CN113641759A - Data privacy protection method in supply chain finance based on block chain technology - Google Patents
Data privacy protection method in supply chain finance based on block chain technology Download PDFInfo
- Publication number
- CN113641759A CN113641759A CN202110932257.0A CN202110932257A CN113641759A CN 113641759 A CN113641759 A CN 113641759A CN 202110932257 A CN202110932257 A CN 202110932257A CN 113641759 A CN113641759 A CN 113641759A
- Authority
- CN
- China
- Prior art keywords
- bill
- channel
- state
- transaction
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a block chain technology-based data privacy protection method in supply chain finance, which comprises the steps of firstly, building a Hyperhedger fabric permission chain network environment, and then deploying corresponding multiple channels according to multiple service processes existing in a supply chain finance actual scene; adding corresponding Organization to represent core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel; then designing a prepayment financing model, and deploying a chain code of a prepayment financing model applied by small and medium-sized enterprises and an access control chain code based on attributes in each channel; and finally, adding a private database into each channel, wherein only authorized organizations can see private data values, and unauthorized organizations can only see corresponding hashes. The method solves the problems that data cannot be isolated, sensitive data in an enterprise are easy to leak, and the authority of different departments in the enterprise to access information cannot be subdivided in the prior art.
Description
Technical Field
The invention belongs to the technical field of block chain and supply chain finance, and particularly relates to a block chain technology-based data privacy protection method in supply chain finance.
Background
In recent years, with the continuous change of the demands, production modes and social division of the whole society, the mode of producing commodities is also changed from the integral production of a single enterprise into the cooperative production of a plurality of enterprises, so that a supply chain is formed, capital parties such as financial institutions and the like manage the fund flow of small and medium enterprises around a core enterprise, and the mode of changing the uncontrollable risk of the single enterprise into the controllable risk of the whole supply chain enterprise is called supply chain finance. Supply chain finance is mainly participated in by financial institutions, core enterprises, small and medium-sized enterprise suppliers and the like, and the problems of difficult financing and expensive financing of small and medium-sized enterprises and the defects of isolated information islands, narrow use scenes of commercial drafts and the like exist in the traditional supply chain finance at the present stage.
Since a smart group first introduces a blockchain in 2008, the application based on the blockchain technology deepens into various industries, at present, the combination of supply chain finance and the blockchain technology becomes a new development direction, the supply chain finance based on the blockchain technology mainly can solve the information island problem, and intelligent contracts are utilized to realize automatic settlement and establish a alliance chain to ensure the authenticity of participants and the like; the supply chain financial platform based on the block chain technology enables transaction data to have reliability and sharability, all information is disclosed transparently, but at the same time, the risk of disclosing business privacy of enterprises is increased, and sensitive data such as financing situations of enterprises of which the enterprises do not want to share to the enterprises with competitive relations.
In view of the above problems, it is necessary to establish a privacy protection scheme for a supply chain financial alliance chain based on block chain technology. The single-chain mode is single in the existing supply chain financial privacy protection scheme based on the block chain technology, and the single-chain mode cannot realize complete data isolation; the real scene in the supply chain is complex, and data among suppliers with competitive relations is also transparent, so that sensitive data inside an enterprise is easy to leak; and the authority of different departments in the enterprise to access the information cannot be subdivided, and the like.
Disclosure of Invention
The invention aims to provide a block chain technology-based data privacy protection method in supply chain finance, which solves the problems that data cannot be isolated, sensitive data inside an enterprise is easy to leak, and the authority of different departments in the enterprise for information access cannot be subdivided in the prior art.
The technical scheme adopted by the invention is that the block chain technology-based data privacy protection method in supply chain finance is implemented according to the following steps:
step 1, selecting a HyperLegger fabric license block chain as a bottom platform, and deploying a HyperLegger fabric license chain network on a virtual machine;
step 2, deploying corresponding multiple channels according to multiple service processes existing in the finance of an actual supply chain;
step 3, adding corresponding Organization representative core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel;
step 4, designing a prepayment financing model, and deploying intelligent contracts of the prepayment financing model for small and medium-sized enterprises in each channel;
step 5, deploying an access control intelligent contract based on the attribute on each channel to realize authority differentiation based on the attribute;
and 6, adding a function of a private database into each channel, so that only authorized organizations can see private data values, unauthorized organizations can only see corresponding hashes, and the transactions comprise two different types of transactions, namely ordinary transactions and private data transactions.
