1), the service flow 2 corresponds to a Channel C2(Channel2), and the service flow 3 corresponds to a Channel C3(Channel 3).
Step 3, adding corresponding Organization into the channel to represent core enterprises, small and medium-sized enterprises applying for financing and financial institutions respectively, wherein the channel has different organizations o as shown in fig. 2nWherein the organization contained in Channel 1(Channel1) is O1, O2, O4, O6 and O9, each of which contributes a node PeernThe corresponding nodes in the channel1 include Peer1, Peer2, Peer4, Peer6 and Peer9, each node needs to maintain the Ledger (leader) of the corresponding channel, and the Ledger maintained by the channel1 is L1. Each channel also needs to deploy a corresponding system chain code, ChainCode, the system chain code corresponding to channel1 is CC1, and the organization, nodes and chain codes mentioned in channel 2(C2) and channel 3(C3) are similar to channel 1.
Step 4, an attribute-based access control chain code is deployed on each channel to realize attribute-based permission differentiation, for example, in the network architecture in fig. 2, each channel deploys an ABAC Chaincode (attribute-based access control chain code) and a link Ordering service (Ordering service), and when a client submits a transaction, whether the transaction is allowed to be executed is determined by the deployed ABAC Chaincode.
Step 5, adding a function of a private database in each Channel, so that only authorized organizations can see data values, unauthorized organizations can only see corresponding hashes, the transactions include two different types of transactions, namely ordinary transactions and private data transactions, the authorized node and the unauthorized node databases are respectively shown as Peer1 and Peer7 nodes in fig. 2, an account book L2 of the Peer1 includes a world State and a block, the world State includes a Channel State and a private data State private State, the Channel State includes hashes of public data and private data, and the private data State includes real values of the private data. The book L2 of Peer7 includes world state and block, but the world state includes only one channel state, so unauthorized nodes cannot query the real value of private data.
Step 6, designing a prepayment financing model based on Hyperridge fabric license chain, deploying an intelligent contract of small and medium-sized enterprises applying for the prepayment financing model in each channel, and the flow chart of the prepayment financing business is shown in FIG. 3.
And 6.1, signing a large order by the supplier and the core enterprise, wherein the supplier needs to provide goods for the core enterprise, but the fund is insufficient to produce the goods, and financing needs to be applied to maintain the operation of the enterprise, so that financing application is initiated to the core enterprise to overcome the short-term financing requirement. As shown in step 1 of figure 3,
step 6.2, the core enterprise makes an analysis according to the actual situation (for example, whether the supplier applying for financing has the information of making an order with the enterprise, etc.), and if the examination is passed, a business bill is issued on the block chain, and the issued business bill is used as a voucher, as shown in step 2 in fig. 3;
step 6.3, after step 6.2, the core enterprise transfers the commercial bill to the supplier applying for financing, and the supplier applying for financing obtains the required fund by selling the commercial bill, as shown in step 3 in fig. 3;
step 6.4, after step 6.3, the financial institution considers that the core enterprise issued, so the commercial instrument is reputable, so that by evaluating in the short term, a profit can be obtained therefrom, the financial institution will be able to obtain the financial institution's funds for purchasing the commercial instrument by purchasing the commercial instrument from the instrument holder on the blockchain, as shown in step 4 in fig. 3;
step 6.5, after step 6.4, the core enterprise, upon receipt and sale of the goods, takes the corresponding payment for the goods and redeems the then issued commercial instrument through the blockchain platform to the financial institution within the term, as shown in step 5 of fig. 3.

Claims (7)