The present invention is also characterized in that,
in the step 1, a HyperLegendr Fabric license chain is selected as a building platform, a bottom environment of the HyperLegendr Fabric license chain is built on a Golang language, and a built HyperLegendr Fabric license chain network is deployed on a virtual machine Ubuntu 16.04.
The step 2 is as follows:
the method comprises the steps of analyzing a real supply chain scene, setting that a plurality of multistage suppliers exist on the supply chain, a plurality of primary suppliers of core enterprises exist, a plurality of secondary suppliers also exist in the primary suppliers, and related business processes are different for different goods channels of different suppliers, so that different channels are divided for different business processes, enterprises or organizations belonging to the same business process are divided into the same channel, and data isolation among different business processes is realized.
The step 3 is as follows:
the channel is created by constructing an initial configuration of the channel, the channel configuration is stored in a configuration block in the book, the channel configuration specifies which organizations are channel members, a new block of sort nodes is added to the channel, and a policy for managing channel updates, the most important information contained in the channel configuration file configx.yaml is the organization that is a channel member, each organization is identified by a member service provider MSP ID and a channel MSP, the channel MSP identification is stored in the channel configuration and contains certificates for identifying the organization's nodes, applications and administrators, and for an organization joining a channel, configuration is initially performed in the channel configuration file configx.yaml.
The step 4 is as follows:
step 4.1, selecting a prepayment financing scene at the upstream in a financial scene of a supply chain, a supplier initiating a financing application, a commercial bill issued on a blockchain after being confirmed by a core enterprise is taken as a certificate, the core enterprise issues the commercial bill, firstly, the transaction content, an issuer, a commercial bill number, an owner, issuing time and value are specified to create a corresponding commercial bill, the state of the commercial bill is marked as issued, then the owner of the commercial bill is recorded, the commercial bill is added into a list of all similar commercial bills in the state of an account book world, and the result returns a unique identifier of the commercial bill, wherein the unique identifier of the commercial bill is the issuer and the commercial bill number;
step 4.2, the core enterprise transfers the commercial bill to the supplier applying for financing, the process of transferring the commercial bill is that whether the owner of the current commercial bill accords with the caller of the current transaction is firstly verified, if not, the program is quitted and prompted; if the business bill is in accordance with the issued state, continuously verifying whether the business bill is in accordance with the issued state, if the business bill is in accordance with the issued state, exiting the program and prompting that the business bill is not issued, if the business bill is in accordance with the issued state, marking the state of the business bill as a tradable state, checking that the business bill is in the tradable state and is not redeemed, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
4.3, the financial institution purchases the commercial bill to put money on the supplier applying for financing, and the financial institution firstly verifies whether the current commercial bill owner accords with the caller of the current transaction through the process of purchasing the commercial bill from the bill owner, and quits the program and prompts if not; if the business bill is in accordance with the redeemable state, continuously verifying whether the business bill is in accordance with the transactable state, if the business bill is in accordance with the redeemable state, quitting the program and prompting that the business bill is in incorrect state, if the business bill is in accordance with the redeemable state, marking the state of the business bill as the redeemable state, checking that the business bill is in the redeemable state again and is not redeemable, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
and 4.4, after the core enterprise receives goods and sells acquired funds, through the process of redeeming the commercial bill to the financial institution, firstly verifying whether the commercial bill accords with the redeemed state, if so, quitting the program and prompting, if not, continuously verifying whether the core enterprise redeeming the commercial bill is set as a new owner by the holder, if so, setting the bill owner as an issuer thereof, marking the state of the commercial bill as the redeemed state, recording the transaction time, updating the commercial bill in the world state account book, and finally, returning the commercial bill.
The step 5 is as follows:
step 5.1, in the attribute-based access control, for each body, the body ID, i.e., SID, and its attribute are stored together, SA: represents a body attribute, namely, SubjectAttribute, and the body attribute includes three types: status, level at supply chain finance, channel, SnA corresponds to objectnAn associated set of attributes;
step 5.2, in the attribute-based access control, for each object, the attribute is represented as OA, OnA corresponds to objectnAssociated setCollecting attributes;
step 5.3 in Attribute-based Access control, Pn: storage policy, policyID or PnID is a necessary field to store attributes, for each policy, the attribute (P)nSA,PnOA) are stored together;
step 5.4, subject Attribute S from steps 5.1, 5.2, 5.3nA. Object attribute OnA. The policy Pn makes a decision whether to allow access.
The step 6 is as follows:
step 6.1, the common transaction flow is that the client sends a transaction proposal to an endorsement node, the endorsement node returns to the client after simulation verification, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, then broadcasts the transaction to other nodes, and finally writes the transaction into an account book;
and 6.2, the private data transaction process is that the client sends a transaction proposal to an endorsement node, wherein private data is sent in a temporary domain of the proposal, the endorsement node stores the private data in a temporary storage library, sends the private data transaction to an authorization node through a network protocol gossip according to a private transaction set strategy, and sends a response executed by public data through the transaction proposal back to the client, wherein the response also comprises a private data key and hash of a value, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, broadcasts the transaction to other nodes, and finally writes the transaction into the world state of an account book.
The block chain technology-based data privacy protection method in supply chain finance has the advantages that electronic commercial bills are used as the certificates for financing on the block chain, the problems that second-level and third-level enterprises in traditional supply chain finance are difficult to finance and expensive to finance are solved, the issuing, purchasing, transferring and redeeming transactions of the electronic bills are achieved through intelligent contracts, the transactions are recorded on the block chain, information transparency is achieved, wind control cost can be reduced for management of supply chain finance to a great extent, and convenience is provided. A privacy protection scheme of data in supply chain finance based on Hyperridge fabric is designed on the basis of the model, a plurality of business processes exist in a real supply chain finance scene, and data isolation is realized by using the characteristic of multiple channels. Secondly, a private data set is established, for some sensitive private data, only authorized enterprises can record and access the private data in the own account book, and an access control rule based on attributes is used, so that the data access permissions of multi-level suppliers are different.
Drawings
FIG. 1 is a flow chart of a prepayment financing service based on Hyperridge fabric according to the present invention;
FIG. 2 is a diagram of a supply chain financial scenario for a Hyperridge fabric-based multi-service process as simulated in accordance with the present invention;
FIG. 3 is a view of a scenario simulated in FIG. 2, and the present invention is directed to a data privacy protection architecture diagram in Hyperridge fabric-based supply chain finance.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention relates to a block chain technology-based data privacy protection method in supply chain finance, which is implemented according to the following steps, wherein a flow chart is shown in figure 1:
step 1, selecting a HyperLegger fabric license block chain as a bottom platform, and deploying a HyperLegger fabric license chain network on a virtual machine;
the HyperLegendric license chain is selected as the building platform in step 1, because it is the first open source item of the federation chain, and it uses pluggable components to solve enterprise-level problems. The HyperLegendric license chain underlying environment is constructed on the Golang language, and the constructed HyperLegendric license chain network is deployed on the virtual machine Ubuntu 16.04.
Step 2, deploying corresponding multiple channels according to multiple business processes existing in the finance of an actual supply chain so as to realize data isolation among different business processes;
the step 2 is as follows:
the method comprises the steps of analyzing a real supply chain scene, setting that a plurality of multistage suppliers exist on the supply chain, a plurality of primary suppliers of core enterprises exist, a plurality of secondary suppliers also exist in the primary suppliers, and related business processes are different for different goods channels of different suppliers, so that different channels are divided for different business processes, enterprises or organizations belonging to the same business process are divided into the same channel, and data isolation among different business processes is realized.
Step 3, adding corresponding Organization representative core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel;
the step 3 is as follows:
the channel is created by constructing an initial configuration of the channel, the channel configuration is stored in a configuration block in the book, the channel configuration specifies which organizations are channel members, a new block of sort nodes is added to the channel, and a policy for managing channel updates, the most important information contained in the channel configuration file configx.yaml is the organization that is a channel member, each organization is identified by a member service provider MSP ID and a channel MSP, the channel MSP identification is stored in the channel configuration and contains certificates for identifying the organization's nodes, applications and administrators, and for an organization joining a channel, configuration is initially performed in the channel configuration file configx.yaml.