1. The method for protecting data privacy in supply chain finance based on a block chain technology is characterized by comprising the following steps:
step 1, selecting a HyperLegger fabric license block chain as a bottom platform, and deploying a HyperLegger fabric license chain network on a virtual machine;
step 2, deploying corresponding multiple channels according to multiple service processes existing in the finance of an actual supply chain;
step 3, adding corresponding Organization representative core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel;
step 4, designing a prepayment financing model, and deploying intelligent contracts of the prepayment financing model for small and medium-sized enterprises in each channel;
step 5, deploying an access control intelligent contract based on the attribute on each channel to realize authority differentiation based on the attribute;
and 6, adding a function of a private database into each channel, so that only authorized organizations can see private data values, unauthorized organizations can only see corresponding hashes, and the transactions comprise two different types of transactions, namely ordinary transactions and private data transactions.
2. The method for protecting data privacy in supply chain finance based on the block chain technology, according to claim 1, is characterized in that in the step 1, a HyperLegendr Fabric license chain is selected as a building platform, a bottom environment of the HyperLegendr Fabric license chain is built on a Golang language, and a built HyperLegendr Fabric license chain network is deployed on a virtual machine Ubuntu 16.04.
3. The method according to claim 2, wherein the step 2 is as follows:
the method comprises the steps of analyzing a real supply chain scene, setting that a plurality of multistage suppliers exist on the supply chain, a plurality of primary suppliers of core enterprises exist, a plurality of secondary suppliers also exist in the primary suppliers, and related business processes are different for different goods channels of different suppliers, so that different channels are divided for different business processes, enterprises or organizations belonging to the same business process are divided into the same channel, and data isolation among different business processes is realized.
4. The method according to claim 3, wherein the step 3 is as follows:
the channel is created by constructing an initial configuration of the channel, the channel configuration is stored in a configuration block in the book, the channel configuration specifies which organizations are channel members, a new block of sort nodes is added to the channel, and a policy for managing channel updates, the most important information contained in the channel configuration file configx.yaml is the organization that is a channel member, each organization is identified by a member service provider MSP ID and a channel MSP, the channel MSP identification is stored in the channel configuration and contains certificates for identifying the organization's nodes, applications and administrators, and for an organization joining a channel, configuration is initially performed in the channel configuration file configx.yaml.
5. The method according to claim 4, wherein the step 4 is as follows:
step 4.1, selecting a prepayment financing scene at the upstream in a financial scene of a supply chain, a supplier initiating a financing application, a commercial bill issued on a blockchain after being confirmed by a core enterprise is taken as a certificate, the core enterprise issues the commercial bill, firstly, the transaction content, an issuer, a commercial bill number, an owner, issuing time and value are specified to create a corresponding commercial bill, the state of the commercial bill is marked as issued, then the owner of the commercial bill is recorded, the commercial bill is added into a list of all similar commercial bills in the state of an account book world, and the result returns a unique identifier of the commercial bill, wherein the unique identifier of the commercial bill is the issuer and the commercial bill number;
step 4.2, the core enterprise transfers the commercial bill to the supplier applying for financing, the process of transferring the commercial bill is that whether the owner of the current commercial bill accords with the caller of the current transaction is firstly verified, if not, the program is quitted and prompted; if the business bill is in accordance with the issued state, continuously verifying whether the business bill is in accordance with the issued state, if the business bill is in accordance with the issued state, exiting the program and prompting that the business bill is not issued, if the business bill is in accordance with the issued state, marking the state of the business bill as a tradable state, checking that the business bill is in the tradable state and is not redeemed, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
4.3, the financial institution purchases the commercial bill to put money on the supplier applying for financing, and the financial institution firstly verifies whether the current commercial bill owner accords with the caller of the current transaction through the process of purchasing the commercial bill from the bill owner, and quits the program and prompts if not; if the business bill is in accordance with the redeemable state, continuously verifying whether the business bill is in accordance with the transactable state, if the business bill is in accordance with the redeemable state, quitting the program and prompting that the business bill is in incorrect state, if the business bill is in accordance with the redeemable state, marking the state of the business bill as the redeemable state, checking that the business bill is in the redeemable state again and is not redeemable, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
and 4.4, after the core enterprise receives goods and sells acquired funds, through the process of redeeming the commercial bill to the financial institution, firstly verifying whether the commercial bill accords with the redeemed state, if so, quitting the program and prompting, if not, continuously verifying whether the holder is the core enterprise setting the redeemed commercial bill as a new holder, if so, setting the bill holder as an issuer thereof, marking the state of the commercial bill as the redeemed state, recording the transaction time, updating the commercial bill in the world state book, and finally, returning the commercial bill.
6. The method according to claim 5, wherein the step 5 is as follows:
step 5.1, in the attribute-based access control, for each body, the body ID, i.e., SID, and its attribute are stored together, SA: representing a Subject Attribute, namely, Subject Attribute, the Subject Attribute includes three types: status, level at supply chain finance, channel, SnA corresponds to subjectnAn associated set of attributes;
step 5.2, in the attribute-based access control, for each object, the attribute is represented as OA, OnA corresponds to objectnAn associated set of attribute sets;
step 5.3 in Attribute-based Access control, Pn: storage Policy, Policy ID or PnID is a necessary field to store attributes, for each policy, the attribute (P)nSA,PnOA) are stored together;
step 5.4, subject Attribute S from steps 5.1, 5.2, 5.3nA. Object attribute OnA. Policy PnA decision is made whether to allow access.
7. The method according to claim 6, wherein the step 6 is as follows:
step 6.1, the common transaction flow is that the client sends a transaction proposal to an endorsement node, the endorsement node returns to the client after simulation verification, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, then broadcasts the transaction to other nodes, and finally writes the transaction into an account book;
and 6.2, the private data transaction process is that the client sends a transaction proposal to an endorsement node, wherein private data is sent in a temporary domain of the proposal, the endorsement node stores the private data in a temporary storage library, sends the private data transaction to an authorization node through a network protocol gossip according to a private transaction set strategy, and sends a response executed by public data through the transaction proposal back to the client, wherein the response also comprises a private data key and hash of a value, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, broadcasts the transaction to other nodes, and finally writes the transaction into the world state of an account book.
CN202110932257.0A 2021-08-13 2021-08-13 Data privacy protection method in supply chain finance based on block chain technology Withdrawn CN113641759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110932257.0A CN113641759A (en) 2021-08-13 2021-08-13 Data privacy protection method in supply chain finance based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110932257.0A CN113641759A (en) 2021-08-13 2021-08-13 Data privacy protection method in supply chain finance based on block chain technology