Step 4, designing a prepayment financing model, and deploying intelligent contracts of the prepayment financing model for small and medium-sized enterprises in each channel;
the step 4 is as follows:
step 4.1, selecting the upstream pre-payment financing scene in the financial scene of the supply chain, the supplier initiates the financing application, the business bill issued on the blockchain after being confirmed by the core enterprise is used as a voucher, the core enterprise issues the business bill, firstly, the transaction content, the issuer, the number of the business bill, the owner, the issuing time and the value are specified to create the corresponding business bill, for the purpose of distinguishing and successfully executing subsequent transactions, the status of the commercial bill is marked as issued, the owner of the business ticket is then recorded, the business ticket is added to a list of all similar business tickets in the ledger world state (world state is a database that stores a set of current values of ledger state through which programs can directly access a current value of ledger state), the result returns the unique identification of the commercial bill, and the unique identification of the commercial bill is the serial number of the issuer and the commercial bill;
step 4.2, the core enterprise transfers the commercial bill to the supplier applying for financing, the process of transferring the commercial bill is that whether the owner of the current commercial bill accords with the caller of the current transaction is firstly verified, if not, the program is quitted and prompted; if the business bill is in accordance with the issued state, continuously verifying whether the business bill is in accordance with the issued state, if the business bill is in accordance with the issued state, exiting the program and prompting that the business bill is not issued, if the business bill is in accordance with the issued state, marking the state of the business bill as a tradable state, checking that the business bill is in the tradable state and is not redeemed, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
step 4.3, the financial institution purchases the commercial bill to pay for the supplier applying for financing, and the financial institution firstly verifies whether the current commercial bill owner accords with the caller of the current transaction through the process of purchasing the commercial bill from the bill owner (the money transfer mode is not considered in the text), and if not, quits the program and prompts; if the business bill is in accordance with the redeemable state, continuously verifying whether the business bill is in accordance with the transactable state, if the business bill is in accordance with the redeemable state, quitting the program and prompting that the business bill is in incorrect state, if the business bill is in accordance with the redeemable state, marking the state of the business bill as the redeemable state, checking that the business bill is in the redeemable state again and is not redeemable, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
and 4.4, after the core enterprise receives goods and sells the obtained funds, through a process of redeeming the commercial bill to the financial institution (the mode of money transfer is not considered in the text), firstly verifying whether the commercial bill conforms to the redeemed state, if so, quitting the program and prompting, if not, continuously verifying whether the holder is the core enterprise which redeems the commercial bill to be set as a new holder, if so, setting the bill owner as the issuer of the holder, marking the state of the commercial bill as the redeemed state, recording the transaction time, updating the commercial bill in the world state account book, and finally, returning the commercial bill.
Step 5, deploying an access control intelligent contract based on the attribute on each channel to realize authority differentiation based on the attribute;
the step 5 is as follows:
step 5.1, in the attribute-based access control, for each body, the body ID, i.e., SID, and its attribute are stored together, SA: represents a body attribute, namely, SubjectAttribute, and the body attribute includes three types: status, level at supply chain finance, channel, SnA corresponds to subjectnAn associated set of attributes;
step 5.2, in the attribute-based access control, for each object (resource), the attribute is represented as OA (ObjectAttribute), OnA corresponds to objectnAn associated set of attribute sets;
step 5.3 in Attribute-based Access control, Pn(Policy): storage policy, policyID or PnID is a necessary field to store attributes, for each policy, the attribute (P)nSA,PnOA) are stored together;
step 5.4, subject Attribute S from steps 5.1, 5.2, 5.3nA. Object attribute OnA. Policy PnA decision is made whether to allow access.
And 6, adding a function of a private database into each channel, so that only authorized organizations can see private data values, unauthorized organizations can only see corresponding hashes, and the transactions comprise two different types of transactions, namely ordinary transactions and private data transactions.
The step 6 is as follows:
step 6.1, the common transaction flow is that the client sends a transaction proposal to an endorsement node, the endorsement node returns to the client after simulation verification, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, then broadcasts the transaction to other nodes, and finally writes the transaction into an account book;
and 6.2, the private data transaction process is that the client sends a transaction proposal to an endorsement node, wherein private data is sent in a temporary domain of the proposal, the endorsement node stores the private data in a temporary storage library, sends the private data transaction to an authorization node through a network protocol gossip according to a private transaction set strategy, and sends a response executed by public data through the transaction proposal back to the client, wherein the response also comprises a private data key and hash of a value, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, broadcasts the transaction to other nodes, and finally writes the transaction into the world state of an account book.
Private data mentioned in step 6.2 is the deployment of a private data collector on the channel, and the collector defines which nodes can hold data, to which nodes the data is distributed, how many nodes can propagate the private data and how long the private data is stored in the private database.
A data privacy protection method in supply chain finance based on a block chain technology is characterized in that a pre-payment financing model combined with a block chain is designed by referring to a commercial bill under the scene of pre-payment financing in the supply chain finance, the data privacy protection method is provided on the basis of the model, and data isolation is realized by means of the multi-channel characteristic in a HyperLegendr fabric licensing chain. In addition, private data characteristics are set to support privacy protection of transaction granularity, an authorized party of the transaction is appointed when the transaction is sent, the details of the transaction are only stored in the authorized party, and the Hash of the private data is stored after the private data is identified in the whole network, so that the effective isolation of the private data is guaranteed, and the authenticity of the private data can be verified. Besides, ABAC (attribute-based access control) technology is utilized to provide finer-grained data protection, and privacy protection of data in supply chain finance can be effectively achieved through the method.
Examples
Step 1, simulating an actual scene in the financial reality of a supply chain, as shown in fig. 2, there may be 3 business processes in the financial scene of the actual supply chain, different dashed solid lines represent different processes, and the business process 1 includes a core enterprise (O1, Organization1), a primary provider a (O2, Organization2), a secondary provider a (O4, Organization4), a tertiary provider a (O6, Organization6), and a financial institution (O9, Organization 9); business process 2 includes core enterprise (O1, Organization1), primary supplier a (O2, Organization2), secondary supplier B (O5, Organization5), tertiary supplier B (O7, Organization7), financial institution (O9, Organization 9); business process 3 includes core enterprise (O1, Organization1), primary supplier B (O3, Organization3), secondary supplier a (O4, Organization4), secondary supplier B (O5, Organization5), tertiary supplier C (O8, Organization8), financial institution (O9, Organization 9); building a corresponding network on the Hyperridge fabric according to different service flows;
step 2, building corresponding multiple channels according to multiple service flows stored in the actual supply chain finance to realize data isolation among different service flows, and aiming at the supply chain finance scene of 3 service flows simulated in fig. 1, the corresponding 3 channels are deployed as shown in fig. 2 and are respectively represented by different dotted and solid lines, wherein the service flow 1 corresponds to a Channel C1(Channel1), the service flow 2 corresponds to a Channel C2(Channel2), and the service flow 3 corresponds to a Channel C3(Channel 3).
Step 3, adding corresponding Organization into the channel to represent core enterprises, small and medium-sized enterprises applying for financing and financial institutions respectively, wherein the channel has different organizations o as shown in fig. 2nWherein the organization contained in Channel 1(Channel1) is O1, O2, O4, O6 and O9, each of which contributes a node PeernThe corresponding nodes in the channel1 include Peer1, Peer2, Peer4, Peer6 and Peer9, each node needs to maintain the Ledger (leader) of the corresponding channel, and the Ledger maintained by the channel1 is L1. Each channel also needs to deploy a corresponding system chain code, ChainCode, the system chain code corresponding to channel1 is CC1, and the organization, nodes and chain codes mentioned in channel 2(C2) and channel 3(C3) are similar to channel 1.
Step 4, an attribute-based access control chain code is deployed on each channel to realize attribute-based permission differentiation, for example, in the network architecture in fig. 2, each channel deploys an ABAC Chaincode (attribute-based access control chain code) and a link Ordering service (Ordering service), and when a client submits a transaction, whether the transaction is allowed to be executed is determined by the deployed ABAC Chaincode.