Publications (1)

Publication Number Publication Date
CN113641759A true CN113641759A (en) 2021-11-12

Family

ID=78421644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110932257.0A Withdrawn CN113641759A (en) 2021-08-13 2021-08-13 Data privacy protection method in supply chain finance based on block chain technology

Country Status (1)

Country Link
CN (1) CN113641759A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115310886A (en) * 2022-10-12 2022-11-08 广东省科技基础条件平台中心 Enterprise hatching management system and method based on block chain
CN116366273A (en) * 2022-09-09 2023-06-30 简单汇信息科技(广州)有限公司 Private data sending method based on blockchain
CN117436811A (en) * 2023-11-01 2024-01-23 成都安美勤信息技术股份有限公司 Electronic bill management method and system based on privacy protection

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116366273A (en) * 2022-09-09 2023-06-30 简单汇信息科技(广州)有限公司 Private data sending method based on blockchain
CN116366273B (en) * 2022-09-09 2023-11-17 简单汇信息科技(广州)有限公司 Private data sending method based on blockchain
CN115310886A (en) * 2022-10-12 2022-11-08 广东省科技基础条件平台中心 Enterprise hatching management system and method based on block chain
CN117436811A (en) * 2023-11-01 2024-01-23 成都安美勤信息技术股份有限公司 Electronic bill management method and system based on privacy protection
CN117436811B (en) * 2023-11-01 2024-05-07 成都安美勤信息技术股份有限公司 Electronic bill management method and system based on privacy protection

Similar Documents

Publication Publication Date Title
CN110599181B (en) Data processing method, device and equipment based on block chain and storage medium
TWI768163B (en) Method and device for generating smart contracts
CN109863719B (en) Method and system for controlling transfer through block chain
CN113641759A (en) Data privacy protection method in supply chain finance based on block chain technology
CN108805707A (en) Works copyright revenue distribution method and device based on block chain
CN118037290A (en) System and method for block chain implementation
CN110232507B (en) Intelligent contract-based crowdsourcing activity overall process supervision method and system
CN109191219A (en) About the data processing method of electronic bill, device, storage medium and equipment
CN111461870A (en) Supply chain financial credit increasing method based on block chain
CN111161017A (en) Cloud marketing system and method based on mobile terminal and block chain
Yadav et al. An IAD type framework for Blockchain enabled smart tourism ecosystem
CN109783653A (en) A kind of inquiry system of management and the retrospect of the knowledge mapping based on block chain technology
CN110599348B (en) Method, device, equipment and storage medium for stock right incentive
KR102093291B1 (en) Managerial system for culture contents based on the block chain
CN111899046A (en) Digital rights benefit evidence and intelligent rights management method and system based on block chain technology
Preece et al. Blockchain technology as a mechanism for digital railway ticketing
CN109377352A (en) A kind of wisdom chemical industrial park data increasing letter method based on block chain
US20230134095A1 (en) Systems, devices and methods for tracking authenticated clean energy with blockchains
Kanani et al. Matic whitepaper
CN113221191B (en) Block chain-based data evidence storage method, device, equipment and storage medium
CN111210339A (en) Enterprise credit transfer method and device based on block chain electronic invoice
CN108460596B (en) Quantization value distribution transfer method based on block chain
Chaabna et al. Analysis of the State of E-commerce in Algeria
CN110727735A (en) Method, device and equipment for cooperatively completing task event based on block chain technology
CN116308377A (en) Account management method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211112