Step 5, adding a function of a private database in each Channel, so that only authorized organizations can see data values, unauthorized organizations can only see corresponding hashes, the transactions include two different types of transactions, namely ordinary transactions and private data transactions, the authorized node and the unauthorized node databases are respectively shown as Peer1 and Peer7 nodes in fig. 2, an account book L2 of the Peer1 includes a world State and a block, the world State includes a Channel State and a private data State private State, the Channel State includes hashes of public data and private data, and the private data State includes real values of the private data. The book L2 of Peer7 includes world state and block, but the world state includes only one channel state, so unauthorized nodes cannot query the real value of private data.
Step 6, designing a prepayment financing model based on Hyperridge fabric license chain, deploying an intelligent contract of small and medium-sized enterprises applying for the prepayment financing model in each channel, and the flow chart of the prepayment financing business is shown in FIG. 3.
And 6.1, signing a large order by the supplier and the core enterprise, wherein the supplier needs to provide goods for the core enterprise, but the fund is insufficient to produce the goods, and financing needs to be applied to maintain the operation of the enterprise, so that financing application is initiated to the core enterprise to overcome the short-term financing requirement. As shown in step 1 of figure 3,
step 6.2, the core enterprise makes an analysis according to the actual situation (for example, whether the supplier applying for financing has the information of making an order with the enterprise, etc.), and if the examination is passed, a business bill is issued on the block chain, and the issued business bill is used as a voucher, as shown in step 2 in fig. 3;
step 6.3, after step 6.2, the core enterprise transfers the commercial bill to the supplier applying for financing, and the supplier applying for financing obtains the required fund by selling the commercial bill, as shown in step 3 in fig. 3;
step 6.4, after step 6.3, the financial institution considers that the core enterprise issued, so the commercial instrument is reputable, so that by evaluating in the short term, a profit can be obtained therefrom, the financial institution will be able to obtain the financial institution's funds for purchasing the commercial instrument by purchasing the commercial instrument from the instrument holder on the blockchain, as shown in step 4 in fig. 3;
step 6.5, after step 6.4, the core enterprise, upon receipt and sale of the goods, takes the corresponding payment for the goods and redeems the then issued commercial instrument through the blockchain platform to the financial institution within the term, as shown in step 5 of fig. 3.
Claims (7)
1. The method for protecting data privacy in supply chain finance based on a block chain technology is characterized by comprising the following steps:
step 1, selecting a HyperLegger fabric license block chain as a bottom platform, and deploying a HyperLegger fabric license chain network on a virtual machine;
step 2, deploying corresponding multiple channels according to multiple service processes existing in the finance of an actual supply chain;
step 3, adding corresponding Organization representative core enterprises, small and medium-sized enterprises applying for financing and financial institutions into each channel;
step 4, designing a prepayment financing model, and deploying intelligent contracts of the prepayment financing model for small and medium-sized enterprises in each channel;
step 5, deploying an access control intelligent contract based on the attribute on each channel to realize authority differentiation based on the attribute;
and 6, adding a function of a private database into each channel, so that only authorized organizations can see private data values, unauthorized organizations can only see corresponding hashes, and the transactions comprise two different types of transactions, namely ordinary transactions and private data transactions.
2. The method for protecting data privacy in supply chain finance based on the block chain technology, according to claim 1, is characterized in that in the step 1, a HyperLegendr Fabric license chain is selected as a building platform, a bottom environment of the HyperLegendr Fabric license chain is built on a Golang language, and a built HyperLegendr Fabric license chain network is deployed on a virtual machine Ubuntu 16.04.
3. The method according to claim 2, wherein the step 2 is as follows:
the method comprises the steps of analyzing a real supply chain scene, setting that a plurality of multistage suppliers exist on the supply chain, a plurality of primary suppliers of core enterprises exist, a plurality of secondary suppliers also exist in the primary suppliers, and related business processes are different for different goods channels of different suppliers, so that different channels are divided for different business processes, enterprises or organizations belonging to the same business process are divided into the same channel, and data isolation among different business processes is realized.
4. The method according to claim 3, wherein the step 3 is as follows:
the channel is created by constructing an initial configuration of the channel, the channel configuration is stored in a configuration block in the book, the channel configuration specifies which organizations are channel members, a new block of sort nodes is added to the channel, and a policy for managing channel updates, the most important information contained in the channel configuration file configx.yaml is the organization that is a channel member, each organization is identified by a member service provider MSP ID and a channel MSP, the channel MSP identification is stored in the channel configuration and contains certificates for identifying the organization's nodes, applications and administrators, and for an organization joining a channel, configuration is initially performed in the channel configuration file configx.yaml.
5. The method according to claim 4, wherein the step 4 is as follows:
step 4.1, selecting a prepayment financing scene at the upstream in a financial scene of a supply chain, a supplier initiating a financing application, a commercial bill issued on a blockchain after being confirmed by a core enterprise is taken as a certificate, the core enterprise issues the commercial bill, firstly, the transaction content, an issuer, a commercial bill number, an owner, issuing time and value are specified to create a corresponding commercial bill, the state of the commercial bill is marked as issued, then the owner of the commercial bill is recorded, the commercial bill is added into a list of all similar commercial bills in the state of an account book world, and the result returns a unique identifier of the commercial bill, wherein the unique identifier of the commercial bill is the issuer and the commercial bill number;
step 4.2, the core enterprise transfers the commercial bill to the supplier applying for financing, the process of transferring the commercial bill is that whether the owner of the current commercial bill accords with the caller of the current transaction is firstly verified, if not, the program is quitted and prompted; if the business bill is in accordance with the issued state, continuously verifying whether the business bill is in accordance with the issued state, if the business bill is in accordance with the issued state, exiting the program and prompting that the business bill is not issued, if the business bill is in accordance with the issued state, marking the state of the business bill as a tradable state, checking that the business bill is in the tradable state and is not redeemed, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
4.3, the financial institution purchases the commercial bill to put money on the supplier applying for financing, and the financial institution firstly verifies whether the current commercial bill owner accords with the caller of the current transaction through the process of purchasing the commercial bill from the bill owner, and quits the program and prompts if not; if the business bill is in accordance with the redeemable state, continuously verifying whether the business bill is in accordance with the transactable state, if the business bill is in accordance with the redeemable state, quitting the program and prompting that the business bill is in incorrect state, if the business bill is in accordance with the redeemable state, marking the state of the business bill as the redeemable state, checking that the business bill is in the redeemable state again and is not redeemable, setting a new owner, then recording the transaction time, updating the business bill in the world state account book, and finally returning the business bill;
and 4.4, after the core enterprise receives goods and sells acquired funds, through the process of redeeming the commercial bill to the financial institution, firstly verifying whether the commercial bill accords with the redeemed state, if so, quitting the program and prompting, if not, continuously verifying whether the holder is the core enterprise setting the redeemed commercial bill as a new holder, if so, setting the bill holder as an issuer thereof, marking the state of the commercial bill as the redeemed state, recording the transaction time, updating the commercial bill in the world state book, and finally, returning the commercial bill.
6. The method according to claim 5, wherein the step 5 is as follows:
step 5.1, in the attribute-based access control, for each body, the body ID, i.e., SID, and its attribute are stored together, SA: representing a Subject Attribute, namely, Subject Attribute, the Subject Attribute includes three types: status, level at supply chain finance, channel, SnA corresponds to subjectnAn associated set of attributes;
step 5.2, in the attribute-based access control, for each object, the attribute is represented as OA, OnA corresponds to objectnAn associated set of attribute sets;
step 5.3 in Attribute-based Access control, Pn: storage Policy, Policy ID or PnID is a necessary field to store attributes, for each policy, the attribute (P)nSA,PnOA) are stored together;
step 5.4, subject Attribute S from steps 5.1, 5.2, 5.3nA. Object attribute OnA. Policy PnA decision is made whether to allow access.
7. The method according to claim 6, wherein the step 6 is as follows:
step 6.1, the common transaction flow is that the client sends a transaction proposal to an endorsement node, the endorsement node returns to the client after simulation verification, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, then broadcasts the transaction to other nodes, and finally writes the transaction into an account book;
and 6.2, the private data transaction process is that the client sends a transaction proposal to an endorsement node, wherein private data is sent in a temporary domain of the proposal, the endorsement node stores the private data in a temporary storage library, sends the private data transaction to an authorization node through a network protocol gossip according to a private transaction set strategy, and sends a response executed by public data through the transaction proposal back to the client, wherein the response also comprises a private data key and hash of a value, the client transmits the received transaction to a sequencing service node, the sequencing service node groups the transaction into blocks, broadcasts the transaction to other nodes, and finally writes the transaction into the world state of an account book.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110932257.0A CN113641759A (en) | 2021-08-13 | 2021-08-13 | Data privacy protection method in supply chain finance based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110932257.0A CN113641759A (en) | 2021-08-13 | 2021-08-13 | Data privacy protection method in supply chain finance based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113641759A true CN113641759A (en) | 2021-11-12 |
Family
ID=78421644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110932257.0A Withdrawn CN113641759A (en) | 2021-08-13 | 2021-08-13 | Data privacy protection method in supply chain finance based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113641759A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115310886A (en) * | 2022-10-12 | 2022-11-08 | 广东省科技基础条件平台中心 | Enterprise hatching management system and method based on block chain |
CN116366273A (en) * | 2022-09-09 | 2023-06-30 | 简单汇信息科技(广州)有限公司 | Private data sending method based on blockchain |
CN117436811A (en) * | 2023-11-01 | 2024-01-23 | 成都安美勤信息技术股份有限公司 | Electronic bill management method and system based on privacy protection |
-
2021
- 2021-08-13 CN CN202110932257.0A patent/CN113641759A/en not_active Withdrawn
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116366273A (en) * | 2022-09-09 | 2023-06-30 | 简单汇信息科技(广州)有限公司 | Private data sending method based on blockchain |
CN116366273B (en) * | 2022-09-09 | 2023-11-17 | 简单汇信息科技(广州)有限公司 | Private data sending method based on blockchain |
CN115310886A (en) * | 2022-10-12 | 2022-11-08 | 广东省科技基础条件平台中心 | Enterprise hatching management system and method based on block chain |
CN117436811A (en) * | 2023-11-01 | 2024-01-23 | 成都安美勤信息技术股份有限公司 | Electronic bill management method and system based on privacy protection |
CN117436811B (en) * | 2023-11-01 | 2024-05-07 | 成都安美勤信息技术股份有限公司 | Electronic bill management method and system based on privacy protection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110599181B (en) | Data processing method, device and equipment based on block chain and storage medium | |
TWI768163B (en) | Method and device for generating smart contracts | |
CN109863719B (en) | Method and system for controlling transfer through block chain | |
CN113641759A (en) | Data privacy protection method in supply chain finance based on block chain technology | |
CN108805707A (en) | Works copyright revenue distribution method and device based on block chain | |
CN118037290A (en) | System and method for block chain implementation | |
CN110232507B (en) | Intelligent contract-based crowdsourcing activity overall process supervision method and system | |
CN109191219A (en) | About the data processing method of electronic bill, device, storage medium and equipment | |
CN111461870A (en) | Supply chain financial credit increasing method based on block chain | |
CN111161017A (en) | Cloud marketing system and method based on mobile terminal and block chain | |
Yadav et al. | An IAD type framework for Blockchain enabled smart tourism ecosystem | |
CN109783653A (en) | A kind of inquiry system of management and the retrospect of the knowledge mapping based on block chain technology | |
CN110599348B (en) | Method, device, equipment and storage medium for stock right incentive | |
KR102093291B1 (en) | Managerial system for culture contents based on the block chain | |
CN111899046A (en) | Digital rights benefit evidence and intelligent rights management method and system based on block chain technology | |
Preece et al. | Blockchain technology as a mechanism for digital railway ticketing | |
CN109377352A (en) | A kind of wisdom chemical industrial park data increasing letter method based on block chain | |
US20230134095A1 (en) | Systems, devices and methods for tracking authenticated clean energy with blockchains | |
Kanani et al. | Matic whitepaper | |
CN113221191B (en) | Block chain-based data evidence storage method, device, equipment and storage medium | |
CN111210339A (en) | Enterprise credit transfer method and device based on block chain electronic invoice | |
CN108460596B (en) | Quantization value distribution transfer method based on block chain | |
Chaabna et al. | Analysis of the State of E-commerce in Algeria | |
CN110727735A (en) | Method, device and equipment for cooperatively completing task event based on block chain technology | |
CN116308377A (en) | Account management method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211112 |